|
4 | 4 | import random
|
5 | 5 | from common.colors import run,W,end,good,bad,que,info,bannerblue
|
6 | 6 | from common.vxrequest import getrequest as vulnxget
|
| 7 | +from common.uri_converter import parsing_url as parsify |
7 | 8 | wp_contentdorks = {
|
8 | 9 | 'blaze' : 'inurl:"/wp-content/plugins/blaze-slide-show-for-wordpress/"',
|
9 | 10 | 'catpro' : 'inurl:"/wp-content/plugins/wp-catpro/"',
|
@@ -94,38 +95,43 @@ def WP_dorksconditions(exploitname,response):
|
94 | 95 | if web not in webs:
|
95 | 96 | webs.append(web)
|
96 | 97 | for i in range(len(webs)):
|
97 |
| - print (' %s URL : %s ' %(good , webs[i])) |
| 98 | + print (' %s URL : %s ' %(good , webs[i])) |
| 99 | + print (' %s DOMAIN: %s ' %(good , parsify(webs[i]))) |
98 | 100 | elif exploitname in wp_admindorks:
|
99 | 101 | dorks = re.findall(re.compile(r'https?://+?\w+?[a-zA-Z0-9-_.]+?[a-zA-Z0-9-_.]?\w+\.\w+/?/wp-admin/\w+'),response)
|
100 | 102 | if len(dorks) > 0:
|
101 | 103 | for web in dorks:
|
102 | 104 | if web not in webs:
|
103 | 105 | webs.append(web)
|
104 | 106 | for i in range(len(webs)):
|
105 |
| - print (' %s URL : %s ' %(good , webs[i])) |
| 107 | + print (' %s URL : %s ' %(good , webs[i])) |
| 108 | + print (' %s DOMAIN: %s ' %(good , parsify(webs[i]))) |
106 | 109 | elif exploitname in wpajx:
|
107 | 110 | dorks = re.findall(re.compile(r'https?://+?\w+?[a-zA-Z0-9-_.]+?[a-zA-Z0-9-_.]?\w+\.\w+/?/jm-ajax/upload_file/'),response)
|
108 | 111 | if len(dorks) > 0:
|
109 | 112 | for web in dorks:
|
110 | 113 | if web not in webs:
|
111 | 114 | webs.append(web)
|
112 | 115 | for i in range(len(webs)):
|
113 |
| - print (' %s URL : %s ' %(good , webs[i])) |
| 116 | + print (' %s URL : %s ' %(good , webs[i])) |
| 117 | + print (' %s DOMAIN: %s ' %(good , parsify(webs[i]))) |
114 | 118 | elif exploitname in wpindex:
|
115 | 119 | dorks = re.findall(re.compile(r'https?://+?\w+?[a-zA-Z0-9-_.]+?[a-zA-Z0-9-_.]?\w+\.\w+/index.php/wp-json/wp/'),response)
|
116 | 120 | if len(dorks) > 0:
|
117 | 121 | for web in dorks:
|
118 | 122 | if web not in webs:
|
119 | 123 | webs.append(web)
|
120 | 124 | for i in range(len(webs)):
|
121 |
| - print (' %s URL : %s ' %(good , webs[i])) |
| 125 | + print (' %s URL : %s ' %(good , webs[i])) |
| 126 | + print (' %s DOMAIN: %s ' %(good , parsify(webs[i]))) |
122 | 127 | elif exploitname in joomla:
|
123 | 128 | dorks = re.findall(re.compile(r'https?://+?\w+?[a-zA-Z0-9-_.]+?[a-zA-Z0-9-_.]?\w+\.\w+/index.php?option=com_jce'),response)
|
124 | 129 | if len(dorks) > 0:
|
125 | 130 | for web in dorks:
|
126 | 131 | if web not in webs:
|
127 | 132 | webs.append(web)
|
128 | 133 | for i in range(len(webs)):
|
129 |
| - print (' %s URL : %s ' %(good , webs[i])) |
| 134 | + print (' %s URL : %s ' %(good , webs[i])) |
| 135 | + print (' %s DOMAIN: %s ' %(good , parsify(webs[i]))) |
130 | 136 | else:
|
131 | 137 | print(' %s No URL founds' %(bad))
|
0 commit comments