HTTP Proxy for using sqlmap against websockets
Project description
CVE-2021-45010
🐍 Contrived Python PoC Exploit for CVE-2021-45010. Tiny File Manager < 2.4.7
Usage
usage: main.py [-h] -u URL -l USERNAME -p PASSWORD [-g GUI_PATH] [-r FS_RELPATH]
options:
-h, --help show this help message and exit
-u URL, --url URL Base URL
-l USERNAME, --username USERNAME
Username
-p PASSWORD, --password PASSWORD
Password
-g GUI_PATH, --gui-path GUI_PATH
GUI relative path for upload (default: /)
-r FS_RELPATH, --fs-relpath FS_RELPATH
Filesystem relative path (from web root) to write to
Installation
PyPI
python3 -m pip install cve-2022-0739
Manual
python3 -m pip install cve_2022_0739-1.0.0-py3-none-any.whl
Demo
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for sqlmap-websocket-proxy-1.0.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 938bed7cb8ddd2effe71b07dfd24b20c4d8e4352387d0b146afaf31735ad4db3 |
|
MD5 | 32a69ff5ac954591c4b0aaf896db6f06 |
|
BLAKE2b-256 | d34d10adfbb429ffe507a295f1ec8b2d84ccf4ee4c458f5cdf85174ef5834dff |
Close
Hashes for sqlmap_websocket_proxy-1.0.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 0f4a1d5ae0fb135f09ceb39f83eb76d1c9e56a61874b9da3d8451cb43dc969de |
|
MD5 | 844a0cbfae3e9a26b26039c925290296 |
|
BLAKE2b-256 | b5c7d137b8ab4fe64d2bacd5ae7a72c1c6857f80b3af9bf156cc5cec25d6d746 |