Sahabalam

Results 3 issues of Sahabalam

Traceback (most recent call last): File "/.BurpSuite/bapps/444407b96d9c4de0adb7aed89e826122/403Bypasser.py", line 4, in from javax.swing import JPanel, JButton, JList, JTable, table, JLabel, JScrollPane, JTextField, WindowConstants, GroupLayout, LayoutStyle, JFrame ImportError: cannot import name table...

Running : Nuclei high panic: runtime error: integer divide by zero goroutine 10640 [running]: github.com/projectdiscovery/retryabledns.(*Client).Do(0xc00067b380, 0x1?) /home/kali/go/pkg/mod/github.com/projectdiscovery/[email protected]/client.go:109 +0x32e github.com/projectdiscovery/nuclei/v2/pkg/protocols/dns.(*Request).ExecuteWithResults(0xc004524b40, {0xc0073175f0, 0x2b}, 0xc004cce7b0?, 0xc004cce7e0?, 0xc004cce810) /home/kali/go/pkg/mod/github.com/projectdiscovery/nuclei/[email protected]/pkg/protocols/dns/request.go:83 +0x725 github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/executer.(*Executer).Execute(0xc005393860, {0xc0073175f0, 0x2b}) /home/kali/go/pkg/mod/github.com/projectdiscovery/nuclei/[email protected]/pkg/protocols/common/executer/executer.go:68...

Type: Bug
Type: Question

EXPLOITATION Visit http://localhost:8082/xxe to access the vulnerable web application Use http://attackerserver-php:8888/ to access the attacker hosting server from the vulnerable web app. DEBUGGING +---------------------------------+----------------------------------------------------------+ | docker containers | How to...