Skip to content

Commit c50af96

Browse files
author
root
committed
1 parent 7bcb639 commit c50af96

28 files changed

+71
-80
lines changed

CHANGELOG.md

+2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
## CHANGELOG:
2+
* v9.1 - Updated Nuclei sc0pe templates
3+
* v9.1 - Fixed issue with Nuclei sc0pe parsers not working
24
* v9.1 - Fixed issue with GAU installer/commmand not working
35
* v9.1 - Fixed issue with passive URL fetching
46
* v9.1 - Fixed issue with nuclei not being installed

README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
[![](https://sn1persecurity.com/wordpress/wp-content/uploads/2022/05/Sn1per-Enterprise-workspace-navigator1-3.png)](https://sn1persecurity.com/)
1717

1818
## The ultimate pentesting toolkit.
19-
See how Sn1per can help your security team
19+
Integrate with the leading commercial and open source vulnerability scanners to scan for the latest CVEs and vulnerabilities.
2020

2121
[![](https://sn1persecurity.com/wordpress/wp-content/uploads/2022/05/Sn1per-Enterprise-workspace-report1-3.png)](https://sn1persecurity.com/)
2222

@@ -26,7 +26,7 @@ Security tools are expensive and time-consuming, but with Sn1per, you can save t
2626
[![](https://sn1persecurity.com/wordpress/wp-content/uploads/2022/05/Sn1per-Enterprise-host-list3-1.png)](https://sn1persecurity.com/)
2727

2828
### Find what you can't see.
29-
Hacking is a problem that's only getting worse. But, with Sn1per, you can find what you can’t see—hidden assets and vulnerabilities in your environment. Integrate with the leading commercial and open source vulnerability scanners to scan for the latest CVEs and vulnerabilities. Find out quickly how hackers can attack your business or organization before it’s too late.
29+
Hacking is a problem that's only getting worse. But, with Sn1per, you can find what you can’t see—hidden assets and vulnerabilities in your environment.
3030

3131
[![](https://sn1persecurity.com/wordpress/wp-content/uploads/2022/05/Sn1per-Enterprise-host-list2-1.png)](https://sn1persecurity.com/)
3232

modes/webporthttp.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -347,7 +347,7 @@ if [[ "$MODE" = "webporthttp" ]]; then
347347
echo -e "${OKGREEN}====================================================================================${RESET}•x${OKGREEN}[`date +"%Y-%m-%d](%H:%M)"`${RESET}x•"
348348
echo -e "$OKRED RUNNING NUCLEI SCAN $RESET"
349349
echo -e "${OKGREEN}====================================================================================${RESET}•x${OKGREEN}[`date +"%Y-%m-%d](%H:%M)"`${RESET}x•"
350-
nuclei -silent -t /usr/share/sniper/plugins/nuclei-templates/ -c $THREADS -target http://$TARGET:${PORT} -o $LOOT_DIR/web/nuclei-http-${TARGET}-port${PORT}.txt
350+
nuclei -silent -t /root/nuclei-templates/ -c $THREADS -target http://$TARGET:${PORT} -o $LOOT_DIR/web/nuclei-http-${TARGET}-port${PORT}.txt
351351
fi
352352
SSL="false"
353353
source $INSTALL_DIR/modes/web_autopwn.sh

modes/webporthttps.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -356,7 +356,7 @@ if [[ "$MODE" = "webporthttps" ]]; then
356356
echo -e "${OKGREEN}====================================================================================${RESET}•x${OKGREEN}[`date +"%Y-%m-%d](%H:%M)"`${RESET}x•"
357357
echo -e "$OKRED RUNNING NUCLEI SCAN $RESET"
358358
echo -e "${OKGREEN}====================================================================================${RESET}•x${OKGREEN}[`date +"%Y-%m-%d](%H:%M)"`${RESET}x•"
359-
nuclei -silent -t /usr/share/sniper/plugins/nuclei-templates/ -c $THREADS -target https://$TARGET:${PORT} -o $LOOT_DIR/web/nuclei-https-${TARGET}-port${PORT}.txt
359+
nuclei -silent -t /root/nuclei-templates/ -c $THREADS -target https://$TARGET:${PORT} -o $LOOT_DIR/web/nuclei-https-${TARGET}-port${PORT}.txt
360360
fi
361361
cd $INSTALL_DIR
362362
SSL="true"

