mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-03-12 04:35:49 -07:00
DHCP poisoning now works on Windows, additionaly it's been optimized for performance improvements ARP poisoning has been optimized with and internal cache and some algo improvements cve-details-parser.py has been added to the utils/ directory to help adding exploits to the BrowserSniper config file I'm currently working on adding to the filepwn plugin all of the missing options that bdfproxy stand-alone has
32 lines
633 B
Python
Executable File
32 lines
633 B
Python
Executable File
#! /usr/bin/env python2
|
|
|
|
import requests
|
|
import lxml.html
|
|
import sys
|
|
|
|
r = requests.get(sys.argv[1])
|
|
tree = lxml.html.fromstring(r.text)
|
|
|
|
try:
|
|
|
|
vulntable = tree.xpath('//table[@id="vulnprodstable"]/*')
|
|
list_len = len(vulntable)
|
|
|
|
tuple_list = []
|
|
|
|
for i in vulntable[2:list_len]:
|
|
java_v = (i.getchildren()[4].text.strip(), i.getchildren()[5].text.strip()[6:].strip())
|
|
tuple_list.append(java_v)
|
|
|
|
except IndexError:
|
|
pass
|
|
|
|
string_list = []
|
|
for v in sorted(set(tuple_list)):
|
|
version, update = v
|
|
if update:
|
|
string_list.append("{}.{}".format(version, update))
|
|
else:
|
|
string_list.append(version)
|
|
|
|
print ', '.join(string_list) |