mirror of https://github.com/OWASP/Nettacker.git
Correct module name
This commit is contained in:
parent
f1ac6174d0
commit
af2c05bdb8
|
|
@ -39,7 +39,7 @@ from database.db import logs_to_report_json
|
|||
from database.db import search_logs
|
||||
from database.db import logs_to_report_html
|
||||
from config import nettacker_global_config
|
||||
from core.scan_targers import start_scan_processes
|
||||
from core.scan_targets import start_scan_processes
|
||||
from core.args_loader import check_all_required
|
||||
|
||||
app = Flask(
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
# -*- coding: utf-8 -*-
|
||||
|
||||
|
||||
from core.scan_targers import start_scan_processes
|
||||
from core.scan_targets import start_scan_processes
|
||||
from core.alert import info
|
||||
from core.alert import write
|
||||
from core.alert import messages
|
||||
|
|
|
|||
|
|
@ -3,20 +3,18 @@ OWASP Nettacker core functions
|
|||
|
||||
OWASP Nettacker core functions are stored in here.
|
||||
|
||||
* `die.py` exit functions
|
||||
* `time.py` time functions
|
||||
* `alert.py` user alerts and printing functions
|
||||
* `args_loader.py` ARGV commands and apply rules
|
||||
* `attack.py` start new attacks and multi-processing managements
|
||||
* `color.py` color founds for windows and linux/mac.
|
||||
* `color.py` color founds for windows and linux/mac
|
||||
* `compatible.py` compatibility functions
|
||||
* `config.py` user configs (could be modify by user)
|
||||
* `config_builder.py` core static configs (same as user configs but should not be change by users)
|
||||
* `get_input.py` get inputs from users functions
|
||||
* `die.py` exit functions
|
||||
* `graph.py` graph representation
|
||||
* `ip.py` IPv4 and IPv6 functions
|
||||
* `load_modules` load modules, requirements, paths functions
|
||||
* `log.py` log the scans and generate reports
|
||||
* `load_modules.py` load modules, requirements, paths functions
|
||||
* `messages.py` class messages
|
||||
* `parse.py` parse the ARGV and pass it
|
||||
* `targets.py` process, calculate and count targets
|
||||
* `update.py` updates functions of the framework
|
||||
* `wizard.py` wizard mode for the framework
|
||||
* `scan_targets.py` start new attacks and multi-processing managements
|
||||
* `socks_proxy.py` use SOCKS5 proxy
|
||||
* `targets.py` process, calculate and count targets
|
||||
* `time.py` time functions
|
||||
* `utility.py` support functions
|
||||
|
|
@ -32,7 +32,7 @@ def expand_targets(options, scan_unique_id):
|
|||
Returns:
|
||||
a generator
|
||||
"""
|
||||
from core.scan_targers import multi_processor
|
||||
from core.scan_targets import multi_processor
|
||||
targets = []
|
||||
for target in options.targets:
|
||||
if '://' in target:
|
||||
|
|
|
|||
Loading…
Reference in New Issue