templates/active/Apache_Tomcat_Scanner.sh

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@ AUTHOR='@xer0dayz'
22
VULN_NAME='Apache Tomcat Detected'
33
URI='/404_DOES_NOT_EXIST'
44
METHOD='GET'
5-
MATCH="Apache\ Tomcat"
5+
MATCH="Apache\ Tomcat\/[0-9]?[0-9]\.[0-9]?[0-9]\.[0-9]?[0-9]"
66
SEVERITY='P5 - INFO'
77
CURL_OPTS="--user-agent '' -s -L --insecure"
88
SECONDARY_COMMANDS=''
9-
GREP_OPTIONS='-i'
9+
GREP_OPTIONS='-o'

templates/active/PHP_Info.sh

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@ AUTHOR='@xer0dayz'
22
VULN_NAME='PHP Info Detected 1'
33
URI='/phpinfo.php'
44
METHOD='GET'
5-
MATCH='PHP Version '
5+
MATCH='>PHP Version \<'
66
SEVERITY='P4 - LOW'
77
CURL_OPTS="--user-agent '' -s -L --insecure"
88
SECONDARY_COMMANDS=''
9-
GREP_OPTIONS='-i'
9+
GREP_OPTIONS='-e'

templates/active/VMware_vCenter_Unauthenticated_Arbitrary_File_Read.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ AUTHOR='@xer0dayz'
22
VULN_NAME='VMware vCenter Unauthenticated Arbitrary File Read'
33
URI='/eam/vib?id=C:\\ProgramData\\VMware\\vCenterServer\\cfg\\vmware-vpx\\vcdb.properties'
44
METHOD='GET'
5-
MATCH="dbtype|password\.ecrypted"
5+
MATCH="dbtype\ |password\.ecrypted"
66
SEVERITY='P2 - HIGH'
77
CURL_OPTS="--user-agent '' -s -L --insecure"
88
SECONDARY_COMMANDS=''

templates/passive/network/Interesting_Domain_Found.sh

+3-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Interesting Domain Found'
3-
FILENAME="$LOOT_DIR/domains/domains-all-sorted_NA.txt"
4-
MATCH='admin|dev|portal|stage|prod|tst|test'
3+
echo "$TARGET" > /tmp/target
4+
FILENAME="/tmp/target"
5+
MATCH="admin|dev|portal|stage|prod|tst|test"
56
SEVERITY='P5 - INFO'
67
GREP_OPTIONS='-i'
78
SEARCH='positive'

templates/passive/network/Possible_Takeover_Detected.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Possible Takeover Detected'
33
FILENAME="$LOOT_DIR/nmap/takeovers-$TARGET.txt"
4-
MATCH='netlify|wordpress|instapage|heroku|github|bitbucket|squarespace|fastly|feed|fresh|ghost|helpscout|helpjuice|instapage|pingdom|surveygizmo|teamwork|tictail|shopify|desk|teamwork|unbounce|helpjuice|helpscout|pingdom|tictail|campaign|monitor|cargocollective|statuspage|tumblr|amazon|hubspot|modulus|unbounce|uservoice|wpengine|cloudapp'
4+
MATCH='anima|bitly|wordpress|instapage|heroku|github|bitbucket|squarespace|fastly|feed|fresh|ghost|helpscout|helpjuice|instapage|pingdom|surveygizmo|teamwork|tictail|shopify|desk|teamwork|unbounce|helpjuice|helpscout|pingdom|tictail|campaign|monitor|cargocollective|statuspage|tumblr|amazon|hubspot|cloudfront|modulus|unbounce|uservoice|wpengine|cloudapp|azure|trafficmanager|netifly|brandpa'
55
SEVERITY='P5 - INFO'
66
GREP_OPTIONS='-i'
77
SEARCH='positive'

templates/passive/network/recursive/Component_With_Known_Vulnerabilities_-_NMap.sh

+1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Component With Known Vulnerabilities - NMap'
33
FILENAME="$LOOT_DIR/nmap/nmap-$TARGET.txt $LOOT_DIR/output/nmap-$TARGET.txt $LOOT_DIR/output/nmap-$TARGET-*.txt"
4+
OUTPUT_NAME=$(echo $VULN_NAME | sed -E 's/[^[:alnum:]]+/_/g')
45
MATCH="vulners.com"
56
GREP_OPTIONS='-ih'
67
TYPE="network"
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,23 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Interesting Ports Found'
33
FILENAME="$LOOT_DIR/nmap/ports-$TARGET.txt"
4-
MATCH="21\ |22\ |23\ |137\ |139\ |445\ |8080\ |8443\ |3306\ |5900\ |53\ |8081\ "
4+
MATCH="21\ |22\ |23\ |137\ |139\ |445\ |8080\ |8443\ |3306\ |5900\ |53\ |8081\ |5432\ "
55
SEVERITY='P5 - INFO'
66
GREP_OPTIONS='-i'
77
SECONDARY_COMMANDS=''
88
OUTPUT_NAME=$(echo $VULN_NAME | sed -E 's/[^[:alnum:]]+/_/g')
99
TYPE='network'
1010

