diff --git a/sherlock/notify.py b/sherlock/notify.py index 65502abb..3e550fd7 100644 --- a/sherlock/notify.py +++ b/sherlock/notify.py @@ -245,8 +245,8 @@ class QueryNotifyPrint(QueryNotify): Fore.RED + "?" + Fore.WHITE + "]" + Fore.GREEN + f" {self.result.site_name}:" + - Fore.RED + f" Blocked by WAF" + - Fore.YELLOW + " (proxy recommended)") + Fore.RED + " Blocked by bot detection" + + Fore.YELLOW + " (proxy may help)") else: # It should be impossible to ever get here... diff --git a/sherlock/sherlock.py b/sherlock/sherlock.py index 93fafff4..fa927cc1 100644 --- a/sherlock/sherlock.py +++ b/sherlock/sherlock.py @@ -382,7 +382,8 @@ def sherlock( # and negatives. Fingerprints should be added here to filter results that fail to bypass WAFs. # Fingerprints should be highly targetted. Comment at the end of each fingerprint to indicate target and date. WAFHitMsgs = [ - '.loading-spinner{visibility:hidden}body.no-js .challenge-running{display:none}body.dark{background-color:#222;color:#d9d9d9}body.dark a{color:#fff}body.dark a:hover{color:#ee730a;text-decoration:underline}body.dark .lds-ring div{border-color:#999 transparent transparent}body.dark .font-red{color:#b20f03}body.dark .big-button,body.dark .pow-button{background-color:#4693ff;color:#1d1d1d}body.dark #challenge-success-text{background-image:url(data:image/svg+xml;base64,' # 2024-04-08 Cloudflare + '.loading-spinner{visibility:hidden}body.no-js .challenge-running{display:none}body.dark{background-color:#222;color:#d9d9d9}body.dark a{color:#fff}body.dark a:hover{color:#ee730a;text-decoration:underline}body.dark .lds-ring div{border-color:#999 transparent transparent}body.dark .font-red{color:#b20f03}body.dark .big-button,body.dark .pow-button{background-color:#4693ff;color:#1d1d1d}body.dark #challenge-success-text{background-image:url(data:image/svg+xml;base64,', # 2024-04-08 Cloudflare + '{return l.onPageView}}),Object.defineProperty(r,"perimeterxIdentifiers",{enumerable:' # 2024-04-09 PerimeterX / Human Security ] if error_text is not None: