• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Vulmap v0.8 - Web vulnerability scanning and verification tools

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,605
Solutions
2
Reputation
32
Reaction score
100,452
Points
2,313
Credits
32,570
‎6 Years of Service‎
 
76%
vulmap-0.5-demo-gif.gif


Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS and other Web programs, and has vulnerability exploitation functions. Relevant testers can use vulmap to detect whether the target has a specific vulnerability, and can use the vulnerability exploitation function to verify whether the vulnerability actually exists.

It currently has vulnerability scanning (poc) and exploiting (exp) modes. Use “-m” to select which mode to use, and the default poc mode is the default. In poc mode, it also supports “-f” batch target scanning, “-o” File output results and other main functions, Other functions Options Or python3 vulmap.py -h, the Poc function will no longer be provided in the exploit mode, but the exploit will be carried out directly, and the exploit result will be fed back to further verify whether the vulnerability exists and whether it can be exploited.

Changelog v0.8

    Support scanning dismap recognition result file -f output.txt
    Added coremail, ecology, eyou, qianxin, ruijie vulnerabilities in categories
    POC added Apache OFBiz CVE-2021-29200 CVE-2021-30128
    POC added Apache Solr CVE-2021-27905
    POC added Fastjson echo VER-1224-2 VER-1224-3
    POC added Oracle Weblogic CVE-2016-0638 CVE-2018-3191 CVE-2019-2890


To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top