1111
rm -f /tmp/match.out 2> /dev/null
12-
rm -f "$LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt" 2> /dev/null
13-
cat $FILENAME 2> /dev/null | egrep $GREP_OPTIONS "$MATCH" $SECONDARY_COMMANDS 2> /dev/null >/tmp/match.out && echo "$SEVERITY, $VULN_NAME, $TARGET, $(cat /tmp/match.out | tr '\n' ' ' | sed -r "s/</\&lh\;/g")" 2> /dev/null | tee -a "$LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt" 2> /dev/null && /bin/bash "$INSTALL_DIR/bin/slack.sh" "[sn1persecurity.com] •?((¯°·._.• [+] [$SEVERITY] $VULN_NAME - $TARGET - EVIDENCE: $(cat /tmp/match.out | tr '\n' ' ') (`date +"%Y-%m-%d %H:%M"`) •._.·°¯))؟•" && echo "[sn1persecurity.com] •?((¯°·._.• [+] [$SEVERITY] $VULN_NAME - $TARGET - EVIDENCE: $(cat /tmp/match.out | tr '\n' ' ' | sed -r "s/</\&lh\;/g") (`date +"%Y-%m-%d %H:%M"`) •._.·°¯))؟•" >> $LOOT_DIR/scans/notifications.txt || rm -f "$LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt" 2> /dev/null
12+
cat $FILENAME 2> /dev/null | egrep $GREP_OPTIONS "$MATCH" $SECONDARY_COMMANDS 2> /dev/null | head -n 1 2> /dev/null > /tmp/match.out
13+
14+
CHARS="$(wc -c /tmp/match.out 2> /dev/null | awk '{print $1}' 2> /dev/null)"
15+
if [[ $CHARS > 0 ]]; then
16+
echo "$SEVERITY, $VULN_NAME, $TARGET, $(cat /tmp/match.out 2> /dev/null)" | tee "$LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt" 2> /dev/null
17+
# /bin/bash "$INSTALL_DIR/bin/slack.sh" "[+] [$SEVERITY] $VULN_NAME - $TARGET - EVIDENCE: $(cat /tmp/match.out | tr '\n' ' ') (`date +"%Y-%m-%d %H:%M"`) •._.·°¯))؟•"
18+
#echo "•?((¯°·._.• [+] [$SEVERITY] $VULN_NAME - $TARGET - EVIDENCE: $(cat /tmp/match.out) (`date +"%Y-%m-%d %H:%M"`) •._.·°¯))؟•" >> $LOOT_DIR/scans/notifications_new.txt
19+
else
20+
rm -f "$LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt" 2> /dev/null
21+
fi
22+
1423
rm -f /tmp/match.out 2> /dev/null

templates/passive/network/recursive/Nessus_Import.sh

-14
This file was deleted.

templates/passive/web/Autocomplete_Enabled.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Autocomplete Enabled'
3-
FILENAME="$LOOT_DIR/web/websource-$TARGET-*.txt"
3+
FILENAME="$LOOT_DIR/web/websource-htt*-$TARGET-*.txt"
44
MATCH='autocomplete=\"on\"'
55
SEVERITY='P4 - LOW'
66
GREP_OPTIONS='-i'

templates/passive/web/CORS_Policy_-_Allow-Credentials_Enabled.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='CORS Policy - Allow-Credentials Enabled'
3-
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET.txt"
3+
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
44
MATCH='Access-Control-Allow-Credentials: true'
55
SEVERITY='P4 - LOW'
66
GREP_OPTIONS='-i'

templates/passive/web/CORS_Policy_-_Allow-Origin_Wildcard.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='CORS Policy - Allow-Origin Wildcard'
3-
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET.txt"
3+
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
44
MATCH='Access-Control-Allow-Origin: *'
55
SEVERITY='P4 - LOW'
66
GREP_OPTIONS='-i'
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,10 @@
11
if [ "$SSL" = "false" ]; then
22
AUTHOR='@xer0dayz'
33
VULN_NAME='Clear-Text Protocol - HTTP'
4-
FILENAME="$LOOT_DIR/web/headers-http-$TARGET.txt"
4+
FILENAME="$LOOT_DIR/web/headers-http-$TARGET-*.txt"
55
MATCH="200\ OK"
66
SEVERITY='P2 - HIGH'
77
GREP_OPTIONS='-i'
88
SEARCH='positive'
99
SECONDARY_COMMANDS=''
10-
else
11-
break
1210
fi

