diff --git a/app.py b/app.py index 13057f0..839ebcf 100644 --- a/app.py +++ b/app.py @@ -38,7 +38,6 @@ process_rogue_data_for_json ) from scripts.wifi_report import wifi_vuln_report - from werkzeug.utils import secure_filename import uuid import zipfile @@ -994,7 +993,7 @@ def website_scanner(): status = "Safe" print( - f"DEBUG: Adding result - Type: {res_type}, Status: {status}, Payload: {str(res)[:50]}...") + f"DEBUG: Adding result - Payload: {str(res)[:50]}...") current_results_list.append({ "type": res_type, "status": status, diff --git a/scripts/login_bruteforce.py b/scripts/payload_texts/login_bruteforce.py similarity index 65% rename from scripts/login_bruteforce.py rename to scripts/payload_texts/login_bruteforce.py index 2430542..3f2fecb 100644 --- a/scripts/login_bruteforce.py +++ b/scripts/payload_texts/login_bruteforce.py @@ -5,23 +5,8 @@ from urllib.parse import urljoin def brute_force_login(page_url, session): - """ - Attempts brute-force login by: - - Parsing the form dynamically - - Building the correct form action URL - - Submitting username/password combos - - Args: - page_url (str): The URL where the login form is located. - session (requests.Session): Active session to maintain state. - - Returns: - tuple or None: (username, password) if successful; else None. - """ - print(f"[*] Starting brute-force login on: {page_url}") - - # Step 1: Fetch and parse the login page + try: resp = session.get(page_url, timeout=10) soup = BeautifulSoup(resp.text, "html.parser") @@ -29,18 +14,17 @@ def brute_force_login(page_url, session): print(f"[!] Failed to load login page: {e}") return None - # Step 2: Find form form = soup.find("form") if not form: print("[-] No