Skip to content

Commit

Permalink
Merge pull request #43 from 0xInfection/dev
Browse files Browse the repository at this point in the history
Ready for a new release
  • Loading branch information
0xInfection committed Jan 29, 2020
2 parents 25ddab6 + c723e75 commit 03b9a9b
Show file tree
Hide file tree
Showing 4 changed files with 10 additions and 9 deletions.
11 changes: 6 additions & 5 deletions xsrfprobe/core/main.py
Original file line number Diff line number Diff line change
Expand Up @@ -103,12 +103,12 @@ def Engine(): # lets begin it!
# Implementing the first mode. [NO CRAWL]
if not CRAWL_SITE:
url = web
response = Get(url).text
try:
verbout(O,'Trying to parse response...')
response = Get(url).text
verbout(O, 'Trying to parse response...')
soup = BeautifulSoup(response) # Parser init
except HTMLParser.HTMLParseError:
verbout(R,'BeautifulSoup Error: '+url)
except AttributeError:
verbout(R, 'No response received, site probably down: '+url)
i = 0 # Init user number
if REFERER_ORIGIN_CHECKS:
# Referer Based Checks if True...
Expand Down Expand Up @@ -302,7 +302,8 @@ def Engine(): # lets begin it!
GetLogger() # The scanning has interrupted, so now we can log out all the links ;)
sys.exit(1)
except Exception as e:
print('\n'+R+'Encountered an error. \n'+R+'Please view the error log files to view what went wrong.')
print('\n'+R+'Encountered an error. \n')
print(R+'Please view the error log files to view what went wrong.')
verbout(R, e.__str__())
ErrorLogger(url, e)
GetLogger()
2 changes: 1 addition & 1 deletion xsrfprobe/files/paramlist.py
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,6 @@
'auth',
'hash',
'secret',
'timestamp',
'verify',
)

Expand Down Expand Up @@ -84,6 +83,7 @@
'not valid',
'please check your request',
'your browser did something unexpected',
'csrf'
'clearing your cookies',
'tampered token',
'null',
Expand Down
4 changes: 2 additions & 2 deletions xsrfprobe/modules/Checkpost.py
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ def PostBased(url, r1, r2, r3, m_action, result, genpoc, form, m_name=''):
# If --malicious has been supplied
if GEN_MALICIOUS:
# Generates a malicious CSRF form
GenMalicious(m_action, genpoc.__str__())
GenMalicious(url, genpoc.__str__())
else:
# Generates a normal PoC
GenNormalPoC(m_action, genpoc.__str__())
GenNormalPoC(url, genpoc.__str__())
2 changes: 1 addition & 1 deletion xsrfprobe/modules/Generator.py
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ def GenNormalPoC(action, fields, method='POST', encoding_type='application/x-www
# Brand tag :p ...I guess...
with tag('small'):
text('(o) This form was generated by ')
with tag('a', href='https://github.com/0xinfection/xsrfprobe'):
with tag('a', href='https://github.com/0xInfection/xsrfprobe'):
text('XSRFProbe')
text('.')
content = BeautifulSoup(doc.getvalue(), 'html.parser')
Expand Down

0 comments on commit 03b9a9b

Please sign in to comment.