Screen update

master
swisskyrepo 2017-01-16 09:19:22 +01:00
parent 944b7b0fc1
commit a67b852ae5
9 changed files with 1 additions and 2 deletions

View File

@ -55,5 +55,4 @@ You can try the Error SQL, Blind SQL, LFI with Damn Vulnerable Web App
- Polyglot vector for XSS injection 2 [Unleashing an Ultimate XSS Polyglot](https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot)
# TODO
- Verify=False in requests..
- OpenURL redirect ?

BIN
Screens/Results DVWA.png Executable file

Binary file not shown.

After

Width:  |  Height:  |  Size: 149 KiB

View File

Before

Width:  |  Height:  |  Size: 186 KiB

After

Width:  |  Height:  |  Size: 186 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 404 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 79 KiB

BIN
Screens/Server.png Executable file

Binary file not shown.

After

Width:  |  Height:  |  Size: 67 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 61 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 163 KiB

View File

@ -207,4 +207,4 @@ def scan_rce(method, vulns, url, fuzz, cookie, useragent, data):
vulns['list'] += 'RCE|TYPE|'+inject+'|DELIMITER|'
else:
print "\t\t\033[94mRCE Failed \033[0m for ", fuzz, " with the payload :", payload_get
print "\t\t\033[94mRCE Failed \033[0m for ", fuzz, " with the payload :", payload_post