Skip to main content

No project description provided

Project description

logo

Badges

MIT License PyPI - Version PyPI - Downloads GitHub all releases Profile_view Follow Twitter

License

MIT

Installation

  1. Install Python3 and pip Instructions Here (If you can't figure this out, you shouldn't really be using this)

    • Install via pip
      •    pip install CVE-2021-20323 
        
    • Run bellow command to check
      • CVE-2021-20323 -h

Configurations

  1. We integrated with the Telegram API to receive instant notifications for vulnerability detection.

    • Telegram Notification
      •    CVE-2021-20323 --chatid <YourTelegramChatID>
        
    • Open your telegram and search for @CappricioSecuritiesTools_bot and click start

Usages

  1. This tool has multiple use cases.

    • To Check Single URL
      •    CVE-2021-20323 -u http://example.com 
        
    • To Check List of URL
      •   CVE-2021-20323 -i urls.txt 
        
    • Save output into TXT file
      •   CVE-2021-20323 -i urls.txt -o out.txt
        
    • Want to Learn about CVE-2021-20323? Then Type Below command
      •   CVE-2021-20323 -b
        

Lab

  1. Lab url.
    • Testing syntax URL
    •    CVE-2021-20323 -u https://labs.cappriciosec.com/CVE-2021-20323/
      

🚨 Disclaimer

This tool is created for security bug identification and assistance; Cappricio Securities is not liable for any illegal use. Use responsibly within legal and ethical boundaries. 🔐🛡️

Working PoC Video

asciicast

Help menu

Get all items

👋 Hey Hacker
                                                                v1.0
  ______   ______    ___  ___  ___ ___    ___  ___  ____ ___  ____
 / ___/ | / / __/___|_  |/ _ \|_  <  /___|_  |/ _ \|_  /|_  ||_  /
/ /__ | |/ / _//___/ __// // / __// /___/ __// // //_ </ __/_/_ < 
\___/ |___/___/   /____/\___/____/_/   /____/\___/____/____/____/     

                                   Developed By https://cappriciosec.com


CVE-2021-20323 : Bug scanner for WebPentesters and Bugbounty Hunters 

$ CVE-2021-20323 [option]

Usage: CVE-2021-20323 [options]
Argument Type Description Examples
-u --url URL to scan CVE-2021-20323 -u https://target.com
-i --input filename Read input from txt CVE-2021-20323 -i target.txt
-o --output filename Write output in txt file CVE-2021-20323 -i target.txt -o output.txt
-c --chatid Creating Telegram Notification CVE-2021-20323 --chatid yourid
-b --blog To Read about CVE-2021-20323 Bug CVE-2021-20323 -b
-h --help Help Menu CVE-2021-20323 -h

🔗 Links

Website linkedin twitter

Author

Feedback

If you have any feedback, please reach out to us at contact@karthithehacker.com

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

CVE-2021-20323-0.0.3.tar.gz (7.5 kB view details)

Uploaded Source

File details

Details for the file CVE-2021-20323-0.0.3.tar.gz.

File metadata

  • Download URL: CVE-2021-20323-0.0.3.tar.gz
  • Upload date:
  • Size: 7.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.11

File hashes

Hashes for CVE-2021-20323-0.0.3.tar.gz
Algorithm Hash digest
SHA256 50b6ba3c3d5dd8a6103d000134fb45c6eb46d66ad608f4d87ae3b9f72901cab6
MD5 99e46c24036acee8cbd809e4a3466571
BLAKE2b-256 2d0323e72812bf26382cc4098bb1f9599f8c196934cee4c14d94b610b6cb774a

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page