代码拉取完成,页面将自动刷新
同步操作将从 songsongsong/PVD-HACK 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
from Public.Public import *
from Public.Gethack import *
from Public.ResRet import *
from Public.Posthack import *
import argparse
def head():
print('''
-----
|
Permission defect vulnerability
PDV - Vulnerability detection
-w WORD -f FILE
|
-----
''')
def userinput():
parser = argparse.ArgumentParser(description='PDV')
parser.add_argument("-w", help="差异字符", required=True)
parser.add_argument("-f", help="burp xml file", required=True)
args = parser.parse_args()
return args
def Getcheck(date,word):
printmsg('GetHacking...')
for item in date:
if len(item[1]) > 0:
for url in item[1]:
if GetReq(url,word,header=item[0]):
printmsg('Congratulations! url : {} Loopholes (yes headers)'.format(url))
if GetReq(url,word):
printmsg('Congratulations! url : {} Loopholes (no headers)'.format(url))
def Postcheck(date,word):
printmsg('PostHacking...')
for item in date:
if item[1]:
if len(item[1]) > 0:
for date in item[1]:
if PostReq(item[0],date,word,header=item[2]):
printmsg('Congratulations! url : {} Loopholes (yes headers)'.format(item[0]))
printmsg('request date: {}'.format(date))
if PostReq(item[0],date,word):
printmsg('Congratulations! url : {} Loopholes (no headers)'.format(item[0]))
printmsg('request date: {}'.format(date))
if __name__ == "__main__":
head()
args = userinput()
word = args.w
printmsg('Your different words:{}'.format(word))
date = GetreadXML(args.f)
Getcheck(date,word)
date = PostreadXML(args.f)
Postcheck(date,word)
printmsg('All items tested! If there is a vulnerability, it will output.')
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。