Skip to content

This script demonstrates a critical flaw in the way Gofile handles and stores its files. The main objective of this script is to increase awareness and emphasize the importance of secure file handling practices for developers and website administrators.

License

Notifications You must be signed in to change notification settings

RocketGod-git/gofile-vulnerability-exploit-script

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Gofile Vulnerability Exploit Script 🕷️

This script demonstrates a critical flaw in the way the Gofile website handles and stores its files. The main objective of this script is to increase awareness and emphasize the importance of secure file handling practices for developers and website administrators. I learned about this flaw in discussions with @SkeletonMan03.

Disclaimer: This script is provided for educational purposes only. Use it responsibly and ethically. Unauthorized scanning and data access can be illegal.

📌 Table of Contents

🌐 Overview

The script performs the following steps:

  1. Generates a random 6-character alphanumeric string.
  2. Uses the Gofile API to check the validity of a constructed Gofile URL.
  3. If a valid URL is found, it sends a notification to a predefined Discord webhook.

🔧 Installation

  1. Ensure you have Python 3.x installed.
  2. Clone this repository:
    git clone https://github.com/RocketGod-git/gofile-vulnerability-exploit-script
  3. Navigate to the directory and open main.py in your preferred text editor.
    cd gofile-vulnerability-exploit-script
    nano main.py
    Or if Windows, use your favorite text editor to edit main.py.
  4. Locate the DISCORD_WEBHOOK_URL constant and replace "YOUR-DISCORD-WEBHOOK-GOES-HERE" with your own Discord webhook URL.
    DISCORD_WEBHOOK_URL = "YOUR-DISCORD-WEBHOOK-GOES-HERE"
  5. Save and close the file.
  6. Install the required libraries:
    pip install requests

🚀 Usage

Run the script using:

python main.py

Please note:

  • You might face rate-limiting issues; consider adjusting the sleep time accordingly. Default sleep is off.
  • Make sure to not misuse the script. Only scan or check URLs you have permission to.

👥 Contributing

Contributions, issues, and feature requests are welcome! Feel free to check issues page. Pull requests are always appreciated.

  1. Fork the project.
  2. Create your feature branch (git checkout -b feature/AmazingFeature).
  3. Commit your changes (git commit -m 'Add some AmazingFeature').
  4. Push to the branch (git push origin feature/AmazingFeature).
  5. Open a pull request.

📜 License

Distributed under the GPL-3.0 License. See LICENSE for more information.

rocketgod_logo

About

This script demonstrates a critical flaw in the way Gofile handles and stores its files. The main objective of this script is to increase awareness and emphasize the importance of secure file handling practices for developers and website administrators.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages