Files

parseExploitReqs.src
  • parseExploitRequirements = function(exploits)
  • getExploitNames = function(exploits)
  • exploits = exploits.split("Unsafe check: ")[1:]
  • for i in range(exploits.len - 1)
  • exploits[i] = exploits[i].split("<b>")[1].split("</b>")[0]
  • end for
  • return exploits
  • end function
  • getExploitRequirementType = function(requirement)
  • if not requirement.indexOf("an active user") == null then return "activeUser"
  • if not requirement.indexOf("root active user") == null then return "activeRoot"
  • if not requirement.indexOf("registered users equal") == null then return "registeredUsers:" + requirement.split("to ")[1].split("\.")[0]
  • if not requirement.indexOf("port forwarding") == null then return "portForwards:" + requirement.split(" port forwarding")[0].replace(" ","")
  • if not requirement.indexOf("namespace") == null then return ("namespace:" + requirement.split("namespace ")[1].split(" compiled")[0] + ":" + requirement.split(">= ")[1].replace(" ","")).replace("<b>","").replace("</b>","")
  • return "0"
  • end function
  • getCurrentRequirements = function(exploit)
  • reqs = exploit.split("\*")[1:]
  • if reqs.len == 0 then return []
  • for i in range(reqs.len - 1)
  • reqs[i] = getExploitRequirementType(reqs[i])
  • end for
  • return reqs
  • end function
  • ExploitNames = getExploitNames(exploits)
  • ExploitRequirements = exploits.split("Unsafe check: ")[1:]
  • ExploitRequirements = exploits.split("Unsafe check: ")[1:]
  • ExploitRequirements.applyFunction(@getCurrentRequirements)
  • Exploits = {}
  • for i in range(ExploitNames.len - 1)
  • Exploits[ExploitNames[i]] = ExploitRequirements[i]
  • end for
  • return Exploits
  • end function