diff --git a/src/CommandDataConfig.php b/src/CommandDataConfig.php index 1e23061..36e3675 100644 --- a/src/CommandDataConfig.php +++ b/src/CommandDataConfig.php @@ -12,13 +12,13 @@ abstract class CommandDataConfig 'tor' => false, 'torl' => false, 'virginProxies' => false, - 'proxyOfSites' => false + 'proxyOfSites' => false, ]; public function __construct(array $commandData) { $this->commandData = array_merge($this->defaultCommandData, $commandData); - + if ($this->commandData['torl']) { $this->commandData['tor'] = $this->commandData['torl']; } @@ -29,4 +29,3 @@ public function output($value) echo $value; } } - diff --git a/src/CrossSiteScripting.php b/src/CrossSiteScripting.php index 0b611de..5ddb606 100644 --- a/src/CrossSiteScripting.php +++ b/src/CrossSiteScripting.php @@ -2,14 +2,13 @@ namespace Aszone\Vulnerabilities; -use Respect\Validation\Validator as v; use Aszone\FakeHeaders\FakeHeaders; use GuzzleHttp\Client; class CrossSiteScripting extends CommandDataConfig implements VulnerabilityScanner { - const EXPLOIT1 = ""; - const EXPLOIT2 = "