Fixed the following bug and other relevant error in nosql web attack.
_ ___ ___ _ __ __
| \| |___/ __|/ _ \| | | \/ |__ _ _ __
| .` / _ \__ \ (_) | |__| |\/| / _` | '_ \
|_|\_\___/___/\__\_\____|_| |_\__,_| .__/
v0.7 codingo@protonmail.com |_|
1-Set options
2-NoSQL DB Access Attacks
3-NoSQL Web App attacks
4-Scan for Anonymous MongoDB Access
5-Change Platform (Current: MongoDB)
x-Exit
Select an option: 3
Web App Attacks (GET)
===============
Checking to see if site at http://juice-shop.herokuapp.com:80/#/track-result?id=juice-shop.herokuapp.com/#/track-result … is up...
App is up!
Baseline test-Enter random string size: 5
What format should the random string take?
1-Alphanumeric
2-Letters only
3-Numbers only
4-Email address
Select an option: 1
Select an option: 1
Select an option: 1
Select an option: 1
Select an option: 1
Select an option: 1
Select an option: 1
Select an option: 1
Select an option: 1
Select an option: 1
Select an option: 1
Select an option:
Fixed the following bug and other relevant error in nosql web attack.