Projects STRLCPY 404StarLink Commits 62ef57df
🤬
  • weekly update at 2022-06-17

  • Loading...
  • xx committed 2 years ago
    62ef57df
    1 parent 42e11c6d
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 16 lines
    17 17   
    18 18  | 时间 | 项目名称 | 项目动态 |
    19 19  |----|-----------|--------------------------|
     20 +|2022-06-15|[**afrog**](detail/afrog.md)|afrog加入星链计划|
     21 +|2022-06-15|[**BinAbsInspector**](detail/BinAbsInspector.md)|BinAbsInspector加入星链计划|
    20 22  |2022-06-08|[**DNSlog-GO**](detail/DNSlog-GO.md)|更新 [v1.5.2](detail/DNSlog-GO.md#最近更新) 版本|
    21 23  |2022-06-07|[**pocsuite3**](detail/pocsuite3.md)|更新 [v1.9.4](detail/pocsuite3.md#最近更新) 版本|
    22 24  |2022-06-06|[**f8x**](detail/f8x.md)|更新 [v1.6.1](detail/f8x.md#最近更新) 版本|
    skipped 2 lines
    25 27  |2022-05-27|[**HaE**](detail/HaE.md)|更新 [v2.3](detail/HaE.md#最近更新) 版本|
    26 28  |2022-05-24|[**MDUT**](detail/MDUT.md)|更新 [v2.1.0](detail/MDUT.md#最近更新) 版本|
    27 29  |2022-05-21|[**GShark**](detail/gshark.md)|更新 [v0.9.7](detail/gshark.md#最近更新) 版本|
    28  -|2022-05-21|[**Viper**](detail/Viper.md)|更新 [v1.5.21](detail/Viper.md#最近更新) 版本|
    29  -|2022-05-06|[**veinmind-tools**](detail/veinmind-tools.md)|更新 [v1.3.0](detail/veinmind-tools.md#最近更新) 版本|
    30 30   
    31 31  **2.StarRank**
    32 32   
    skipped 29 lines
    62 62   
    63 63  | 时间 | 项目名称 | 项目简介 |
    64 64  |----|-----------|--------------------------|
     65 +|2022-06-15|[**afrog**](detail/afrog.md)|afrog 是一款性能卓越、快速稳定、PoC 可定制的漏洞扫描工具,PoC 包含 CVE、CNVD、默认口令、信息泄露、指纹识别、未授权访问、任意文件读取、命令执行等多种漏洞类型,帮助网络安全从业者快速验证并及时修复漏洞。|
     66 +|2022-06-15|[**BinAbsInspector**](detail/BinAbsInspector.md)|BinAbsInspector(Binary Abstract Inspector)是一款用于自动化逆向工程和扫描二进制文件漏洞的静态分析器,是 Keenlab 孵化的长期研究项目。基于 Ghidra 的支持下的抽象解释,适用于 Ghidra 的 Pcode 而非汇编。目前支持 x86、x64、armv7 和 aarch64 的二进制文件。|
    65 67  |2022-03-16|[**veinmind-tools**](detail/veinmind-tools.md)|veinmind-tools 是基于 veinmind-sdk 打造的一个容器安全工具集,目前已支持镜像 恶意文件/后门/敏感信息/弱口令 的扫描,更多功能正在逐步开发中。|
    66 68  |2022-03-16|[**DNSlog-GO**](detail/DNSlog-GO.md)|DNSLog-GO 是一款golang编写的监控 DNS 解析记录的工具,自带WEB界面。单文件运行,无依赖。部署方便快捷。|
    67 69  |2022-03-16|[**scaninfo**](detail/scaninfo.md)|scaninfo 是一款开源、轻量、快速、跨平台的红队内外网打点扫描器。比较同类工具,其能够在 nmap 的扫描速度和 masscan 的准确度之间寻找一个较好的平衡点,能够快速进行端口扫描和服务识别,内置指纹识别用于 web 探测,可以用报告的方式整理扫描结果。|
    skipped 2 lines
    70 72  |2021-11-22|[**BurpCrypto**](detail/BurpCrypto.md)|支持多种加密算法或直接执行JS代码的用于爆破前端加密的BurpSuite插件。|
    71 73  |2021-11-22|[**ysomap**](detail/ysomap.md)|Ysomap是一款适配于各类实际复杂环境的Java反序列化利用框架,可动态配置具备不同执行效果的Java反序列化利用链payload,以应对不同场景下的反序列化利用。|
    72 74  |2021-11-22|[**Kunyu**](detail/Kunyu.md)|Kunyu(坤舆),是一款基于ZoomEye API开发的信息收集工具,旨在让企业资产收集更高效,使更多安全相关从业者了解、使用网络空间测绘技术。|
    73  -|2021-07-02|[**Pocassist**](detail/Pocassist.md)|Pocassist 是一个 Golang 编写的全新开源漏洞测试框架,帮助安全人员专注于漏洞验证的逻辑的实现。Pocassist 提供了简洁的 Web 图形化界面,用户可以在线编辑漏洞验证程序即可进行批量的测试;规则完全兼容 xray,可以直接使用现有开源的 PoC 库,同时也支持添加自定义规则。|
    74  -|2021-07-02|[**MDUT**](detail/MDUT.md)|MDUT 全称 Multiple Database Utilization Tools,旨在将常见的数据库利用手段集合在一个程序中,打破各种数据库利用工具需要各种环境导致使用相当不便的隔阂;MDUT 使用 Java 开发,支持跨平台使用。|
