text stringlengths 1 93.6k |
|---|
____ ___ ___ ____ ______ `| T T` __ __ ____ _____
|
l j| \ / _]| \ | T`| | |`| T__T T / T| __|
|
| T | \ / [_ | _ Yl_j l_j`| ~ |`| | | |Y o || l_
|
| | | D YY _]| | | | | `|___ |`| | | || || _|
|
j l | || [_ | | | | | `| !` \ / | | || ]
|
|____jl_____jl_____jl__j__j l__j `l____/ ` \_/\_/ l__j__jl__j (%s)%s""".strip("\n") % (VERSION, "\n")
|
RAW, TEXT, HTTPCODE, SERVER, TITLE, HTML, URL = xrange(7)
|
COOKIE, UA, REFERER = "Cookie", "User-Agent", "Referer"
|
GET, POST = "GET", "POST"
|
GENERIC_PROTECTION_KEYWORDS = ("rejected", "forbidden", "suspicious", "malicious", "captcha", "invalid", "your ip", "please contact", "terminated", "protected", "unauthorized", "blocked", "protection", "incident", "denied", "detected", "dangerous", "firewall", "fw_block", "unusual activity", "bad request", "request id", "injection", "permission", "not acceptable", "security policy", "security reasons")
|
GENERIC_PROTECTION_REGEX = r"(?i)\b(%s)\b"
|
GENERIC_ERROR_MESSAGE_REGEX = r"\b[A-Z][\w, '-]*(protected by|security|unauthorized|detected|attack|error|rejected|allowed|suspicious|automated|blocked|invalid|denied|permission)[\w, '!-]*"
|
WAF_RECOGNITION_REGEX = None
|
HEURISTIC_PAYLOAD = "1 AND 1=1 UNION ALL SELECT 1,NULL,'<script>alert(\"XSS\")</script>',table_name FROM information_schema.tables WHERE 2>1--/**/; EXEC xp_cmdshell('cat ../../../etc/passwd')#" # Reference: https://github.com/sqlmapproject/sqlmap/blob/master/lib/core/settings.py
|
PAYLOADS = []
|
SIGNATURES = {}
|
DATA_JSON = {}
|
DATA_JSON_FILE = os.path.join(os.path.dirname(__file__), "data.json")
|
MAX_HELP_OPTION_LENGTH = 18
|
IS_TTY = sys.stdout.isatty()
|
IS_WIN = os.name == "nt"
|
COLORIZE = not IS_WIN and IS_TTY
|
LEVEL_COLORS = {"o": "\033[00;94m", "x": "\033[00;91m", "!": "\033[00;93m", "i": "\033[00;95m", "=": "\033[00;93m", "+": "\033[00;92m", "-": "\033[00;91m"}
|
VERIFY_OK_INTERVAL = 5
|
VERIFY_RETRY_TIMES = 3
|
MIN_MATCH_PARTIAL = 5
|
DEFAULTS = {"timeout": 10}
|
MAX_MATCHES = 5
|
QUICK_RATIO_THRESHOLD = 0.2
|
MAX_JS_CHALLENGE_SNAPLEN = 120
|
ENCODING_TRANSLATIONS = {"windows-874": "iso-8859-11", "utf-8859-1": "utf8", "en_us": "utf8", "macintosh": "iso-8859-1", "euc_tw": "big5_tw", "th": "tis-620", "unicode": "utf8", "utc8": "utf8", "ebcdic": "ebcdic-cp-be", "iso-8859": "iso8859-1", "iso-8859-0": "iso8859-1", "ansi": "ascii", "gbk2312": "gbk", "windows-31j": "cp932", "en": "us"} # Reference: https://github.com/sqlmapproject/sqlmap/blob/master/lib/request/basic.py
|
PROXY_TESTING_PAGE = "https://myexternalip.com/raw"
|
if COLORIZE:
|
for _ in re.findall(r"`.+?`", BANNER):
|
BANNER = BANNER.replace(_, "\033[01;92m%s\033[00;49m" % _.strip('`'))
|
for _ in re.findall(r" [Do] ", BANNER):
|
BANNER = BANNER.replace(_, "\033[01;93m%s\033[00;49m" % _.strip('`'))
|
BANNER = re.sub(VERSION, r"\033[01;91m%s\033[00;49m" % VERSION, BANNER)
|
else:
|
BANNER = BANNER.replace('`', "")
|
_ = random.randint(20, 64)
|
DEFAULT_USER_AGENT = "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; %s; rv:%d.0) Gecko/20100101 Firefox/%d.0" % (NAME, _, _)
|
HEADERS = {"User-Agent": DEFAULT_USER_AGENT, "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Accept-Language": "en-US,en;q=0.5", "Accept-Encoding": "identity", "Cache-Control": "max-age=0"}
|
original = None
|
options = None
|
intrusive = None
|
heuristic = None
|
chained = False
|
locked_code = None
|
locked_regex = None
|
non_blind = set()
|
seen = set()
|
blocked = []
|
servers = set()
|
codes = set()
|
proxies = list()
|
proxies_index = 0
|
_exit = sys.exit
|
def exit(message=None):
|
if message:
|
print("%s%s" % (message, ' ' * 20))
|
_exit(1)
|
def retrieve(url, data=None):
|
global proxies_index
|
retval = {}
|
if proxies:
|
while True:
|
try:
|
opener = build_opener(ProxyHandler({"http": proxies[proxies_index], "https": proxies[proxies_index]}))
|
install_opener(opener)
|
proxies_index = (proxies_index + 1) % len(proxies)
|
urlopen(PROXY_TESTING_PAGE).read()
|
except KeyboardInterrupt:
|
raise
|
except:
|
pass
|
else:
|
break
|
try:
|
req = Request("".join(url[_].replace(' ', "%20") if _ > url.find('?') else url[_] for _ in xrange(len(url))), data, HEADERS)
|
resp = urlopen(req, timeout=options.timeout)
|
retval[URL] = resp.url
|
retval[HTML] = resp.read()
|
retval[HTTPCODE] = resp.code
|
retval[RAW] = "%s %d %s\n%s\n%s" % (httplib.HTTPConnection._http_vsn_str, retval[HTTPCODE], resp.msg, str(resp.headers), retval[HTML])
|
except Exception as ex:
|
retval[URL] = getattr(ex, "url", url)
|
retval[HTTPCODE] = getattr(ex, "code", None)
|
try:
|
retval[HTML] = ex.read() if hasattr(ex, "read") else getattr(ex, "msg", str(ex))
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.