Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/oppsec/zaber
🕵️ Yet another CVE-2019-9670 exploit, but in Golang.
https://github.com/oppsec/zaber
blueteam cve cve-2019-9670 exploit go golang redteam vulnerability zimbra
Last synced: about 2 months ago
JSON representation
🕵️ Yet another CVE-2019-9670 exploit, but in Golang.
- Host: GitHub
- URL: https://github.com/oppsec/zaber
- Owner: oppsec
- License: mit
- Created: 2022-08-15T00:54:44.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2022-09-05T14:46:11.000Z (over 2 years ago)
- Last Synced: 2024-06-20T22:33:53.233Z (7 months ago)
- Topics: blueteam, cve, cve-2019-9670, exploit, go, golang, redteam, vulnerability, zimbra
- Language: Go
- Homepage: https://www.zimbra.com/
- Size: 79.1 KB
- Stars: 5
- Watchers: 2
- Forks: 4
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# 🕵️ Zaber
> Yet another CVE-2019-9670 exploit, but in Golang
___
### 🕵️ What is Zaber?
🕵️ **Zaber** is a Golang tool created to exploit the vulnerability defined as CVE-2019-9670 (XXE in Zimbra Collaboration 8.7.X < 8.7.11p10)
### ⚡ Installing / Getting started
A quick guide of how to install and use Zaber.
```shell
1. go install github.com/oppsec/zaber
2. zaber -u https://example.com
```You can use `go install github.com/oppsec/zaber@latest` to update the tool
### ⚙️ Pre-requisites
- [Golang](https://go.dev/dl/) installed on your machine.
### ✨ Features
- Extremely fast
- Low RAM and CPU usage
- Made in Go
### 🔨 Contributing
A quick guide of how to contribute with the project.
```shell
1. Create a fork from Zaber repository.
2. Download the project with git clone https://github.com/your/zaber.git
3. cd zaber/
4. Make your changes.
5. Commit and make a git push.
6. Open a pull request.
```
### ⚠️ Warning
- The developer is not responsible for any malicious use of this tool.