    75 75   
    76 76  **5.[分类:甲方工具](party_a.md)**
    77 77   
    skipped 100 lines
  • ■ ■ ■ ■ ■ ■
    allprojects.md
    skipped 24 lines
    25 25   * [Kunpeng](#kunpeng)
    26 26   * [Pocassist](#pocassist)
    27 27   * [myscan](#myscan)
     28 + * [afrog](#afrog)
    28 29   * [LSpider](#lspider)
    29 30   
    30 31  * [攻击与利用/penetration_test](#攻击与利用penetration_test)
    skipped 27 lines
    58 59   * [PortForward](#portforward)
    59 60   
    60 61  * [其他/others](#其他others)
     62 + * [BinAbsInspector](#binabsinspector)
    61 63   * [f8x](#f8x)
    62 64   * [passive-scan-client](#passive-scan-client)
    63 65   * [wam](#wam)
    skipped 208 lines
    272 274   
    273 275  myscan是参考awvs的poc目录架构,pocsuite3、sqlmap等代码框架,以及搜集互联网上大量的poc,由python3开发而成的被动扫描工具。
    274 276   
     277 +### [afrog](detail/afrog.md)
     278 +![Author](https://img.shields.io/badge/Author-zan8in-orange)
     279 +![Language](https://img.shields.io/badge/Language-Golang-blue)
     280 +![GitHub stars](https://img.shields.io/github/stars/zan8in/afrog.svg?style=flat&logo=github)
     281 +![Version](https://img.shields.io/badge/Version-V1.3.4-red)
     282 + 
     283 +<https://github.com/zan8in/afrog>
     284 + 
     285 +afrog 是一款性能卓越、快速稳定、PoC 可定制的漏洞扫描工具,PoC 包含 CVE、CNVD、默认口令、信息泄露、指纹识别、未授权访问、任意文件读取、命令执行等多种漏洞类型,帮助网络安全从业者快速验证并及时修复漏洞。
     286 + 
    275 287  ### [LSpider](detail/LSpider.md)
    276 288  ![Author](https://img.shields.io/badge/Author-LoRexxar-orange)
    277 289  ![Language](https://img.shields.io/badge/Language-Python-blue)
    skipped 256 lines
    534 546   
    535 547   
    536 548  ## 其他/others
     549 +### [BinAbsInspector](detail/BinAbsInspector.md)
     550 +![Author](https://img.shields.io/badge/Author-KeenSecurityLab-orange)
     551 +![Language](https://img.shields.io/badge/Language-Java-blue)
     552 +![GitHub stars](https://img.shields.io/github/stars/KeenSecurityLab/BinAbsInspector.svg?style=flat&logo=github)
     553 +![Version](https://img.shields.io/badge/Version-V0.1-red)
     554 + 
     555 +<https://github.com/KeenSecurityLab/BinAbsInspector>
     556 + 
     557 +BinAbsInspector(Binary Abstract Inspector)是一款用于自动化逆向工程和扫描二进制文件漏洞的静态分析器,是 Keenlab 孵化的长期研究项目。基于 Ghidra 的支持下的抽象解释,适用于 Ghidra 的 Pcode 而非汇编。目前支持 x86、x64、armv7 和 aarch64 的二进制文件。
     558 + 
    537 559  ### [f8x](detail/f8x.md)
    538 560  ![Author](https://img.shields.io/badge/Author-ffffffff0x-orange)
    539 561  ![Language](https://img.shields.io/badge/Language-Bash-blue)
    skipped 40 lines
  • ■ ■ ■ ■ ■ ■
    detail/BinAbsInspector.md
     1 +## BinAbsInspector <https://github.com/KeenSecurityLab/BinAbsInspector>
     2 +<!--auto_detail_badge_begin_0b490ffb61b26b45de3ea5d7dd8a582e-->
     3 +![Language](https://img.shields.io/badge/Language-Java-blue)
     4 +![Author](https://img.shields.io/badge/Author-KeenSecurityLab-orange)
     5 +![GitHub stars](https://img.shields.io/github/stars/KeenSecurityLab/BinAbsInspector.svg?style=flat&logo=github)
