Skip to content
#

vulnerability-scanner

Here are 75 public repositories matching this topic...

asdfasadfasfa
asdfasadfasfa commented Mar 8, 2020

目前我的方法是拼接, 比如 http://www.A.com, 已知了两个路径: /path_a,/path_b
那么命令为: crawlergo -c chrome http://www.A.com/ http://www.A.com/path_a http://www.A.com/path_b

有两个问题:

  1. 如果已知路径比较多, 手工拼接比较麻烦
  2. 这种拼接传参的方法和分开一个个执行得到的结果是一样? 还是说有差别,没有进行验证.

当然后期能有参数支持多路径作为入口最好不过.

Originally posted by @djerrystyle in 0Kee-Team/crawlergo#31 (comment)

XVilka
XVilka commented Dec 13, 2019

I noticed you have a plugin for Ghidra, but it is not the only one FOSS tool available.
Radare2 is a highly-portable cross-platform reverse engineering framework and a toolkit without dependencies. It has support for analyzing binaries, disassembling code, debugging programs, attaching to remote GDB/LLDB, WinDbg servers, rich plugin system (see r2pm), an

arissploit

Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.

  • Updated Jun 2, 2020
  • Python

Improve this page

Add a description, image, and links to the vulnerability-scanner topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vulnerability-scanner topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.