Apache | Apache_Penetration_Tool | https://github.com/wangfly-me/Apache_Penetration_Tool | CVE-2021-41773&CVE-2021-42013图形化漏洞 检测利用工具 |
Apereo CAS | Cas_Exploit | https://gitee.com/keyboxdzd/Cas_Exploit | 4.1.X和4.2.X存在反序列化漏洞 |
Apache Dubbo | dubbo扫描工具 | https://github.com/YYHYlh/Dubbo-Scan | Apache Dubbo 漏洞检测工具 |
GeoServer | GeoServer sql注入漏洞 | https://github.com/win3zz/CVE-2023-25157 | sql注入漏洞 CVE-2023-25157 |
gitlab | gitlab任意文件读取 | https://github.com/thewhiteh4t/cve-2020-10977 | GitLab 12.9.0 Arbitrary File Read |
gitlab远程命令执行 | https://github.com/Al1ex/CVE-2021-22205 | CVE-2021-22205 |
jboss | jboss反序列化工具 | https://github.com/s0k/Deserialize | jboss反序列化工具 |
未授权/弱口令检测 | https://github.com/rambleZzz/jmxbfGUI | 未授权/弱口令检测 |
jboss漏洞检测工具 | https://github.com/Ye4r/JbossExploit | jboss漏洞检测工具 |
Jenkins | Jenkins 远程代码执行漏洞 | https://github.com/vulhub/CVE-2017-1000353/ | CVE-2017-1000353 (远程代码执行) |
Jenkins 远程代码执行漏洞 | https://github.com/orangetw/awesome-jenkins-rce-2019 | CVE-2018-1000861(远程代码执行) |
minio | 敏感信息泄露 | https://github.com/MzzdToT/CVE-2023-28432 | 敏感信息泄露 |
nacos | 综合利用工具 | https://github.com/charonlight/NacosExploitGUI | 综合利用工具 |
反序列化工具 | https://github.com/c0olw/NacosRce | 反序列化工具 |
Apache RocketMQ | 远程漏洞执行 | https://github.com/SuperZero/CVE-2023-33246 | CVE-2023-33246 |
shiro | shiro550工具 | https://github.com/j1anFen/shiro_attack | shiro550 |
https://github.com/SummerSec/ShiroAttack2 |
https://www.aliyundrive.com/s/ALnnGVKfFT9 |
https://github.com/feihong-cs/ShiroExploit-Deprecated/ |
springboot | SpringExploit | https://github.com/SummerSec/SpringExploit | 综合利用工具 |
spring gateway远程执行代码 | https://github.com/SummerSec | 内存马大杀器(CVE-2022-22947) |
SBSCAN | https://github.com/sule01u/SBSCAN | SBSCAN是一款专注于spring框架的渗透测试工具 |
thinkphp | 利用工具 | https://github.com/zangcc/Aazhen-RexHa | thinkphp自动化检查器 |
https://github.com/Lotus6/ThinkphpGUI |
https://github.com/safe6Sec/ThinkPHPLogScan |
https://github.com/bewhale/thinkphp_gui_tools |
tomcat | ApacheTomcatScanner | https://github.com/p0dalirius/ApacheTomcatScanner | tomcat测试工具 |
Vcenter | VcenterKiller | https://github.com/Schira4396/VcenterKiller | 一款针对Vcenter的综合利用工具 |
VcenterKit | https://github.com/W01fh4cker/VcenterKit | Vcenter综合渗透利用工具包 |
Weblogic | WeblogicTool | https://github.com/KimJun1010/WeblogicTool | WeblogicTool,GUI漏洞利用工具 |
WeblogicExploit-GUI | https://github.com/sp4zcmd/WeblogicExploit-GUI | Weblogic漏洞利用图形化工具 |
webpack | Packer-Fuzzer-Plus | https://github.com/BigYoungs/Packer-Fuzzer-Plus | 一款针对Webpack等前端打包工具所构造的网站进行快速、高效安全检测的扫描工具 |
Packer-Fuzzer | https://github.com/rtcatc/Packer-Fuzzer | 一款针对Webpack等前端打包工具所构造的网站进行快速、高效安全检测的扫描工具 |
URLFinder | https://github.com/pingc0y/URLFinder | 全面提取网站页面的接口 |
wordpress | wpscan | kali里自带 | wordpress扫描神器 |
wsdl | SoapUI | https://www.soapui.org/ | 接口测试神器 |
wsdler | burp商店下载 | 接口测试 |
ReadyAPI | 自行获取 | 接口测试 |
K8s | k8sUnauthorizedAccessScanner | https://github.com/b0bac/k8sUnauthorizedAccessScanner | kubernetes未授权访问漏洞扫描 |
redis | RedisWriteFile | https://github.com/r35tart/RedisWriteFile | 通过 Redis 主从写出无损文件 |
redis-dump-go | https://github.com/yannh/redis-dump-go | 备份和恢复Redis服务器 - FAST |
Apache Solr | solr_rce | https://github.com/jas502n/solr_rce | Solr RCE 利用工具 |
金蝶Apusic应用服务器 | Kingdee_Apusic_AppServer_Upload_File_Poc | https://github.com/MD-SEC/MDPOCS/blob/main/Kingdee_Apusic_AppServer_Upload_File_Poc.py | 金蝶Apusic应用服务器deployApp接口任意文件上传 |
jenkins | Jenkins_Credentials_Crack | https://github.com/rabbitmask/Jenkins_Credentials_Crack | jenkins解密工具 |