     6 +![Version](https://img.shields.io/badge/Version-V0.1-red)
     7 +![Time](https://img.shields.io/badge/Join-20220615-green)
     8 +<!--auto_detail_badge_end_fef74f2d7ea73fcc43ff78e05b1e7451-->
     9 + 
     10 +# What is BinAbsInspector?
     11 + 
     12 +BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a long-term research project incubated at [Keenlab](https://keenlab.tencent.com/). It is based on abstract interpretation with the support from Ghidra. It works on Ghidra's Pcode instead of assembly. Currently it supports binaries on x86,x64, armv7 and aarch64.
     13 + 
     14 +# Installation
     15 ++ Install Ghidra according to [Ghidra's documentation](https://github.com/NationalSecurityAgency/ghidra#install)
     16 ++ Install [Z3](https://github.com/Z3Prover/z3) (tested version: 4.8.15)
     17 ++ Note that generally there are two parts for Z3 library: one is Java package, the other one is native library. The Java package is already included in "/lib" directory, but we suggest that you replace it with your own Java package for version compatibility.
     18 + + For Windows, download a pre-built package from [here](https://github.com/Z3Prover/z3/releases), extract the zip file and add a PATH environment variable pointing to `z3-${version}-win/bin`
     19 + + For Linux, install with package manager is NOT recommended, there are two options:
     20 + 1. You can download suitable pre-build package from [here](https://github.com/Z3Prover/z3/releases), extract the zip file and copy `z3-${version}-win/bin/*.so` to `/usr/local/lib/`
     21 + 2. or you can build and install z3 according to [Building Z3 using make and GCC/Clang](https://github.com/Z3Prover/z3#building-z3-using-make-and-gccclang)
     22 + + For MacOS, it is similar to Linux.
     23 ++ Download the extension zip file from [release page](https://github.com/KeenSecurityLab/BinAbsInspector/releases)
     24 ++ Install the extension according to [Ghidra Extension Notes](https://ghidra-sre.org/InstallationGuide.html#GhidraExtensionNotes)
     25 + 
     26 +# Building
     27 +Build the extension by yourself, if you want to develop a new feature, please refer to [development guide](https://github.com/KeenSecurityLab/BinAbsInspector/wiki/Developer-Guide).
     28 ++ Install Ghidra and Z3
     29 ++ Install [Gradle 7.x](https://gradle.org/releases/) (tested version: 7.4)
     30 ++ Pull the repository
     31 ++ Run `gradle buildExtension` under repository root
     32 ++ The extension will be generated at `dist/${GhidraVersion}_${date}_BinAbsInspector.zip`
     33 + 
     34 +# Usage
     35 +You can run BinAbsInspector in headless mode, GUI mode, or with docker.
     36 + 
     37 ++ With Ghidra headless mode.
     38 +```
     39 +$GHIDRA_INSTALL_DIR/support/analyzeHeadless <projectPath> <projectName> -import <file> -postScript BinAbsInspector "@@<scriptParams>"
     40 +```
     41 +`<projectPath>` -- Ghidra project path.
     42 +`<projectName>` -- Ghidra project name.
