-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathMain.py
More file actions
72 lines (68 loc) · 2.1 KB
/
Main.py
File metadata and controls
72 lines (68 loc) · 2.1 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
""" this is representing a simple drawing for the user beauty """
# this is used basically to call the SQL injection all the modules
import SqlInjection
import xss
import InputRandomVariable
from colorama import Fore, Back, Style
print(Fore.RED)
print(Back.BLACK)
print(Style.BRIGHT)
f = open('character.txt','r')
file_content = f.read()
print(file_content)
print(Style.RESET_ALL)
f.close()
print(Fore.GREEN)
print(Back.BLACK)
f = open('character2.txt','r')
file_content = f.read()
print(file_content)
f.close()
print(Back.BLACK)
print(Fore.LIGHTGREEN_EX)
print("Welcome!! BUG is scanning tool for endpoints!\n")
print("Be Careful \n")
print(Fore.WHITE)
print("press -h for more info")
task = input()
while task != "q":
if task == "-h":
print("\n")
print(Fore.LIGHTGREEN_EX +"------------------------------------------------------------------")
print(Fore.WHITE)
print("BUG open source tool created to scan endpoints for vulnerubilities")
print("-h: more inforamtion\n")
print(Fore.LIGHTRED_EX)
print("[command][endpoint]")
print(Fore.WHITE)
print("command:")
print(Fore.LIGHTRED_EX)
print("-s")
print(Fore.WHITE + ":SQl Injection scan")
print(Fore.LIGHTRED_EX)
print("-x")
print(Fore.WHITE + ":XSS scan")
print(Fore.LIGHTRED_EX)
print("-i")
print(Fore.WHITE + ":Random input scan\n")
print("q: exit the tool")
print("-h: more inforamtion\n")
task = input()
elif task[:2] == "-s":
print(Fore.LIGHTGREEN_EX +"[+]running SQL injection ")
print(Fore.WHITE)
url = task[3:]
SqlInjection.scan_sql_injection(url)
task = input()
elif task[:2] == "-x":
print(Fore.LIGHTGREEN_EX + "[+]running Cross Site Scripting")
print(Fore.WHITE)
url = task[3:]
xss.scan_xss(url)
task = input()
elif task[:2] == "-i":
print(Fore.LIGHTGREEN_EX + "[+]running Random input scan")
print(Fore.WHITE)
url = task[3:]
InputRandomVariable.scan_IRV(url)
task = input()