This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.
☆56Aug 30, 2018Updated 7 years ago
Alternatives and similar repositories for Apache-Struts-Shodan-Exploit
Users that are interested in Apache-Struts-Shodan-Exploit are comparing it to the libraries listed below
Sorting:
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆123Aug 25, 2018Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆38Jan 24, 2020Updated 6 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- CVE-2018-2893-PoC☆104Oct 27, 2018Updated 7 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- 反弹shell生成器☆17Jul 23, 2018Updated 7 years ago
- CVE-2018-15982_PoC☆14Nov 6, 2019Updated 6 years ago
- ☆206Mar 28, 2021Updated 4 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆16Aug 29, 2018Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Força bruta em formulários web.☆19Feb 8, 2015Updated 11 years ago
- OSINT-compass is a powerful tool for collecting, organizing, and analyzing open-source information from various sources.☆17Apr 26, 2023Updated 2 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- ☆14May 12, 2021Updated 4 years ago
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆68Feb 3, 2020Updated 6 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- ☆11Aug 2, 2017Updated 8 years ago