mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-06 04:52:22 -07:00
This commit refactors ARP and DHCP poisoning:
DHCP poisoning now works on Windows, additionaly it's been optimized for performance improvements ARP poisoning has been optimized with and internal cache and some algo improvements cve-details-parser.py has been added to the utils/ directory to help adding exploits to the BrowserSniper config file I'm currently working on adding to the filepwn plugin all of the missing options that bdfproxy stand-alone has
This commit is contained in:
parent
5e2f30fb89
commit
ba14ed8687
35 changed files with 1082 additions and 676 deletions
32
tools/cve-details-parser.py
Executable file
32
tools/cve-details-parser.py
Executable file
|
@ -0,0 +1,32 @@
|
|||
#! /usr/bin/env python2
|
||||
|
||||
import requests
|
||||
import lxml.html
|
||||
import sys
|
||||
|
||||
r = requests.get(sys.argv[1])
|
||||
tree = lxml.html.fromstring(r.text)
|
||||
|
||||
try:
|
||||
|
||||
vulntable = tree.xpath('//table[@id="vulnprodstable"]/*')
|
||||
list_len = len(vulntable)
|
||||
|
||||
tuple_list = []
|
||||
|
||||
for i in vulntable[2:list_len]:
|
||||
java_v = (i.getchildren()[4].text.strip(), i.getchildren()[5].text.strip()[6:].strip())
|
||||
tuple_list.append(java_v)
|
||||
|
||||
except IndexError:
|
||||
pass
|
||||
|
||||
string_list = []
|
||||
for v in sorted(set(tuple_list)):
|
||||
version, update = v
|
||||
if update:
|
||||
string_list.append("{}.{}".format(version, update))
|
||||
else:
|
||||
string_list.append(version)
|
||||
|
||||
print ', '.join(string_list)
|
Loading…
Add table
Add a link
Reference in a new issue