Berguna Untuk Exploit Sebuah Data Base
apt update
apt upgrade
apt install git
apt install python
apt install php
git clone https://github.com/MrxMilzu/Exploit
cd Exploit
bash exploit.sh
- Admin Panel Finder
- Default Wordlist ( 12661 Lines )
- Custom Wordlist Can Be Useed
- Basice Information Scanner
- HTML Title
- IP Address
- HTTP Server
- Country
- CMS
- robots.txt Check
- phpmyadmin Check
- Reverse IP Domains Check
- Subdomains Enumerations
- Extract Links
- Website
- Images ( JPEG, PNG, GIF, WebP, BMP, SVG,... )
- Others ( PHP, HTML, CSS, JS,... )
- Bulk Domains To IP
- GOOGLE Dorking
- Mass CMS Detector
- Support CMS 10+
( WordPres, Joomla, OpenCart, Drupal, Magento, PrestaShop, Concrete5, Weebly, DokuWiki, Jekeyll )
- Support CMS 10+
- Mass HTTP Status Code Checker
- Reflected XSS BruteForce
- Default Wordlist ( 2248 Lines )
Custom Wordlist Can Be Used
- Reverse IP Domains Check
- Unlimited API
- SQL Injector
- WAF Bypass
- Error Based
Union Based
- Subdomains Enumerations
- Unlimited API
BruteForce With Wordlist
If webin on linux it's need root permission to install require packages
dependencies_pkg()
{
pkg=(grep curl dnsutils wget sed awk vim xxd)
for pkg in "${pkg[@]}";do
command -v $pkg >/dev/null 2>&1 || apt-get install $pkg -y
done
}