Tools for check pocs vulnerabilities
poc:
- module: metadata
parameter:
cvss: 1
author: Author
- name: Name
description: Description
module: http
parameter:
url: 'https://google.com/'
method: GET
headers:
User-Agent: Firefox
expect_response_code: 200
time: 2017-11-15
case: 100
cd cmd/
go run main.go -f test.yaml
You receive answer in bool format
You can use -v flag for additional information with req and resp header and body:
Loaded file: test.yaml
Result 0
test №1 Yandex
Author:Makhinov Alex
CVSS:1.000000
--//--
P.S. This project was developed for backward compatibility with the project explo, but with some updates like one session with cookie in Jar between 2 query in one yaml-rule.
TODO:
-
- Add all functional from explo-tool
-
- Add selenium module for complicated request