templates/passive/web/Drupal_Detected.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Drupal Detected'
3-
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET.txt"
3+
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
44
MATCH="X\-Generator\:\ Drupal\ "
55
SEVERITY='P5 - INFO'
66
GREP_OPTIONS='-i'

templates/passive/web/Expired_SSL_Certificate.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Expired SSL Certificate'
3-
FILENAME="$LOOT_DIR/web/curldebug-$TARGET.txt"
3+
FILENAME="$LOOT_DIR/web/curldebug-$TARGET-*.txt"
44
MATCH='certificate has expired'
55
SEVERITY='P3 - MEDIUM'
66
GREP_OPTIONS=''

templates/passive/web/Fortinet_FortiGate_SSL_VPN_Panel_Passive_Detection.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Fortinet FortiGate SSL VPN Panel Passive Detection'
3-
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET.txt"
3+
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
44
MATCH="Server\:\ xxxxxxxx-xxxxx"
55
SEVERITY='P5 - INFO'
66
GREP_OPTIONS='-i'

templates/passive/web/Insecure_Cookie_-_HTTPOnly_Not_Set.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Insecure Cookie - HTTPOnly Not Set'
3-
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET.txt"
3+
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
44
MATCH='Set-Cookie'
55
SEVERITY='P3 - MEDIUM'
66
GREP_OPTIONS='-i'

templates/passive/web/Insecure_Cookie_-_Secure_Not_Set.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Insecure Cookie - Secure Not Set'
3-
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET.txt"
3+
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
44
MATCH='Set-Cookie'
55
SEVERITY='P3 - MEDIUM'
66
GREP_OPTIONS='-i'
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,8 @@
1-
if [ "$SSL" = "true" ]; then
2-
AUTHOR='@xer0dayz'
3-
VULN_NAME='Weak SSL TLS Protocols'
4-
FILENAME="$LOOT_DIR/web/sslscan-$TARGET.txt"
5-
MATCH=' SSLv'
6-
SEVERITY='P2 - HIGH'
7-
GREP_OPTIONS='-i'
8-
SEARCH='positive'
9-
SECONDARY_COMMANDS=''
10-
fi
1+
AUTHOR='@xer0dayz'
2+
VULN_NAME='Weak SSL TLS Protocols'
3+
FILENAME="$LOOT_DIR/web/sslscan-$TARGET.txt $LOOT_DIR/web/sslscan-$TARGET-*.txt"
4+
MATCH="SSLv* enabled"
5+
SEVERITY='P2 - HIGH'
6+
GREP_OPTIONS='-i'
7+
SEARCH='positive'
8+
SECONDARY_COMMANDS=''
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,9 @@
1-
if [ "$SSL" = "true" ]; then
2-
AUTHOR='@xer0dayz'
3-
VULN_NAME='Insecure SSL TLS Connection CN Mismatch'
4-
FILENAME="$LOOT_DIR/web/curldebug-$TARGET.txt"
5-
MATCH='failed to verify the legitimacy of the server'
6-
SEVERITY='P3 - MEDIUM'
7-
GREP_OPTIONS='-i'
8-
SEARCH='positive'
9-
SECONDARY_COMMANDS=''
10-
URI="/"
11-
else
12-
break
13-
fi
1+
AUTHOR='@xer0dayz'
2+
VULN_NAME='Insecure SSL TLS Connection CN Mismatch'
3+
FILENAME="$LOOT_DIR/web/curldebug-$TARGET.txt"
4+
MATCH='failed to verify the legitimacy of the server'
5+
SEVERITY='P3 - MEDIUM'
6+
GREP_OPTIONS='-i'
7+
SEARCH='positive'
8+
SECONDARY_COMMANDS=''
9+
URI="/"

templates/passive/web/Interesting_Title_Found.sh

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='Interesting Title Found'
3-
FILENAME="$LOOT_DIR/web/title-htt*-$TARGET.txt"
4-
MATCH='admin|dev|portal'
3+
FILENAME="$LOOT_DIR/web/title-htt*-$TARGET-*.txt"
4+
MATCH='admin|dev|portal|login|sign|signup|registration|account'
55
SEVERITY='P5 - INFO'
66
GREP_OPTIONS='-i'
77
SEARCH='positive'

