/Exploit

Berguna Untuk Exploit Sebuah Data Base

Primary LanguageShell

Exploit

Berguna Untuk Exploit Sebuah Data Base

INSTALATION

apt update
apt upgrade
apt install git
apt install python
apt install php
git clone https://github.com/MrxMilzu/Exploit
cd Exploit
bash exploit.sh

Avaliable Tools

  • Admin Panel Finder
    • Default Wordlist ( 12661 Lines )
    • Custom Wordlist Can Be Useed
  • Basice Information Scanner
    • HTML Title
    • IP Address
    • HTTP Server
    • Country
    • CMS
    • robots.txt Check
    • phpmyadmin Check
    • Reverse IP Domains Check
    • Subdomains Enumerations
    • Extract Links
      • Website
      • Images ( JPEG, PNG, GIF, WebP, BMP, SVG,... )
      • Others ( PHP, HTML, CSS, JS,... )
  • Bulk Domains To IP
    • GOOGLE Dorking
  • Mass CMS Detector
    • Support CMS 10+ ( WordPres, Joomla, OpenCart, Drupal, Magento, PrestaShop, Concrete5, Weebly, DokuWiki, Jekeyll )
  • Mass HTTP Status Code Checker
  • Reflected XSS BruteForce
    • Default Wordlist ( 2248 Lines )
    • Custom Wordlist Can Be Used
  • Reverse IP Domains Check
    • Unlimited API
  • SQL Injector
    • WAF Bypass
    • Error Based
    • Union Based
  • Subdomains Enumerations
    • Unlimited API
    • BruteForce With Wordlist

If webin on linux it's need root permission to install require packages

Dependencies Packages

dependencies_pkg()
{
    pkg=(grep curl dnsutils wget sed awk vim xxd)
        for pkg in "${pkg[@]}";do
            command -v $pkg >/dev/null 2>&1 || apt-get install $pkg -y
        done
}

Workflow of Webin