From c8cde2ad347b01d19bfbbc506582e48bcf062d21 Mon Sep 17 00:00:00 2001 From: WP Engine Marketing Date: Wed, 7 Nov 2018 09:29:50 -0700 Subject: [PATCH] Sn1per by @xer0dayz --- CHANGELOG.md | 1 + modes/osint.sh | 4 ++-- sniper | 1 + 3 files changed, 4 insertions(+), 2 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index b9a5070..a425966 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,4 +1,5 @@ ## CHANGELOG: +* v5.8 - Fixed missing osint directory/file paths * v5.7 - Added libSSH auth bypass scanner CVE-2018-10933 * v5.7 - Added HTTP PUT method RCE MSF exploit * v5.7 - Added sniper.conf scan configuration file to customize sniper environments by user diff --git a/modes/osint.sh b/modes/osint.sh index 2d3aee8..1d3561f 100644 --- a/modes/osint.sh +++ b/modes/osint.sh @@ -2,6 +2,6 @@ if [ "$OSINT" = "1" ]; then echo -e "${OKGREEN}====================================================================================${RESET}" echo -e "$OKRED GATHERING OSINT INFO $RESET" echo -e "${OKGREEN}====================================================================================${RESET}" - python2.7 $THEHARVESTER -d $TARGET -l 100 -b all 2> /dev/null | tee $LOOT_DIR/osint/theharvester-$TARGET.txt - metagoofil -d $TARGET -t doc,pdf,xls,csv,txt -l 25 -n 25 -o $LOOT_DIR/osint/ -f $LOOT_DIR/osint/$TARGET.html 2> /dev/null | tee $LOOT_DIR/osint/metagoofil-$TARGET.txt + python2.7 $THEHARVESTER -d $TARGET -l 100 -b all 2> /dev/null | tee $LOOT_DIR/osint/theharvester-$TARGET.txt 2> /dev/null + metagoofil -d $TARGET -t doc,pdf,xls,csv,txt -l 25 -n 25 -o $LOOT_DIR/osint/ -f $LOOT_DIR/osint/$TARGET.html 2> /dev/null | tee $LOOT_DIR/osint/metagoofil-$TARGET.txt 2> /dev/null fi \ No newline at end of file diff --git a/sniper b/sniper index e6d8464..8e6c324 100755 --- a/sniper +++ b/sniper @@ -277,6 +277,7 @@ function init { mkdir $LOOT_DIR/reports 2> /dev/null mkdir $LOOT_DIR/output 2> /dev/null mkdir $LOOT_DIR/credentials 2> /dev/null + mkdir $LOOT_DIR/osint 2> /dev/null mkdir $LOOT_DIR/vulnerabilities 2> /dev/null mkdir $LOOT_DIR/exploits 2> /dev/null mkdir $LOOT_DIR/web 2> /dev/null