| skipped 25 lines |
26 | 26 | | print(output) |
27 | 27 | | self.wfile.write(output.encode()) |
28 | 28 | | |
29 | | - | |
30 | 29 | | self.pool.close() |
| 30 | + | print('[$] Closing connection from {}\n'.format(self.client_address[0])) |
31 | 31 | | self.pool.join() |
32 | | - | print('[$] Closing connection from {}\n'.format(self.client_address[0])) |
33 | 32 | | except Exception as e: |
34 | 33 | | self.pool.terminate() |
35 | 34 | | self.wfile.write('{{"SEARCH":"ERROR", "RESULTS":"{}"}}'.format(e).encode()) |
| skipped 30 lines |
66 | 65 | | if __name__ == "__main__": |
67 | 66 | | #parse the args |
68 | 67 | | parser = argparse.ArgumentParser() |
69 | | - | parser.add_argument("-i", "--ip", help="Ip to listen on", required=True) |
70 | | - | parser.add_argument("-p", "--port", help="Port to listen on", required=True) |
| 68 | + | parser.add_argument("-i", "--ip", help="Ip to listen on") |
| 69 | + | parser.add_argument("-p", "--port", help="Port to listen on") |
71 | 70 | | parser.add_argument("-f", "--file", help="The exploit csv to use") |
72 | 71 | | args = parser.parse_args() |
73 | 72 | | if args.ip: |
| skipped 23 lines |