diff --git a/.gitignore b/.gitignore
index 813aca6..9d6041a 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,4 @@
+results/*
vendor/*
cookie.txt
composer.lock
diff --git a/src/SearchHackingEngine.php b/src/SearchHackingEngine.php
index 5b0b280..7cb77a0 100644
--- a/src/SearchHackingEngine.php
+++ b/src/SearchHackingEngine.php
@@ -381,14 +381,21 @@ protected function checkVunerabilities($nameFile, $result, $commandData, OutputI
}
protected function runExploit($result, $commandData, OutputInterface $output){
+<<<<<<< HEAD
var_dump($result);
+=======
+>>>>>>> a644e4f75415640e9913140e26ebc0e9650d08ab
if (in_array('lfd', $this->check)) {
$output->writeln('********Executing command exploit*******');
$output->writeln('********Extract Files of Targets********');
$output->writeln('*-------------------------------------------------');
$output->writeln('');
$downloadFiles=new DownloadByLocalFileDownload($commandData);
+<<<<<<< HEAD
foreach($result['lfd'] as $url){
+=======
+ foreach($result as $url){
+>>>>>>> a644e4f75415640e9913140e26ebc0e9650d08ab
$output->writeln('*-------------------------------------------------');
$output->writeln('Target => '.$url.'');
$arrDwonloadFiles=$downloadFiles->getAllFiles($url);