     43 +`<scriptParams>` -- The argument for our analyzer, provides following options:
     44 + 
     45 +| Parameter | Description |
     46 +| ----------------------------------------- | --------------------------------------|
     47 +| `[-K <kElement>]` | KSet size limit [K](https://github.com/KeenSecurityLab/BinAbsInspector/wiki/Technical-Details#kset) |
     48 +| `[-callStringK <callStringMaxLen>]` | Call string maximum length [K](https://github.com/KeenSecurityLab/BinAbsInspector/wiki/Technical-Details#context)|
     49 +| `[-Z3Timeout <timeout>]` | Z3 timeout |
     50 +| `[-timeout <timeout>]` | Analysis timeout |
     51 +| `[-entry <address>]` | Entry address |
     52 +| `[-externalMap <file>]` | External function model config |
     53 +| `[-json]` | Output in json format |
     54 +| `[-disableZ3]` | Disable Z3 |
     55 +| `[-all]` | Enable all checkers |
     56 +| `[-debug]` | Enable debugging log output |
     57 +| `[-check "<cweNo1>[;<cweNo2>...]"]` | Enable specific checkers |
     58 + 
     59 ++ With Ghidra GUI
     60 + 1. Run Ghidra and import the target binary into a project
     61 + 2. Analyze the binary with default settings
     62 + 3. When the analysis is done, open `Window -> Script Manager` and find `BinAbsInspector.java`
     63 + 4. Double-click on `BinAbsInspector.java` entry, set the parameters in configuration window and click OK
     64 + 5. When the analysis is done, you can see the CWE reports in console window, double-click the addresses from the report can jump to corresponding address
     65 + 
     66 ++ With Docker
     67 + 
     68 +```shell
     69 +git clone [email protected]:KeenSecurityLab/BinAbsInspector.git
     70 +cd BinAbsInspector
     71 +docker build . -t bai
     72 +docker run -v $(pwd):/data/workspace bai "@@<script parameters>" -import <file>
     73 +```
     74 + 
     75 +# Implemented Checkers
     76 +So far BinAbsInspector supports following checkers:
     77 + 
     78 ++ [CWE78](https://cwe.mitre.org/data/definitions/78.html) (OS Command Injection)
     79 ++ [CWE119](https://cwe.mitre.org/data/definitions/119.html) (Buffer Overflow (generic case))
     80 ++ [CWE125](https://cwe.mitre.org/data/definitions/125.html) (Buffer Overflow (Out-of-bounds Read))
     81 ++ [CWE134](https://cwe.mitre.org/data/definitions/134.html) (Use of Externally-Controlled Format string)
     82 ++ [CWE190](https://cwe.mitre.org/data/definitions/190.html) (Integer overflow or wraparound)
     83 ++ [CWE367](https://cwe.mitre.org/data/definitions/367.html) (Time-of-check Time-of-use (TOCTOU))
     84 ++ [CWE415](https://cwe.mitre.org/data/definitions/415.html) (Double free)
     85 ++ [CWE416](https://cwe.mitre.org/data/definitions/416.html) (Use After Free)
     86 ++ [CWE426](https://cwe.mitre.org/data/definitions/426.html) (Untrusted Search Path)
     87 ++ [CWE467](https://cwe.mitre.org/data/definitions/467.html) (Use of sizeof() on a pointer type)
     88 ++ [CWE476](https://cwe.mitre.org/data/definitions/476.htmll) (NULL Pointer Dereference)
     89 ++ [CWE676](https://cwe.mitre.org/data/definitions/676.html) (Use of Potentially Dangerous Function)
     90 ++ [CWE787](https://cwe.mitre.org/data/definitions/787.html) (Buffer Overflow (Out-of-bounds Write))
     91 + 
     92 +# Project Structure
     93 +The structure of this project is as follows, please refer to [technical details](https://github.com/KeenSecurityLab/BinAbsInspector/wiki/Technical-Details) for more details.
