Name | CVE-2020-3452 JSON |
Version |
0.0.1
JSON |
| download |
home_page | None |
Summary | None |
upload_time | 2024-05-29 06:25:14 |
maintainer | None |
docs_url | None |
author | @karthithehacker |
requires_python | None |
license | None |
keywords |
|
VCS |
|
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
<div align="center">
<img src="https://blogs.cappriciosec.com/uploaders/CVE-2020-3452-tool.png" alt="logo">
</div>
## Badges
[![MIT License](https://img.shields.io/badge/License-MIT-green.svg)](https://choosealicense.com/licenses/mit/)
![PyPI - Version](https://img.shields.io/pypi/v/CVE-2020-3452)
![PyPI - Downloads](https://img.shields.io/pypi/dm/CVE-2020-3452)
![GitHub all releases](https://img.shields.io/github/downloads/Cappricio-Securities/CVE-2020-3452/total)
<a href="https://github.com/Cappricio-Securities/CVE-2020-3452/releases/"><img src="https://img.shields.io/github/release/Cappricio-Securities/CVE-2020-3452"></a>![Profile_view](https://komarev.com/ghpvc/?username=Cappricio-Securities&label=Profile%20views&color=0e75b6&style=flat)
[![Follow Twitter](https://img.shields.io/twitter/follow/cappricio_sec?style=social)](https://twitter.com/cappricio_sec)
<p align="center">
<p align="center">
## License
[MIT](https://choosealicense.com/licenses/mit/)
## Installation
1. Install Python3 and pip [Instructions Here](https://www.python.org/downloads/) (If you can't figure this out, you shouldn't really be using this)
- Install via pip
- ```bash
pip install CVE-2020-3452
```
- Run bellow command to check
- `CVE-2020-3452 -h`
## Configurations
2. We integrated with the Telegram API to receive instant notifications for vulnerability detection.
- Telegram Notification
- ```bash
CVE-2020-3452 --chatid <YourTelegramChatID>
```
- Open your telegram and search for [`@CappricioSecuritiesTools_bot`](https://web.telegram.org/k/#@CappricioSecuritiesTools_bot) and click start
## Usages
3. This tool has multiple use cases.
- To Check Single URL
- ```bash
CVE-2020-3452 -u http://example.com
```
- To Check List of URL
- ```bash
CVE-2020-3452 -i urls.txt
```
- Save output into TXT file
- ```bash
CVE-2020-3452 -i urls.txt -o out.txt
```
- Want to Learn about [`CVE-2020-3452`](https://blogs.cappriciosec.com/cve/163/Cisco(CVE-2020-3452))? Then Type Below command
- ```bash
CVE-2020-3452 -b
```
<p align="center">
<b>🚨 Disclaimer</b>
</p>
<p align="center">
<b>This tool is created for security bug identification and assistance; Cappricio Securities is not liable for any illegal use.
Use responsibly within legal and ethical boundaries. 🔐🛡️</b></p>
## Working PoC Video
[![asciicast](https://blogs.cappriciosec.com/uploaders/Screenshot%202024-05-29%20at%2011.50.20%20AM.png)](https://asciinema.org/a/OUyUI01vgWvWgvizXrpA1IDbm)
## Help menu
#### Get all items
```bash
👋 Hey Hacker
v1.0
_______ ________ ___ ____ ___ ____ _____ __ __ _________
/ ____/ | / / ____/ |__ \ / __ \__ \ / __ \ |__ // // / / ____/__ \
/ / | | / / __/________/ // / / /_/ // / / /_____ /_ </ // /_/___ \ __/ /
/ /___ | |/ / /__/_____/ __// /_/ / __// /_/ /_____/__/ /__ __/___/ // __/
\____/ |___/_____/ /____/\____/____/\____/ /____/ /_/ /_____//____/
Developed By https://cappriciosec.com
CVE-2020-3452 : Bug scanner for WebPentesters and Bugbounty Hunters
$ CVE-2020-3452 [option]
Usage: CVE-2020-3452 [options]
```
| Argument | Type | Description | Examples |
| :-------- | :------- | :------------------------- | :------------------------- |
