GhostTroops / scan4all

Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
https://scan4all.51pwn.com
BSD 3-Clause "New" or "Revised" License
5.44k stars 651 forks source link

Installation error for 2.9.1 #171

Open jesse-zhangh opened 8 months ago

jesse-zhangh commented 8 months ago

go version go version go1.21.5 linux/amd64

OS Ubuntu 22.04

How can I solve this error? thanks

Error $ go install github.com/GhostTroops/scan4all@2.9.1 go: downloading github.com/GhostTroops/scan4all v0.0.0-20231221140312-fff03b51bf79 go: github.com/GhostTroops/scan4all@2.9.1: create zip: config/51pwn/CVE-2020–26073.yaml: malformed file path "config/51pwn/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/LFI/CVE-2018–14064.yaml: malformed file path "config/51pwn/TPALL/LFI/CVE-2018–14064.yaml": invalid char '–' config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml": invalid char '–' config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml: malformed file path "config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml": invalid char '(' config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml: malformed file path "config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml": invalid char '(' config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml: malformed file path "config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml": invalid char '(' config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml: malformed file path "config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml": invalid char '(' config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml: malformed file path "config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml": invalid char '(' config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml: malformed file path "config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml": invalid char '('

0xchoudhary commented 8 months ago

I am getting the same issue

CutePlusPanda commented 6 months ago

I am getting the same issue

1neZe0 commented 6 months ago

I am getting the same issue

ByZain commented 4 months ago

I also encountered the same problem

alpsrml commented 1 month ago

update ?????