@@ -195,12 +195,27 @@ vulnscanner(){
195195 cat ./$domain /$foldername /urllist.txt | nuclei -tags exposure,unauth,cache -o ./$domain /$foldername /nuclei.txt -silent; notify -bulk -data ./$domain /$foldername /nuclei.txt -silent
196196
197197
198+ echo -e " ${green} Starting up listen server...${reset} "
199+ interactsh-client -v & > ./$domain /$foldername /listen_server.txt & SERVER_PID=$!
200+ sleep 5 # to properly start listen server
201+ LISTENSERVER=$( tail -n 1 ./$domain /$foldername /listen_server.txt)
202+ LISTENSERVER=$( echo $LISTENSERVER | cut -f2 -d ' ' )
203+ echo " Listen server is up $LISTENSERVER with PID=$SERVER_PID "
204+
205+
206+ echo -e " ${green} find SSRF vulnerability ...${reset} "
207+ cat ./$domain /$foldername /waybackurls.txt | gf ssrf | qsreplace https://$LISTENSERVER | httpx -silent | tee ./$domain /$foldername /ssrf_url.txt
208+ notify -bulk -data ./$domain /$foldername /ssrf_url.txt -silent
209+
210+ # kill listen server
211+ kill_listen_server
212+
213+
198214 echo -e " ${green} find Xss vulnerability ...${reset} "
199215 python3 $paramspider -d $domain -s TRUE -e jpg,jpeg,gif,css,js,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt,eot -q -o ./$domain /$foldername /xss_result.txt
200216 cat ./$domain /$foldername /xss_result.txt | qsreplace -a | httpx -silent -threads 500 -mc 200 | dalfox pipe -S | tee ./$domain /$foldername /xss_raw_result.txt
201217 cat ./$domain /$foldername /xss_raw_result.txt | cut -d ' ' -f2 | tee ./$domain /$foldername /xss_result.txt; notify -bulk -data ./$domain /$foldername /xss_result.txt -silent
202218
203-
204219 # echo -e "${green}find sql injection with wayback ...${reset}"
205220 # python3 paramspider.py -d $domain -s TRUE -e woff,ttf,eot,css,js,png,svg,jpg | deduplicate --sort | httpx -silent | sqlmap
206221
@@ -216,20 +231,6 @@ vulnscanner(){
216231 # echo -e "${green}find dom xss with parameter pollution vulnerability ...${reset}"
217232 # cat ./$domain/$foldername/waybackurls.txt | httpx -silent | ppmap
218233
219- echo -e " ${green} Starting up listen server...${reset} "
220- interactsh-client -v & > ./$domain /$foldername /listen_server.txt & SERVER_PID=$!
221- sleep 5 # to properly start listen server
222- LISTENSERVER=$( tail -n 1 ./$domain /$foldername /listen_server.txt)
223- LISTENSERVER=$( echo $LISTENSERVER | cut -f2 -d ' ' )
224- echo " Listen server is up $LISTENSERVER with PID=$SERVER_PID "
225-
226-
227- echo -e " ${green} find SSRF vulnerability ...${reset} "
228- cat ./$domain /$foldername /waybackurls.txt | gf ssrf | qsreplace https://$LISTENSERVER | httpx -silent | tee ./$domain /$foldername /ssrf_url.txt
229- notify -bulk -data ./$domain /$foldername /ssrf_url.txt -silent
230-
231- # kill listen server
232- kill_listen_server
233234}
234235
235236
0 commit comments