forked from swisskyrepo/Vulny-Code-Static-Analysis
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathexport.sh
executable file
·19 lines (17 loc) · 1.1 KB
/
export.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
echo "Generating report"
mkdir Report 2> /dev/null
python index.py --dir $1 > Report/exported.txt
cat Report/exported.txt | grep "Remote Co" -A4 > Report/RemoteCodeExecution.txt
cat Report/exported.txt | grep "File Inclusion" -A4 > Report/File_Inclusion.txt
cat Report/exported.txt | grep "SQL Injection" -A4 > Report/SQL_Injection.txt
cat Report/exported.txt | grep "File Upload" -A4 > Report/File_Upload.txt
cat Report/exported.txt | grep "Cross Site Scripting" -A4 > Report/Cross_Site_Scripting.txt
cat Report/exported.txt | grep "XPATH Injection" -A4 > Report/XPATH_Injection.txt
cat Report/exported.txt | grep "LDAP Injection" -A4 > Report/LDAP_Injection.txt
cat Report/exported.txt | grep "Insecure E-mail" -A4 > Report/Insecure_E-mail.txt
cat Report/exported.txt | grep "PHP Object Injection" -A4 > Report/PHP_Object_Injection.txt
cat Report/exported.txt | grep "Header Injection" -A4 > Report/Header_Injection.txt
cat Report/exported.txt | grep "URL Redirection" -A4 > Report/URL_Redirection.txt
cat Report/exported.txt | grep "Hardcoded Credential" -A4 > Report/Hardcoded_Credential.txt
echo "Found :"
ls -ail Report