Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Commit e25fe82

Browse filesBrowse files
authored
Fixed errors
1 parent 9fe03ff commit e25fe82
Copy full SHA for e25fe82

File tree

1 file changed

+11
-11
lines changed
Filter options

1 file changed

+11
-11
lines changed

‎magicrecon.sh

Copy file name to clipboardExpand all lines: magicrecon.sh
+11-11Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -223,17 +223,6 @@ vulnerabilities(){
223223
cat or_urls.txt | qsreplace "//google.com/" | httpx -silent -status-code -location
224224
cat or_urls.txt | qsreplace "//\google.com" | httpx -silent -status-code -location
225225

226-
printf "\n${GREEN}[+] Vulnerability: XSS${NORMAL}\n"
227-
printf "${NORMAL}${CYAN}Trying to find XSS vulnerabilities...${NORMAL}\n\n"
228-
gau $domain | gf xss | sed 's/=.*/=/' | sed 's/URL: //' | dalfox pipe -o xss.txt
229-
230-
printf "\n${GREEN}[+] Vulnerability: SQLi${NORMAL}\n"
231-
printf "${NORMAL}${CYAN}Finding SQLi entry points in the domain...${NORMAL}\n\n"
232-
gau $domain | gf sqli | tee sqli_paramaters.txt
233-
printf "\n"
234-
printf "${NORMAL}${CYAN}Checking if the entry points are vulnerable...${NORMAL}\n\n"
235-
sqlmap -m sqli --batch --random-agent --level 1
236-
237226
printf "\n${GREEN}[+] Vulnerability: SSRF${NORMAL}\n"
238227
printf "${NORMAL}${CYAN}Trying to find SSRF vulnerabilities...${NORMAL}\n\n"
239228
printf "${RED}[!] Remember to enter your Burp Collaborator link in the configuration.cfg file \n\n${NORMAL}"
@@ -247,6 +236,17 @@ vulnerabilities(){
247236
printf "${NORMAL}${CYAN}Searching enpoints in JS files...${NORMAL}\n\n"
248237
cat js.txt | grep -aoP "(?<=(\"|\'|\`))\/[a-zA-Z0-9_?&=\/\-\#\.]*(?=(\"|\'|\`))" | sort -u | tee endpoints.txt
249238

239+
printf "\n${GREEN}[+] Vulnerability: XSS${NORMAL}\n"
240+
printf "${NORMAL}${CYAN}Trying to find XSS vulnerabilities...${NORMAL}\n\n"
241+
gau $domain | gf xss | sed 's/=.*/=/' | sed 's/URL: //' | dalfox pipe -o xss.txt
242+
243+
printf "\n${GREEN}[+] Vulnerability: SQLi${NORMAL}\n"
244+
printf "${NORMAL}${CYAN}Finding SQLi entry points in the domain...${NORMAL}\n\n"
245+
gau $domain | gf sqli | tee sqli_paramaters.txt
246+
printf "\n"
247+
printf "${NORMAL}${CYAN}Checking if the entry points are vulnerable...${NORMAL}\n\n"
248+
sqlmap -m sqli_paramaters.txt --batch --random-agent --level 1
249+
250250
printf "\n${GREEN}[+] Vulnerability: Multiples vulnerabilities${NORMAL}\n"
251251
printf "${NORMAL}${CYAN}Running multiple templates to discover vulnerabilities...${NORMAL}\n\n"
252252
nuclei -u $domain -t ~/tools/nuclei-templates/ -severity low,medium,high,critical -silent -o mutiple_vulnerabilities.txt

0 commit comments

Comments
0 (0)
Morty Proxy This is a proxified and sanitized view of the page, visit original site.