Screen update
|
@ -55,5 +55,4 @@ You can try the Error SQL, Blind SQL, LFI with Damn Vulnerable Web App
|
|||
- Polyglot vector for XSS injection 2 [Unleashing an Ultimate XSS Polyglot](https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot)
|
||||
|
||||
# TODO
|
||||
- Verify=False in requests..
|
||||
- OpenURL redirect ?
|
After Width: | Height: | Size: 149 KiB |
Before Width: | Height: | Size: 186 KiB After Width: | Height: | Size: 186 KiB |
Before Width: | Height: | Size: 404 KiB |
BIN
Screens/SQLi.png
Before Width: | Height: | Size: 79 KiB |
After Width: | Height: | Size: 67 KiB |
Before Width: | Height: | Size: 61 KiB |
BIN
Screens/XSS1.png
Before Width: | Height: | Size: 163 KiB |
|
@ -207,4 +207,4 @@ def scan_rce(method, vulns, url, fuzz, cookie, useragent, data):
|
|||
vulns['list'] += 'RCE|TYPE|'+inject+'|DELIMITER|'
|
||||
|
||||
else:
|
||||
print "\t\t\033[94mRCE Failed \033[0m for ", fuzz, " with the payload :", payload_get
|
||||
print "\t\t\033[94mRCE Failed \033[0m for ", fuzz, " with the payload :", payload_post
|
||||
|
|