cyberchiranjit / CMSMadeSimplePython3

CMS Made Simple SQL Injection Exploit Python3 Conversion repository, maintained by Chiranjit Ghosh, also known as "cyberchiranjit." This project aims to provide a Python3-compatible version of the original SQL Injection exploit script for CMS Made Simple, which was originally written in Python2 by the author Daniele Scanu.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CMS Made Simple SQL Injection Exploit Python3 Conversion

Welcome to the CMS Made Simple SQL Injection Exploit Python3 Conversion repository, maintained by Chiranjit Ghosh, also known as "cyberchiranjit." This project aims to provide a Python3-compatible version of the original SQL Injection exploit script for CMS Made Simple, which was originally written in Python2 by the author Daniele Scanu.

Project Objective

The primary goal of this repository is to enhance the usability and reliability of the CMS Made Simple SQL Injection exploit script by converting it to Python3. As Python2 has reached its end of life and may no longer be supported by various systems and libraries, this conversion is crucial to ensure the script remains effective for security professionals, researchers, and ethical hackers.

Key Features

  • Python3 Compatibility: The original script by Daniele Scanu was written in Python2, which can pose compatibility issues. This repository provides a Python3 version that is compatible with modern Python environments.

  • Error Resolution: Many users faced errors and issues while using the Python2 script. By providing a Python3-compatible version, we aim to reduce errors and make the exploit script more accessible to a wider audience.

  • Security Research: This project is intended for educational and security research purposes only. It allows security professionals and ethical hackers to study the vulnerabilities present in older CMS Made Simple versions and raise awareness of the importance of keeping software up to date.

How to Use

To use the Python3 version of the CMS Made Simple SQL Injection exploit script, follow these steps:

  1. Clone this repository using the following command:

    git clone https://github.com/cyberchiranjit/CMSMadeSimplePython3.git
  2. Navigate to the cloned repository:

    cd CMSMadeSimplePython3
  3. Run the exploit script by providing the target IP address using the -u flag:

    python exploitCVE-2019-9053.py -u target_ip

Make sure to replace target_ip with the actual IP address of the CMS Made Simple installation you want to test. Ensure that you have the necessary permissions and authorization to conduct security testing.

Contributions

Contributions from the open-source community are highly encouraged. If you have suggestions, improvements, or fixes, please submit pull requests or open issues. Let's work together to improve the security of web applications.

Disclaimer

This project is meant for educational and research purposes only. It is crucial to obtain proper authorization before testing or using this script on any system or website. The maintainers and contributors of this repository are not responsible for any misuse or illegal activities.

About

CMS Made Simple SQL Injection Exploit Python3 Conversion repository, maintained by Chiranjit Ghosh, also known as "cyberchiranjit." This project aims to provide a Python3-compatible version of the original SQL Injection exploit script for CMS Made Simple, which was originally written in Python2 by the author Daniele Scanu.


Languages

Language:Python 100.0%