author = 'WaQas-JaMal'
Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) & The author disclaims copyright to this source code.
'''
I have modified this script to take any input url file. Check it for valid tld from provided set of urls, create unique set and parse that to the script for checking heartbleed vulnerability.
[For Contact: contact at waqasjamal dot com]
'''
#Update Script now only clean URL instead of checking for valid tld. Output Improved as well.
#Installation Guide You do no need to install anything extra in order to test this script
python check_heartbleed.py filename 10
#Tasks to do
- Include IP in the list as well (It should be working now)
- Multi threaded code
- Try URL Parse instead of tld library (Done)