diff --git a/README.md b/README.md index 7f8760d..6118782 100755 --- a/README.md +++ b/README.md @@ -41,6 +41,7 @@ If you have any trouble with Ghost you should have a look to the documentation : chmod +x ./launch ./launch ``` +Note: if Gunicorn fail you should launch the "server.py" instead 3 - Edit the server configuration in popup.js and background.js with your server's informations ``` var config_server = "http://127.0.0.1:8000"; @@ -51,4 +52,8 @@ You can try the Error SQL, Blind SQL, LFI with Damn Vulnerable Web App ## Thanks - Polyglot vector for SQL injections [The Ultimate SQL Injection Payload](https://labs.detectify.com/2013/05/29/the-ultimate-sql-injection-payload/) - Polyglot vector for XSS injection 1 [One vector to rule them all](http://www.thespanner.co.uk/2010/09/15/one-vector-to-rule-them-all/) -- Polyglot vector for XSS injection 2 [Unleashing an Ultimate XSS Polyglot](https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot) \ No newline at end of file +- Polyglot vector for XSS injection 2 [Unleashing an Ultimate XSS Polyglot](https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot) + +# TODO +- Verify=False in requests.. +- OpenURL redirect ? \ No newline at end of file diff --git a/Server/launch.sh b/Server/launch.sh index 3e96981..78063c2 100755 --- a/Server/launch.sh +++ b/Server/launch.sh @@ -1 +1 @@ -gunicorn --workers=3 server:app --timeout 90 +gunicorn --workers=3 server:app --timeout 360 diff --git a/Server/scans.py b/Server/scans.py index d96b7cd..6c77e1e 100644 --- a/Server/scans.py +++ b/Server/scans.py @@ -12,7 +12,6 @@ Parameters: vulns - list of vulnerabilities, url - address of the target, fuzz - """ def scan_xss(method, vulns, url, fuzz, cookie, useragent, firefox, data): payload = 'jaVasCript:alert(1)//" name=alert(1) onErrOr=eval(name) src=1 autofocus oNfoCus=eval(name)>" >
@gmail.com\'-->" >">/\'">