File tree Expand file tree Collapse file tree 2 files changed +7
-5
lines changed Expand file tree Collapse file tree 2 files changed +7
-5
lines changed Original file line number Diff line number Diff line change 7
7
8
8
2.脚本中的target统一设置为` sys.argv[1] ` ,` sys.argv[1] ` 的值为目标url
9
9
10
- 3.github贡献插件地址为3xp10it项目的exps目录,也即 https://github.com/3xp10it/exp10it/tree/master/exps
10
+ 3.github贡献插件地址为3xp10it项目的exps目录,也即 [ 这里 ] [ 1 ]
11
11
12
12
```
13
13
# 目标url可为以下3种:
@@ -203,7 +203,7 @@ with futures.ThreadPoolExecutor(max_workers=15) as executor:
203
203
204
204
#### 0x04 已有插件列表
205
205
206
- 已有插件目录在[ 这里] [ 2 ] ,目前如下,最新列表以链接中具体情况为准
206
+ 已有插件目录在[ 这里] [ 1 ] ,目前如下,最新列表以链接中具体情况为准
207
207
208
208
```
209
209
cmdi ===> 命令注入漏洞
@@ -225,8 +225,8 @@ weblogic ===> weblogic反序列化漏洞
225
225
226
226
#### 0x05 其它
227
227
228
- 3xp10it框架存入数据相关结构(在编写插件时一般用不到)在[ 这里] [ 1 ]
228
+ 3xp10it框架存入数据相关结构(在编写插件时一般用不到)在[ 这里] [ 2 ]
229
229
230
230
231
- [ 1 ] : https://github.com/3xp10it/exp10it/blob /master/store.md
232
- [ 2 ] : https://github.com/3xp10it/exp10it/tree /master/exps
231
+ [ 1 ] : https://github.com/3xp10it/exp10it/tree /master/exps
232
+ [ 2 ] : https://github.com/3xp10it/exp10it/blob /master/store.md
Original file line number Diff line number Diff line change @@ -45,6 +45,7 @@ b)支持功能列表
45
45
- weblogic远程命令执行
46
46
- 命令注入漏洞
47
47
- 本地文件包含
48
+ - (最新列表在[ 这里] [ 2 ] )...
48
49
49
50
- 爬虫模块
50
51
- 目标网站脚本类型检测
@@ -268,3 +269,4 @@ A2:要保证能直接ping通google证明可以绕过GFW,有些domain不连vpn会
268
269
```
269
270
270
271
[ 1 ] : develop.md
272
+ [ 2 ] : https://github.com/3xp10it/exp10it/tree/master/exps
You can’t perform that action at this time.
0 commit comments