-
Install Python3 and pip Instructions Here (If you can't figure this out, you shouldn't really be using this)
- Install via pip
-
pip install CVE-2024-0352
-
- Run bellow command to check
CVE-2024-0352 -h
- Install via pip
-
We integrated with the Telegram API to receive instant notifications for vulnerability detection.
- Telegram Notification
-
CVE-2024-0352 --chatid <YourTelegramChatID>
-
- Open your telegram and search for
@CappricioSecuritiesTools_bot
and click start
- Telegram Notification
-
This tool has multiple use cases.
- To Check Single URL
-
CVE-2024-0352 -u http://example.com
-
- To Check List of URL
-
CVE-2024-0352 -i urls.txt
-
- Save output into TXT file
-
CVE-2024-0352 -i urls.txt -o out.txt
-
- Want to Learn about
CVE-2024-0352
? Then Type Below command-
CVE-2024-0352 -b
-
- To Check Single URL
🚨 Disclaimer
This tool is created for security bug identification and assistance; Cappricio Securities is not liable for any illegal use. Use responsibly within legal and ethical boundaries. 🔐🛡️
👋 Hey Hacker
v1.0
_______ ________ ___ ____ ___ __ __ ____ _____ _________
/ ____/ | / / ____/ |__ \ / __ \__ \/ // / / __ \__ // ____/__ \
/ / | | / / __/________/ // / / /_/ / // /_______/ / / //_ </___ \ __/ /
/ /___ | |/ / /__/_____/ __// /_/ / __/__ __/_____/ /_/ /__/ /___/ // __/
\____/ |___/_____/ /____/\____/____/ /_/ \____/____/_____//____/
Developed By https://cappriciosec.com
CVE-2024-0352 : Bug scanner for WebPentesters and Bugbounty Hunters
$ CVE-2024-0352 [option]
Usage: CVE-2024-0352 [options]
Argument | Type | Description | Examples |
---|---|---|---|
-u |
--url |
URL to scan | CVE-2024-0352 -u https://target.com |
-i |
--input |
filename Read input from txt | CVE-2024-0352 -i target.txt |
-o |
--output |
filename Write output in txt file | CVE-2024-0352 -i target.txt -o output.txt |
-c |
--chatid |
Creating Telegram Notification | CVE-2024-0352 --chatid yourid |
-b |
--blog |
To Read about CVE-2024-0352 Bug | CVE-2024-0352 -b |
-h |
--help |
Help Menu | CVE-2024-0352 -h |
If you have any feedback, please reach out to us at [email protected]