Pocsuite version 0.3 released ~  A remote vulnerability test framework.

Pocsuite version 0.3 released ~ A remote vulnerability test framework.

Pocsuite is A remote vulnerability test framework.

Pocsuite v0.3-dae5e9e

Pocsuite v0.3-dae5e9e

Installation:
+ git clone https://github.com/knownsec/Pocsuite
+ cd Pocsuite
+ cd pocsuite
+ Python pocsuite.py -h(argument)

Pocsuite Optional Argument :

Pocsuite Optional Argument :

optional arguments:
-h, –help Show help message and exit
–version Show program’s version number and exit

target:
-u URL, –url URL Target URL (e.g. “http://www.targetsite.com/”)
-f URLFILE, –file URLFILE
Scan multiple targets given in a textual file
-r POCFILE Load POC from a file (e.g. “_0001_cms_sql_inj.py”) or directory (e.g. “modules/”)

mode:
–verify Run poc with verify mode
–attack Run poc with attack mode

request:
–cookie COOKIE HTTP Cookie header value
–referer REFERER HTTP Referer header value
–user-agent AGENT HTTP User-Agent header value
–random-agent Use randomly selected HTTP User-Agent header value
–proxy PROXY Use a proxy to connect to the target URL
–proxy-cred PROXYCRED
Proxy authentication credentials (name:password)
–timeout TIMEOUT Seconds to wait before timeout connection (default 30)
–headers HEADERS Extra headers (e.g. “Accept-Language: zh-CN,zh;q=0.8”)

optimization:
–threads THREADS Max number of concurrent HTTP(s) requests (default 1)
–report REPORT Save a html report to file (e.g. “./report.html”)

Source : http://sebug.net/