diff --git a/.gitignore b/.gitignore index 813aca6..9d6041a 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,4 @@ +results/* vendor/* cookie.txt composer.lock diff --git a/src/SearchHackingEngine.php b/src/SearchHackingEngine.php index 5b0b280..7cb77a0 100644 --- a/src/SearchHackingEngine.php +++ b/src/SearchHackingEngine.php @@ -381,14 +381,21 @@ protected function checkVunerabilities($nameFile, $result, $commandData, OutputI } protected function runExploit($result, $commandData, OutputInterface $output){ +<<<<<<< HEAD var_dump($result); +======= +>>>>>>> a644e4f75415640e9913140e26ebc0e9650d08ab if (in_array('lfd', $this->check)) { $output->writeln('********Executing command exploit*******'); $output->writeln('********Extract Files of Targets********'); $output->writeln('*-------------------------------------------------'); $output->writeln(''); $downloadFiles=new DownloadByLocalFileDownload($commandData); +<<<<<<< HEAD foreach($result['lfd'] as $url){ +======= + foreach($result as $url){ +>>>>>>> a644e4f75415640e9913140e26ebc0e9650d08ab $output->writeln('*-------------------------------------------------'); $output->writeln('Target => '.$url.''); $arrDwonloadFiles=$downloadFiles->getAllFiles($url);