#Tools Scanner Shell #!/usr/bin/python # -*- coding: utf-8 -* import requests, re ,os ,socket,sys,random,time from colorama import init from multiprocessing.dummy import Pool from colorama import Fore import warnings import subprocess from requests.packages.urllib3.exceptions import InsecureRequestWarning warnings.simplefilter('ignore',InsecureRequestWarning) reload(sys) sys.setdefaultencoding('utf8') init(autoreset=True) def Banner(): host_name = socket.gethostname() host_ip = socket.gethostbyname(host_name) print "===================================================" print Fore.RED + "[!] Contact : " + Fore.WHITE+"Cx99" print Fore.RED + "[!] Host : " + Fore.WHITE+"Cx99@"+host_name print Fore.RED + "[!] LocalHost : " + Fore.WHITE + host_ip print "===================================================" Banner() def mek(url): try: Headers = {'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/72.0'} file = open("path.txt") # read all content content = file.read().splitlines() for line in content: kontol = requests.get(url+line,headers=Headers, timeout=5) if '-rw-r--r' in kontol.content or 'drwxr-xr-x' in kontol.text: print(url + Fore.GREEN + ' ' +'Vuln' + Fore.WHITE) open('shelo.txt','a').write(url+line+"\n") elif '' in kontol.content: open('shelo.txt','a').write(url+line+"\n") else: print(url + Fore.RED + ' ' + 'Not Vuln' + Fore.WHITE) open('domainalive.txt','a').write(url+"\n") except: pass def Main(): try: list = raw_input("\n\033[91mDomain List\033[97m:~# \033[97m") che = open(list, 'r').read().splitlines() pp = Pool(50) pr = pp.map(mek, che) except: pass if __name__ == '__main__': Main()