Skip to content

Commit

Permalink
update 1.6.0
Browse files Browse the repository at this point in the history
  • Loading branch information
LoRexxar committed Jun 10, 2019
1 parent 23864cf commit 4ce1cbe
Show file tree
Hide file tree
Showing 3 changed files with 52 additions and 38 deletions.
2 changes: 1 addition & 1 deletion cobra/__version__.py
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
__issue_page__ = 'https://github.com/LoRexxar/Cobra-W/issues/new'
__python_version__ = sys.version.split()[0]
__platform__ = platform.platform()
__version__ = '1.5.0'
__version__ = '1.6.0'
__author__ = 'LoRexxar'
__author_email__ = 'LoRexxar@gmail.com'
__license__ = 'MIT License'
Expand Down
7 changes: 6 additions & 1 deletion docs/changelog.md
Original file line number Diff line number Diff line change
Expand Up @@ -111,4 +111,9 @@
- 2019-05-16
- Cobra-W 1.5.0
- 添加了-b参数以设置扫描时的黑名单,可以用来避免扫描第三方模块,造成无意义的搜索
- 修复了tamper中无法设置函数名为输入的问题
- 修复了tamper中无法设置函数名为输入的问题
- 2019-06-10
- Cobra-W 1.6.0
- 修复了部分在is_repair的判断错误问题
- 重构了关于语言设置的问题,现在可以同时对多种语言扫描,并留下了各种语言的拓展位
- 添加了关于简单的js的支持,现在可以进行正则匹配扫描
81 changes: 45 additions & 36 deletions docs/dev.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,42 +8,51 @@
```
python .\cobra.py -h
usage: cobra [-h] [-t <target>] [-f <format>] [-o <output>] [-r <rule_id>]
[-s <secret_name>] [-d]
____ _ __ __
/ ___|___ | |__ _ __ __ _ \ \ / /
| | / _ \| '_ \| '__/ _` | \ \ /\ / /
| |__| (_) | |_) | | | (_| | --- \ V V /
\____\___/|_.__/|_| \__,_| \_/\_/ v0.8.3
GitHub: https://github.com/LoRexxar/Cobra-W
Cobra is a static code analysis system that automates the detecting vulnerabilities and security issue.
optional arguments:
-h, --help show this help message and exit
Scan:
-t <target>, --target <target>
file, folder, compress, or repository address
-f <format>, --format <format>
vulnerability output format (formats: html, json, csv,
xml)
-o <output>, --output <output>
vulnerability output STREAM, FILE
-r <rule_id>, --rule <rule_id>
specifies rules e.g: 1000, 1001
-s <secret_name>, --secret <secret_name>
secret repair function e.g: wordpress
-d, --debug open debug mode
Usage:
python cobra.py -t tests/vulnerabilities
python cobra.py -t tests/vulnerabilities -r 1000, 1001
python cobra.py -t tests/vulnerabilities -s wordpress
python cobra.py -t tests/vulnerabilities -f json -o /tmp/report.json
python cobra.py -t tests/vulnerabilities --debug
usage: cobra [-h] [-t <target>] [-f <format>] [-o <output>] [-r <rule_id>]
[-s <secret_name>] [-i <sid>] [-l <log>] [-d] [-lan LANGUAGE]
[-b BLACK_PATH]
____ _ __ __
/ ___|___ | |__ _ __ __ _ \ \ / /
| | / _ \| '_ \| '__/ _` | \ \ /\ / /
| |__| (_) | |_) | | | (_| | --- \ V V /
\____\___/|_.__/|_| \__,_| \_/\_/ v1.6.0
GitHub: https://github.com/LoRexxar/Cobra-W
Cobra is a static code analysis system that automates the detecting vulnerabilities and security issue.
optional arguments:
-h, --help show this help message and exit
Scan:
-t <target>, --target <target>
file, folder, compress, or repository address
-f <format>, --format <format>
vulnerability output format (formats: html, json, csv,
xml)
-o <output>, --output <output>
vulnerability output STREAM, FILE
-r <rule_id>, --rule <rule_id>
specifies rules e.g: 1000, 1001
-s <secret_name>, --secret <secret_name>
secret repair function e.g: wordpress
-i <sid>, --sid <sid>
sid for cobra-wa
-l <log>, --log <log>
log name for cobra-wa
-d, --debug open debug mode
-lan LANGUAGE, --language LANGUAGE
set target language
-b BLACK_PATH, --blackpath BLACK_PATH
black path list
Usage:
python cobra.py -t tests/vulnerabilities
python cobra.py -t tests/vulnerabilities -r 1000, 1001
python cobra.py -t tests/vulnerabilities -s wordpress
python cobra.py -t tests/vulnerabilities -f json -o /tmp/report.json
python cobra.py -t tests/vulnerabilities --debug
```

## 核心代码
Expand Down

0 comments on commit 4ce1cbe

Please sign in to comment.