This script automates the process of fetching potential file and directory names based on partial names output by a shortscanning tool for Microsoft IIS Tilde vulnerability. It uses a Selenium-driven Chrome browser to perform searches on GitHub.
- Automates Chrome driver installation.
- Uses a logged-in Chrome profile for authenticated GitHub searches.
- Semi-automated fetching of potential file and directory names from GitHub.
- Supports silent mode to suppress banner output.
-
Clone the repository or download the script.
-
Install the required Python packages:
pip install -r requirements.txt
or
pip install chromedriver-autoinstaller selenium selenium-wire
python gsnw.py <search_query> [output_file] [-silent]
<search_query>: The search query to use for GitHub code search.
[output_file]: (Optional) The output file to save the results.
-silent: (Optional) Suppress the banner.
python script.py sapmai output.txt -silent
This will search for "sapmai" in GitHub code and save the results to output.txt without displaying the banner.
Ensure you are logged in to GitHub on the specified Chrome profile for authenticated searches.
The script currently runs in headless mode by default. If you need to see the browser actions, you can comment out the --headless argument in the chrome_options setup.
This script is provided "as is" without any warranties. Use it at your own risk. Author
Find me on X (Twitter) @retkoussa