| `-u` | `--url` | URL to scan | CVE-2020-3452 -u https://target.com |
| `-i` | `--input` | filename Read input from txt | CVE-2020-3452 -i target.txt |
| `-o` | `--output` | filename Write output in txt file | CVE-2020-3452 -i target.txt -o output.txt |
| `-c` | `--chatid` | Creating Telegram Notification | CVE-2020-3452 --chatid yourid |
| `-b` | `--blog` | To Read about CVE-2020-3452 Bug | CVE-2020-3452 -b |
| `-h` | `--help` | Help Menu | CVE-2020-3452 -h |
## 🔗 Links
[![Website](https://img.shields.io/badge/my_portfolio-000?style=for-the-badge&logo=ko-fi&logoColor=white)](https://cappriciosec.com/)
[![linkedin](https://img.shields.io/badge/linkedin-0A66C2?style=for-the-badge&logo=linkedin&logoColor=white)](https://www.linkedin.com/in/karthikeyan--v/)
[![twitter](https://img.shields.io/badge/twitter-1DA1F2?style=for-the-badge&logo=twitter&logoColor=white)](https://twitter.com/karthithehacker)
## Author
- [@karthithehacker](https://github.com/karthi-the-hacker/)
## Feedback
If you have any feedback, please reach out to us at contact@karthithehacker.com
Raw data
{
"_id": null,
"home_page": null,
"name": "CVE-2020-3452",
"maintainer": null,
"docs_url": null,
"requires_python": null,
"maintainer_email": null,
"keywords": null,
"author": "@karthithehacker",
"author_email": "<contact@karthithehacker.com>",
"download_url": "https://files.pythonhosted.org/packages/b5/62/17b305df03d799722e238ccda4be784b4817b4fe4dc88763a6fe573baf93/CVE-2020-3452-0.0.1.tar.gz",
"platform": null,
"description": "\n<div align=\"center\">\n <img src=\"https://blogs.cappriciosec.com/uploaders/CVE-2020-3452-tool.png\" alt=\"logo\">\n</div>\n\n\n## Badges\n\n\n\n[![MIT License](https://img.shields.io/badge/License-MIT-green.svg)](https://choosealicense.com/licenses/mit/)\n![PyPI - Version](https://img.shields.io/pypi/v/CVE-2020-3452)\n![PyPI - Downloads](https://img.shields.io/pypi/dm/CVE-2020-3452)\n![GitHub all releases](https://img.shields.io/github/downloads/Cappricio-Securities/CVE-2020-3452/total)\n<a href=\"https://github.com/Cappricio-Securities/CVE-2020-3452/releases/\"><img src=\"https://img.shields.io/github/release/Cappricio-Securities/CVE-2020-3452\"></a>![Profile_view](https://komarev.com/ghpvc/?username=Cappricio-Securities&label=Profile%20views&color=0e75b6&style=flat)\n[![Follow Twitter](https://img.shields.io/twitter/follow/cappricio_sec?style=social)](https://twitter.com/cappricio_sec)\n<p align=\"center\">\n\n<p align=\"center\">\n\n\n\n\n\n\n\n## License\n\n[MIT](https://choosealicense.com/licenses/mit/)\n\n\n\n## Installation \n\n1. Install Python3 and pip [Instructions Here](https://www.python.org/downloads/) (If you can't figure this out, you shouldn't really be using this)\n\n - Install via pip\n - ```bash\n pip install CVE-2020-3452 \n ```\n - Run bellow command to check\n - `CVE-2020-3452 -h`\n\n## Configurations \n2. We integrated with the Telegram API to receive instant notifications for vulnerability detection.\n \n - Telegram Notification\n - ```bash\n CVE-2020-3452 --chatid <YourTelegramChatID>\n ```\n - Open your telegram and search for [`@CappricioSecuritiesTools_bot`](https://web.telegram.org/k/#@CappricioSecuritiesTools_bot) and click start\n\n## Usages \n3. This tool has multiple use cases.