diff --git a/striker.py b/striker.py index 334dc15..a739eac 100644 --- a/striker.py +++ b/striker.py @@ -50,13 +50,15 @@ / \| | | | \/ | <\ ___/| | \/ /_______ /|__| |__| |__|__|_ \\\\___ >__| \/ \/ \/\033[1;m''' -target_input = raw_input('\033[1;34m[?]\033[1;m Enter the target: ') +target_input = raw_input('\033[1;34m[?]\033[1;m Enter the target: example( http://domain.com ) \n') parsed_uri = urlparse(target_input) + if parsed_uri.scheme == '': domain = parsed_uri.path else: domain = parsed_uri.netloc -target = '{}//{}'.format(parsed_uri.scheme, parsed_uri.netloc) #detect HTTP or HTTPs By UrlParse + +target = '{}//{}'.format(parsed_uri.scheme, domain) #detect HTTP or HTTPs By UrlParse def sqli(url): print '%s Using SQLMap api to check for SQL injection vulnerabilities. Don\'t worry we are using an online service and it doesn\'t depend on your internet connection. This scan will take 2-3 minutes.' % run @@ -86,7 +88,7 @@ def cms(domain): detect = search(r'class="nowrap" title="[^<]*">', result) WordPress = False try: - r = br.open(target + '/robots.txt').read() + r = br.open('//' + domain + '/robots.txt').read() if "wp-admin" in str(r): WordPress = True except: