Skip to content

Commit 84d2d5c

Browse files
committed
update
1 parent ca429a9 commit 84d2d5c

5 files changed

Lines changed: 16 additions & 10 deletions

File tree

attack_engine/utils/_49757.py

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
#!/usr/bin/python3
22

33
from telnetlib import Telnet
4-
import argparse
54
from signal import signal, SIGINT
65
from sys import exit
76

8-
Exploit_Title = "vsftpd 2.3.4 - Backdoor Command Execution"
9-
Date = "9-04-2021"
10-
Version = "vsftpd 2.3.4"
11-
Tested_on = "debian"
12-
CVE = "CVE-2011-2523"
7+
about: dict = {"Exploit_Title": "vsftpd 2.3.4 - Backdoor Command Execution",
8+
"Date": "9-04-2021",
9+
"Version": "vsftpd 2.3.4",
10+
"Tested_on": "debian",
11+
"CVE": "CVE-2011-2523"
12+
}
1313

1414

1515
def handler(signal_received, frame):
@@ -45,8 +45,8 @@ def main(host: str = ""):
4545
print("__________________________")
4646
tn2.interact()
4747
except Exception as es:
48-
print("\n" + "-"*20, "\nException raised:\n", es)
49-
print("\n" + "-"*20, f"\n{exp_try}]Retrying...")
48+
print("\n" + "-" * 20, "\nException raised:\n", es)
49+
print("\n" + "-" * 20, f"\n{exp_try}]Retrying...")
5050
exp_try += 1
5151
else:
5252
break

attack_engine/utils/__init__.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,9 @@
22
import os.path
33

44

5+
56
def load_exploit(exploit_name: str = "") -> object:
67
return importlib.import_module(name="attack_engine.utils."+exploit_name)
78

8-
9+
def search_exploit(*args) -> list:
10+
pass
132 Bytes
Binary file not shown.

attack_engine/utils/exploit_struct

Whitespace-only changes.

strot-cli.py

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1+
import os
12
import socket
23
import sys
34
import json
45
import time
56
from typing import Dict, Any
6-
77
from scapy.all import ARP, Ether, srp
88
import nmap
99
from attack_engine.attack_engine import AttackEngine
@@ -367,4 +367,8 @@ def version_scan(target_ip):
367367

368368

369369
if __name__ == "__main__":
370+
os.system('clear')
371+
print("starting STROT CLI v2.1.3")
372+
print("Stealthy Tool for Root Oriented Tunneling - A RED TEAMING TOOL")
373+
time.sleep(2)
370374
obj = STROTCLI()

0 commit comments

Comments
 (0)