templates/passive/web/Server_Header_Disclosure.sh

+4-4
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
if [ "$SSL" = "false" ]; then
22
AUTHOR='@xer0dayz'
33
VULN_NAME='Server Header Disclosure - HTTP'
4-
FILENAME="$LOOT_DIR/web/headers-http-$TARGET.txt"
4+
FILENAME="$LOOT_DIR/web/headers-http-$TARGET-*.txt"
55
MATCH="Server\:"
6-
SEVERITY='P4 - LOW'
6+
SEVERITY='P5 - INFO'
77
GREP_OPTIONS='-i'
88
SEARCH='positive'
99
SECONDARY_COMMANDS=''
1010
else
1111
AUTHOR='@xer0dayz'
1212
VULN_NAME='Server Header Disclosure - HTTPS'
13-
FILENAME="$LOOT_DIR/web/headers-https-$TARGET.txt"
13+
FILENAME="$LOOT_DIR/web/headers-https-$TARGET-*.txt"
1414
MATCH="Server\:"
15-
SEVERITY='P4 - LOW'
15+
SEVERITY='P5 - INFO'
1616
GREP_OPTIONS='-i'
1717
SEARCH='positive'
1818
SECONDARY_COMMANDS=''

templates/passive/web/X-Powered-By_Header_Found.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AUTHOR='@xer0dayz'
22
VULN_NAME='X-Powered-By Header Found'
3-
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET.txt"
3+
FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
44
MATCH='X-Powered-By'
55
SEVERITY='P5 - INFO'
66
GREP_OPTIONS='-i'

templates/passive/web/recursive/Nuclei_Vulnerability_Scan_-_HTTP.sh

+5-5
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,14 @@ GREP_OPTIONS='-ih'
66

77
rm -f $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
88
MATCH="\[critical\]"
9-
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P1 - CRITICAL, Nuclei Vulnerability Scan, " $3 ", " $6}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
9+
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P1 - CRITICAL, Nuclei Vulnerability Scan, " $1 ", " $4 " " $5 " " $6 " " $7 " " $8 " " $9 " " $10 " " $11 " " $12 " " $13 " " $14 " " $15 " " $16 " " $17 " " $18 " " $19 " " $20 " " $21 " " $22 " " $23 " " $24 " " $25}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
1010
MATCH="\[high\]"
11-
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P2 - HIGH, Nuclei Vulnerability Scan, " $3 ", " $6}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
11+
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P2 - HIGH, Nuclei Vulnerability Scan, " $1 ", " $4 " " $5 " " $6 " " $7 " " $8 " " $9 " " $10 " " $11 " " $12 " " $13 " " $14 " " $15 " " $16 " " $17 " " $18 " " $19 " " $20 " " $21 " " $22 " " $23 " " $24 " " $25}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
1212
MATCH="\[medium\]"
13-
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P3 - MEDIUM, Nuclei Vulnerability Scan, " $3 ", " $6}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
13+
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P3 - MEDIUM, Nuclei Vulnerability Scan, " $1 ", " $4 " " $5 " " $6 " " $7 " " $8 " " $9 " " $10 " " $11 " " $12 " " $13 " " $14 " " $15 " " $16 " " $17 " " $18 " " $19 " " $20 " " $21 " " $22 " " $23 " " $24 " " $25}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
1414
MATCH="\[low\]"
15-
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P4 - LOW, Nuclei Vulnerability Scan, " $3 ", " $6}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
15+
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P4 - LOW, Nuclei Vulnerability Scan, " $1 ", " $4 " " $5 " " $6 " " $7 " " $8 " " $9 " " $10 " " $11 " " $12 " " $13 " " $14 " " $15 " " $16 " " $17 " " $18 " " $19 " " $20 " " $21 " " $22 " " $23 " " $24 " " $25}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
1616
MATCH="\[info\]"
17-
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P5 - INFO, Nuclei Vulnerability Scan, " $3 ", " $6}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
17+
egrep "$GREP_OPTIONS" "$MATCH" $FILENAME 2> /dev/null | awk -v AWK_TARGET="$TARGET" '$50=AWK_TARGET{print "P5 - INFO, Nuclei Vulnerability Scan, " $1 ", " $4 " " $5 " " $6 " " $7 " " $8 " " $9 " " $10 " " $11 " " $12 " " $13 " " $14 " " $15 " " $16 " " $17 " " $18 " " $19 " " $20 " " $21 " " $22 " " $23 " " $24 " " $25}' 2> /dev/null >> $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null
1818

1919
cat $LOOT_DIR/vulnerabilities/sc0pe-$TARGET-$OUTPUT_NAME.txt 2> /dev/null

0 commit comments

Comments
 (0)