Познакомьтесь с пентестом веб-приложений на практике в нашем новом бесплатном курсе
global b
d = " "
for i in data:
b = data[i]
c = i+": "+data[i]
d = d+c+', '
with open('proxy.txt', 'a') as f...
import requests
from bs4 import BeautifulSoup
if __name__ == '__main__':
main()
import time
import sys
from colorama import init
init()
class Bcolors:
GN = '\033[32m' # green
for i in ['.########', '.##.....##', '.########.', '.##.......', '..#######.', '.########.', '.########', '.########.']:
print(Bcolors.GN + i, end='')
sys.stdout.flush()
time.sleep(0.2)
print('\t')
for x in ['.##......', '..##...##.', '.##.....##', '.##.......', '.##.....##', '.##.....##', '.##......', '.##.....##']:
print(x, end='')
sys.stdout.flush()
time.sleep(0.2)
print('\t')
for i in ['.##......', '...##.##..', '.##.....##', '.##.......', '.##.....##', '.##.....##', '.##......', '.##.....##']:
print(i, end='')...
from subprocess import check_output
import argparse
from termcolor import *
import colorama
colorama.init()
parser = argparse.ArgumentParser(description='Find vuln PO')
parser.add_argument('-vs', help ='Vuln version PO')
parser.add_argument('-nm', help ='PO Name')
args = parser.parse_args()
vulnvers = args.vs
namepo = args.nm
count = 0
count2 = 0
s = []
s2 = []
a = check_output(["wmic"...
import requests
import random
import glob
import os
import shutil
site = []
files = []
handle = open('sites.txt') # Читаем файл
for x in handle: #Записуем содержимое файла в список
site.append(x)
site = map(lambda s: s.strip(), site) # Удаляем из списка \n
site = list(site) #...
# -*- coding:utf -8 -*-
#!/usr/bin/python3
import random
chars = '+-/*!&$#?=@<>abcdefghijklnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890'
number = input('количество паролей?'+ "\n")
length = input('длина пароля?'+ "\n")
number = int(number)
length = int(length)