You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: VHostScan.py
+10-6Lines changed: 10 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,7 @@ def main():
28
28
29
29
parser.add_argument('--ignore-http-codes', dest='ignore_http_codes', type=str, help='Comma separated list of http codes to ignore with virtual host scans (default 404).', default='404')
parser.add_argument('--first-hit', dest='first_hit', action='store_true', help='Return first successful result.', default=False)
31
32
parser.add_argument('--unique-depth', dest='unique_depth', type=int, help='Show likely matches of page content that is found x times (default 1).', default=1)
32
33
parser.add_argument("--ssl", dest="ssl", action="store_true", help="If set then connections will be made over HTTPS instead of HTTP (default http).", default=False)
33
34
parser.add_argument("--fuzzy-logic", dest="fuzzy_logic", action="store_true", help="If set then fuzzy match will be performed against unique hosts (default off).", default=False)
@@ -40,7 +41,7 @@ def main():
40
41
parser.add_argument("-oJ", dest="output_json", help="JSON output printed to a file when the -oJ option is specified with a filename argument." )
41
42
parser.add_argument("-", dest="stdin", action="store_true", help="By passing a blank '-' you tell VHostScan to expect input from stdin (pipe).", default=False)
42
43
43
-
arguments=parser.parse_args()
44
+
arguments=parser.parse_args()
44
45
wordlist= []
45
46
46
47
word_list_types= []
@@ -69,23 +70,26 @@ def main():
69
70
70
71
user_agents= []
71
72
ifarguments.user_agent:
72
-
print('[>] User-Agent specified, using it')
73
+
print('[>] User-Agent specified, using it.')
73
74
user_agents= [arguments.user_agent]
74
75
elifarguments.random_agent:
75
-
print('[>] Random User-Agent flag set')
76
+
print('[>] Random User-Agent flag set.')
76
77
user_agents=load_random_user_agents()
77
78
78
79
if(arguments.ssl):
79
-
print("[>] SSL flag set, sending all results over HTTPS")
80
+
print("[>] SSL flag set, sending all results over HTTPS.")
80
81
81
82
if(arguments.add_waf_bypass_headers):
82
-
print("[>] WAF flag set, sending simple WAF bypass headers")
83
+
print("[>] WAF flag set, sending simple WAF bypass headers.")
0 commit comments