-
Install Python3 and pip Instructions Here (If you can't figure this out, you shouldn't really be using this)
- Install via pip
-
pip install CVE-2015-1635
-
- Run bellow command to check
CVE-2015-1635 -h
- Install via pip
-
We integrated with the Telegram API to receive instant notifications for vulnerability detection.
- Telegram Notification
-
CVE-2015-1635 --chatid <YourTelegramChatID>
-
- Open your telegram and search for
@CappricioSecuritiesTools_bot
and click start
- Telegram Notification
-
This tool has multiple use cases.
- To Check Single URL
-
CVE-2015-1635 -u http://example.com
-
- To Check List of URL
-
CVE-2015-1635 -i urls.txt
-
- Save output into TXT file
-
CVE-2015-1635 -i urls.txt -o out.txt
-
- Want to Learn about
CVE-2015-1635
? Then Type Below command-
CVE-2015-1635 -b
-
- To Check Single URL
🚨 Disclaimer
This tool is created for security bug identification and assistance; Cappricio Securities is not liable for any illegal use. Use responsibly within legal and ethical boundaries. 🔐🛡️
👋 Hey Hacker
v1.0
_______ ________ ___ ____ _________ _____________ ______
/ ____/ | / / ____/ |__ \ / __ < / ____/ < / ___/__ // ____/
/ / | | / / __/________/ // / / / /___ \______/ / __ \ /_ </___ \
/ /___ | |/ / /__/_____/ __// /_/ / /___/ /_____/ / /_/ /__/ /___/ /
\____/ |___/_____/ /____/\____/_/_____/ /_/\____/____/_____/
Developed By https://cappriciosec.com
CVE-2015-1635 : Bug scanner for WebPentesters and Bugbounty Hunters
$ CVE-2015-1635 [option]
Usage: CVE-2015-1635 [options]
Argument | Type | Description | Examples |
---|---|---|---|
-u |
--url |
URL to scan | CVE-2015-1635 -u https://target.com |
-i |
--input |
filename Read input from txt | CVE-2015-1635 -i target.txt |
-o |
--output |
filename Write output in txt file | CVE-2015-1635 -i target.txt -o output.txt |
-c |
--chatid |
Creating Telegram Notification | CVE-2015-1635 --chatid yourid |
-b |
--blog |
To Read about CVE-2015-1635 Bug | CVE-2015-1635 -b |
-h |
--help |
Help Menu | CVE-2015-1635 -h |
If you have any feedback, please reach out to us at [email protected]