MyPadBuster
It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.
Install / Use
/learn @brianwrf/MyPadBusterREADME
myPadBuster
这是一个基于https://github.com/GDSSecurity/PadBuster 而改写的用于测试 ASP.net Padding Oracle漏洞的自动化脚本。
其在PadBuster.pl的基础上增加了自动扫描和检测多个网站是否存在Padding Oracle漏洞。
具体的功能如下:
Usage:
myPadBuster.py [options]
Options:
-h, --help Show basic help message and exit
-u url, --url=url Show WebResource value for single ASP.NET URL to be analyzed
-w file, --webresource=file Show WebResource values for multiple ASP.NET URLs to be analyzed
-s url, --single=url Show encrypted value for single WebResource value to be analyzed
-m file, --multi=file Show encrypted values for multiple WebResource values generated by switch -w
-p url, --padbuster=url Brute force Web.config by single encrypted value to be analyzed
Examples:
myPadBuster.py -u http://www.example.com/login.aspx
myPadBuster.py -w /usr/home/urls.txt
myPadBuster.py -s http://www.example.com/WebResource.axd?d=LElgggssFFdff99
myPadBuster.py -m c:\windows\webresource.txt
myPadBuster.py -p http://www.example.com/ScriptResource.axd?d=LElgggssFFdff99AAAAAAAAAAAAAAAAAA0
[!] to see help message of options run with '-h'
PS: 使用前请确保机器上已安装了python和perl。如有任何问题请发邮件至security_alert@126.com。
声明:本工具仅供测试和学习,任何擅自使用本工具对未经合法授权的信息系统进行检测的,均为非法和侵权行为,一切法律后果均由侵权人承担。
Related Skills
node-connect
349.0kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
109.4kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
349.0kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
349.0kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
