mirror of
https://github.com/reiyua/Gelos80Sniff.git
synced 2026-01-20 08:17:47 +00:00
Various edits
Signed-off-by: Rayyan (Ray) Hodges <rayyan.hodges@studytafensw.edu.au>
This commit is contained in:
parent
246c68ccc3
commit
3f6adc2e00
1 changed files with 3 additions and 0 deletions
|
|
@ -2,4 +2,7 @@
|
||||||
# rayyan.hodges@studytafensw.edu.au
|
# rayyan.hodges@studytafensw.edu.au
|
||||||
# This program is coded in Python and designed to scan the local network for any clients connected that have port 80 open.
|
# This program is coded in Python and designed to scan the local network for any clients connected that have port 80 open.
|
||||||
# If a machine is found to have port 80 open, proceed to use programs like GoBuster and dirb to check for hidden directories without proper security in place and exploit.
|
# If a machine is found to have port 80 open, proceed to use programs like GoBuster and dirb to check for hidden directories without proper security in place and exploit.
|
||||||
|
# Results are exported to a CSV file for convenience.
|
||||||
|
|
||||||
|
# Required modules to import
|
||||||
|
import csv
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue