Skip to content

Commit

Permalink
new rust version
Browse files Browse the repository at this point in the history
  • Loading branch information
rikonaka committed Feb 16, 2023
1 parent e6675ce commit 6b404d4
Show file tree
Hide file tree
Showing 7 changed files with 178 additions and 2,625 deletions.
41 changes: 11 additions & 30 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -1,33 +1,14 @@
# Object files
*.o
*.ko
*.obj
*.elf
# for Rust
# Generated by Cargo will have compiled files and executables
debug/
target/

# Precompiled Headers
*.gch
*.pch
# Remove Cargo.lock from gitignore if creating an executable, leave it for libraries
# More information here https://doc.rust-lang.org/cargo/guide/cargo-toml-vs-cargo-lock.html
Cargo.lock

# Libraries
*.lib
*.a
*.la
*.lo
# These are backup files generated by rustfmt
**/*.rs.bk

# Shared objects (inc. Windows DLLs)
*.dll
*.so
*.so.*
*.dylib

# Executables
*.exe
*.out
*.app
*.i*86
*.x86_64
*.hex

# Debug files
*.dSYM/
*.su
# MSVC Windows builds of rustc generate these, which store debugging information
*.pdb
16 changes: 16 additions & 0 deletions Cargo.toml
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
[package]
name = "svf"
version = "0.1.0"
edition = "2021"

# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html

[target.'cfg(target_os = "linux")'.dependencies]
openssl = { version = "0.10", features = ["vendored"] }

[dependencies]
reqwest = { version = "0.11", features = ["json", "socks"] }
tokio = { version = "1", features = ["full"] }
serde = { version = "1.0", features = ["derive"] }
serde_json = "1.0"
clap = { version = "4.1.6", features = ["derive"] }
52 changes: 7 additions & 45 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,49 +1,11 @@
# This is a search tool for search Vulnerability

before you make it with gcc, you must confirm you have installed the `libcurl`

if not, try this:

```
sudo apt-get install libcurl4-openssl-dev
```

## You can make it as

```
gcc *.c -o svf -lm -l curl
```

## And run it like this

```
./svf discuz
```

and the result it like below:
Download it from the release page or compile it yourself.

```bash
./svf --name sqlmap`
NOW LIST THE ALL RESULT (2.006s) (Length: 2):
| INDEX | CVE | DATE | NAME |
| 0 | 34933 | 2020-02-11 | SQLmap - Command Injection |
| 1 | 24827 | 2016-09-20 | VinDrive SQL Injecti0n Vulnerability - Manually AND sqlmap |
```
Get the API data retrieved
NOW LIST THE ALL RESULT:
NUML NUMC | DATE | DETAIL
>[1] 6792 | 2010-01-29 | Discuz! 6.0.0 cross site scripting
>[2] 7570 | 2009-09-17 | Discuz! Plugin Crazy Star <= 2.0 (fmid) SQL Injection Vulnerability
>[3] 7619 | 2009-09-15 | Discuz! JiangHu plugin versions 1.1 and below remote SQL injection
>[4] 7779 | 2009-08-25 | Discuz 6.0 (2fly_gift.php) Sql Injection Vulnerability
>[5] 7878 | 2009-08-19 | Discuz! Remote Reset User Password Exploit
>[6] 7879 | 2009-08-19 | Discuz! 6.x/7.x Remote Code Execution Exploit
>[7] 10534 | 2008-08-07 | Comsenz Discuz! 6.0.1 Sql injection
>[8] 6792 | 2010-01-29 | Discuz! 6.0.0 cross site scripting
>[9] 7570 | 2009-09-17 | Discuz! Plugin Crazy Star <= 2.0 (fmid) SQL Injection Vulnerability
>[10] 7619 | 2009-09-15 | Discuz! JiangHu plugin versions 1.1 and below remote SQL injection
>[11] 7779 | 2009-08-25 | Discuz 6.0 (2fly_gift.php) Sql Injection Vulnerability
>[12] 7878 | 2009-08-19 | Discuz! Remote Reset User Password Exploit
>[13] 7879 | 2009-08-19 | Discuz! 6.x/7.x Remote Code Execution Exploit
>[14] 10534 | 2008-08-07 | Comsenz Discuz! 6.0.1 Sql injection
END
```

## NOTE:
- The `NUML` is mean the serial number in local machine
- The `NUMC` is mean the serial number of CVE
Loading

0 comments on commit 6b404d4

Please sign in to comment.