mirror of https://github.com/OWASP/Nettacker.git
81b842563b
* Detecting open Dropbear server * Making code more readable After testing it rigorously i have found that without the try and except the code doesn't work, so to improve the readability i have added some comments, also added is finally block to close the connection. * Replaced try/except with if/else As per the suggestions i have replaced try/except with if/else and i have ran multiple tests on my localhost to test and it is working. * Made the code concise I have made the suggested changes to the code to make it more concise and easy to read. I have taken time to test it and make sure it works( it does ). |
||
---|---|---|
.. | ||
module_protocols | ||
__init__.py | ||
alert.py | ||
args_loader.py | ||
color.py | ||
compatible.py | ||
die.py | ||
graph.py | ||
ip.py | ||
load_modules.py | ||
messages.py | ||
parse.py | ||
readme.md | ||
scan_targets.py | ||
socks_proxy.py | ||
targets.py | ||
time.py | ||
utility.py |
readme.md
OWASP Nettacker core functions
OWASP Nettacker core functions are stored in here.
alert.py
user alerts and printing functionsargs_loader.py
ARGV commands and apply rulescolor.py
color founds for windows and linux/maccompatible.py
compatibility functionsdie.py
exit functionsgraph.py
graph representationip.py
IPv4 and IPv6 functionsload_modules.py
load modules, requirements, paths functionsmessages.py
class messagesparse.py
parse the ARGV and pass itscan_targets.py
start new attacks and multi-processing managementssocks_proxy.py
use SOCKS5 proxytargets.py
process, calculate and count targetstime.py
time functionsutility.py
support functions