\n \n - To Check Single URL\n - ```bash\n CVE-2020-3452 -u http://example.com \n ```\n - To Check List of URL \n - ```bash\n CVE-2020-3452 -i urls.txt \n ```\n - Save output into TXT file\n - ```bash\n CVE-2020-3452 -i urls.txt -o out.txt\n ```\n - Want to Learn about [`CVE-2020-3452`](https://blogs.cappriciosec.com/cve/163/Cisco(CVE-2020-3452))? Then Type Below command\n - ```bash\n CVE-2020-3452 -b\n ```\n \n<p align=\"center\">\n <b>\ud83d\udea8 Disclaimer</b>\n \n</p>\n<p align=\"center\">\n<b>This tool is created for security bug identification and assistance; Cappricio Securities is not liable for any illegal use. \n Use responsibly within legal and ethical boundaries. \ud83d\udd10\ud83d\udee1\ufe0f</b></p>\n\n\n## Working PoC Video\n\n[![asciicast](https://blogs.cappriciosec.com/uploaders/Screenshot%202024-05-29%20at%2011.50.20%20AM.png)](https://asciinema.org/a/OUyUI01vgWvWgvizXrpA1IDbm)\n\n\n\n\n## Help menu\n\n#### Get all items\n\n```bash\n\ud83d\udc4b Hey Hacker\n v1.0\n _______ ________ ___ ____ ___ ____ _____ __ __ _________\n / ____/ | / / ____/ |__ \\ / __ \\__ \\ / __ \\ |__ // // / / ____/__ \\\n / / | | / / __/________/ // / / /_/ // / / /_____ /_ </ // /_/___ \\ __/ /\n/ /___ | |/ / /__/_____/ __// /_/ / __// /_/ /_____/__/ /__ __/___/ // __/\n\\____/ |___/_____/ /____/\\____/____/\\____/ /____/ /_/ /_____//____/\n\n Developed By https://cappriciosec.com\n \n\nCVE-2020-3452 : Bug scanner for WebPentesters and Bugbounty Hunters \n\n$ CVE-2020-3452 [option]\n\nUsage: CVE-2020-3452 [options]\n```\n\n\n| Argument | Type | Description | Examples |\n| :-------- | :------- | :------------------------- | :------------------------- |\n| `-u` | `--url` | URL to scan | CVE-2020-3452 -u https://target.com |\n| `-i` | `--input` | filename Read input from txt | CVE-2020-3452 -i target.txt | \n| `-o` | `--output` | filename Write output in txt file | CVE-2020-3452 -i target.txt -o output.txt |\n| `-c` | `--chatid` | Creating Telegram Notification | CVE-2020-3452 --chatid yourid |\n| `-b` | `--blog` | To Read about CVE-2020-3452 Bug | CVE-2020-3452 -b |\n| `-h` | `--help` | Help Menu | CVE-2020-3452 -h |\n\n\n\n## \ud83d\udd17 Links\n[![Website](https://img.shields.io/badge/my_portfolio-000?style=for-the-badge&logo=ko-fi&logoColor=white)](https://cappriciosec.com/)\n[![linkedin](https://img.shields.io/badge/linkedin-0A66C2?style=for-the-badge&logo=linkedin&logoColor=white)](https://www.linkedin.com/in/karthikeyan--v/)\n[![twitter](https://img.shields.io/badge/twitter-1DA1F2?style=for-the-badge&logo=twitter&logoColor=white)](https://twitter.com/karthithehacker)\n\n\n\n## Author\n\n- [@karthithehacker](https://github.com/karthi-the-hacker/)\n\n\n\n## Feedback\n\nIf you have any feedback, please reach out to us at contact@karthithehacker.com\n",
"bugtrack_url": null,
"license": null,
"summary": null,
"version": "0.0.1",
"project_urls": null,
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "b56217b305df03d799722e238ccda4be784b4817b4fe4dc88763a6fe573baf93",
"md5": "c3699224296fc9320abe3bd966beec09",
"sha256": "40935ab63a61a0ef30c96b5df2378a51109011bd3d67fd4e9f89da0d0c5dbb6b"
},
"downloads": -1,
"filename": "CVE-2020-3452-0.0.1.tar.gz",
"has_sig": false,
"md5_digest": "c3699224296fc9320abe3bd966beec09",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 7454,
"upload_time": "2024-05-29T06:25:14",
"upload_time_iso_8601": "2024-05-29T06:25:14.975719Z",
"url": "https://files.pythonhosted.org/packages/b5/62/17b305df03d799722e238ccda4be784b4817b4fe4dc88763a6fe573baf93/CVE-2020-3452-0.0.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-05-29 06:25:14",
"github": false,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"lcname": "cve-2020-3452"
}