#Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49
https://github.com/RyouYoo/CVE-2021-41773
#poc for CVE-2021-41773 with docker to demonstrate
https://github.com/habibiefaried/CVE-2021-41773-PoC
#poc CVE-2021-41773
https://github.com/trungnd51/CVE-2021-41773
CVE-2021-41773 nse
https://github.com/creadpag/cve-2021-41773-nse
https://github.com/RyouYoo/CVE-2021-41773
#poc for CVE-2021-41773 with docker to demonstrate
https://github.com/habibiefaried/CVE-2021-41773-PoC
#poc CVE-2021-41773
https://github.com/trungnd51/CVE-2021-41773
CVE-2021-41773 nse
https://github.com/creadpag/cve-2021-41773-nse
A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public
https://github.com/HightechSec/scarce-apache2
CVE-2021-26084 - Confluence Server Webwork OGNL injection
https://github.com/oxctdev/CVE-2021-26084
https://github.com/HightechSec/scarce-apache2
CVE-2021-26084 - Confluence Server Webwork OGNL injection
https://github.com/oxctdev/CVE-2021-26084
لتثبيت نظام لينكس الفرعي wslg
https://github.com/microsoft/wslg
windows terminal
https://github.com/microsoft/terminal
https://github.com/microsoft/wslg
windows terminal
https://github.com/microsoft/terminal
arsenal.zip
200.9 KB
#arsenal
git clone https://github.com/Orange-Cyberdefense/arsenal
# cd arsenal
# pip install -r requirements.txt
# ./run
or # cd mindmap
git clone https://github.com/Orange-Cyberdefense/arsenal
# cd arsenal
# pip install -r requirements.txt
# ./run
or # cd mindmap
Tool to discover external and internal network attack surface
متطلبات أساسية
Latest version of Kali Linux
16 GB of RAM at least
1 TB HD - XFS filesystem recommended
As root
git clone https://github.com/vmware-labs/attack-surface-framework.git /opt/asf
# cd /opt/asf/
# ./setup.sh
Assign youruser, email and yourpass Once the installation is completed
# cd /opt/asf/frontend/asfgui/
# bin/activate
# python3 manage.py runserver
and set server
متطلبات أساسية
Latest version of Kali Linux
16 GB of RAM at least
1 TB HD - XFS filesystem recommended
As root
git clone https://github.com/vmware-labs/attack-surface-framework.git /opt/asf
# cd /opt/asf/
# ./setup.sh
Assign youruser, email and yourpass Once the installation is completed
# cd /opt/asf/frontend/asfgui/
# bin/activate
# python3 manage.py runserver
and set server
Metasploit modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49/2.4.50)
https://github.com/Zeop-CyberSec/apache_normalize_path/commits/master
Apachuk - CVE-2021-41773 Grabber with Shodan
https://github.com/apapedulimu/Apachuk
https://github.com/Zeop-CyberSec/apache_normalize_path/commits/master
Apachuk - CVE-2021-41773 Grabber with Shodan
https://github.com/apapedulimu/Apachuk
Remote Code Execution V1 For iOS 15 sent through airdrop after the device was connected to a trusted host
https://github.com/jonathandata1/ios_15_rce
Bindiff and POC for the IOMFB vulnerability, iOS 15.0.2
https://saaramar.github.io/IOMFB_integer_overflow_poc/
https://github.com/jonathandata1/ios_15_rce
Bindiff and POC for the IOMFB vulnerability, iOS 15.0.2
https://saaramar.github.io/IOMFB_integer_overflow_poc/
Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
https://github.com/im-hanzou/apachrot
https://github.com/im-hanzou/apachrot
CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)
https://github.com/rjt-gupta/CVE-2021-29337
https://github.com/rjt-gupta/CVE-2021-29337
Scan installed EDRs and AVs on Windows https://github.com/FourCoreLabs/EDRHunt
#kill_edr
A tool to kill antimalware protected processes https://github.com/Yaxser/Backstab
#kill_edr
A tool to kill antimalware protected processes https://github.com/Yaxser/Backstab