Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/wangfly-me/Apache_Penetration_Tool
CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具
https://github.com/wangfly-me/Apache_Penetration_Tool
cve-2021-41773 cve-2021-42013 exp
Last synced: 21 days ago
JSON representation
CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具
- Host: GitHub
- URL: https://github.com/wangfly-me/Apache_Penetration_Tool
- Owner: wangfly-me
- Created: 2022-04-27T15:17:38.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-05-22T16:00:49.000Z (over 1 year ago)
- Last Synced: 2024-08-05T17:40:34.186Z (4 months ago)
- Topics: cve-2021-41773, cve-2021-42013, exp
- Homepage:
- Size: 18.9 MB
- Stars: 13
- Watchers: 2
- Forks: 0
- Open Issues: 2
-
Metadata Files:
- Readme: README-EN.md
Awesome Lists containing this project
- awesome-hacking-lists - wangfly-me/Apache_Penetration_Tool - CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具 (Others)
README
# Apache_Penetration_Tool
A vulnerability exploit tool developed using QT C++, for details of the vulnerability analysis, please refer to: https://www.hui-blog.cool/posts/de1f.html## Tool interface
At the vulnerability selection number, select the vulnerability that needs to be detected.
![1.png](https://github.com/wangfly-me/Apache_Penetration_Tool/blob/main/images/1.png)## Vulnerability detection
Fill in the target url or ip in the first text field, bring http or https, and the result will be displayed in the last large text box.
![2.png](https://github.com/wangfly-me/Apache_Penetration_Tool/blob/main/images/2.png)## Directory traversal
Fill in the absolute path of the file that needs to be read in the second text field, and the result will be displayed in the last large text box.
![3.png](https://github.com/wangfly-me/Apache_Penetration_Tool/blob/main/images/3.png)## Command execution
Fill in the command that needs to be executed in the third text field, and the result will be displayed in the last large text box.
![4.png](https://github.com/wangfly-me/Apache_Penetration_Tool/blob/main/images/4.png)## Bounce shell
First use nc to enable monitoring, and then fill in the ip and port to complete the rebound.
![5.png](https://github.com/wangfly-me/Apache_Penetration_Tool/blob/main/images/5.png)