Note: Use this exploit only on targets you are authorized to test. Any unauthorized/illegal use of this exploit is strictly prohibited and is not condoned. Strictly to be used only for educational and authorized pentesting engagements
This exploit analyzes if the /.svn/wc.db file is exposed and if they are exposed, it automatically fetches the source code of the vulnerable target web application.
Usage: ./optimizedExploit.sh