cheetah icon indicating copy to clipboard operation
cheetah copied to clipboard

a very fast brute force webshell password tool

Results 6 cheetah issues
Sort by recently updated
recently updated
newest added

寻求一款可以自动实现扫描获取webshell,不求指定目标

已经测试了php和asp的shell,而且密码已经手工测试过,即使只将已知密码写入新的字典(只有这1条密码),也无法发现。更换get、post方式都无效。

Traceback (most recent call last): File "cheetah.py", line 547, in main() File "cheetah.py", line 528, in main attack_res = dict_attack(options) File "cheetah.py", line 340, in dict_attack if detect_web(options) == 'error':...

是不是加一个post传输参数的大门爆破呢!比如某大马m=admin,admin是密码会变话,admin就可以设置成字典,但是m,m可以有用户,或者自动获取m