     94 +```
     95 +├── main
     96 +│ ├── java
     97 +│ │ └── com
     98 +│ │ └── bai
     99 +│ │ ├── checkers checker implementatiom
     100 +│ │ ├── env
     101 +│ │ │ ├── funcs function modeling
     102 +│ │ │ │ ├── externalfuncs external function modeling
     103 +│ │ │ │ └── stdfuncs cpp std modeling
     104 +│ │ │ └── region memory modeling
     105 +│ │ ├── solver analyze core and grpah module
     106 +│ │ └── util utilities
     107 +│ └── resources
     108 +└── test
     109 +```
     110 +You can also build the javadoc with `gradle javadoc`, the API documentation will be generated in `./build/docs/javadoc`.
     111 + 
     112 +# Acknowledgement
     113 +We employ [Ghidra](https://ghidra-sre.org/) as our foundation and frequently leverage [JImmutable Collections](http://brianburton.github.io/java-immutable-collections/) for better performance.
     114 +Here we would like to thank them for their great help!
     115 + 
     116 + 
     117 + 
     118 +<!--auto_detail_active_begin_e1c6fb434b6f0baf6912c7a1934f772b-->
     119 +## 项目相关
     120 + 
     121 + 
     122 +## 最近更新
     123 + 
     124 +<!--auto_detail_active_end_f9cf7911015e9913b7e691a7a5878527-->
     125 + 
  • ■ ■ ■ ■ ■ ■
    detail/afrog.md
     1 +## afrog <https://github.com/zan8in/afrog>
     2 +<!--auto_detail_badge_begin_0b490ffb61b26b45de3ea5d7dd8a582e-->
     3 +![Language](https://img.shields.io/badge/Language-Golang-blue)
     4 +![Author](https://img.shields.io/badge/Author-zan8in-orange)
     5 +![GitHub stars](https://img.shields.io/github/stars/zan8in/afrog.svg?style=flat&logo=github)
     6 +![Version](https://img.shields.io/badge/Version-V1.3.4-red)
     7 +![Time](https://img.shields.io/badge/Join-20220615-green)
     8 +<!--auto_detail_badge_end_fef74f2d7ea73fcc43ff78e05b1e7451-->
     9 + 
     10 +## 什么是 afrog
     11 + 
     12 +afrog 是一款性能卓越、快速稳定、PoC 可定制的漏洞扫描工具,PoC 包含 CVE、CNVD、默认口令、信息泄露、指纹识别、未授权访问、任意文件读取、命令执行等多种漏洞类型,帮助网络安全从业者快速验证并及时修复漏洞。
     13 + 
     14 +## 特点
     15 + 
     16 +* [x] 基于 xray 内核,又不像 xray([**afrog 模板语法**](https://github.com/zan8in/afrog/blob/main/pocs/afrog-pocs/README.md))
     17 +* [x] 性能卓越,快速稳定
     18 +* [x] 实时显示,扫描进度
     19 +* [x] 输出 html 报告,方便查看 `request` 和 `response`
     20 +* [x] 启动程序,自动更新本地 PoC 库
     21 +* [x] 长期维护、更新 PoC([**afrog-pocs**](https://github.com/zan8in/afrog/tree/main/pocs/afrog-pocs))
     22 +* [x] 二次开发,参考 `cmd/afrog/main.go` 或加入 **[交流群](https://github.com/zan8in/afrog#%E4%BA%A4%E6%B5%81%E7%BE%A4)**
     23 + 
     24 +## 下载
     25 + 
     26 +### [下载地址](https://github.com/zan8in/afrog/releases)
     27 + 
     28 +## 使用指南
     29 + 
     30 +### [查看指南](https://github.com/zan8in/afrog/blob/main/GUIDE.md)
     31 + 
     32 +## 例子
     33 + 
     34 +扫描单个目标
     35 +```
     36 +afrog -t http://127.0.0.1 -o result.html
     37 +```
     38 +![](https://github.com/zan8in/afrog/raw/main/images/onescan.png)
     39 + 
     40 +扫描多个目标
     41 + 
     42 +```
     43 +afrog -T urls.txt -o result.html
     44 +```
     45 +例如:`urls.txt`
     46 +```
     47 +http://192.168.139.129:8080
     48 +http://127.0.0.1
     49 +```
     50 +![](https://github.com/zan8in/afrog/raw/main/images/twoscan.png)
     51 + 
     52 +测试单个 PoC 文件
     53 + 
     54 +```
     55 +afrog -t http://127.0.0.1 -P ./testing/poc-test.yaml -o result.html
     56 +```
     57 +![](https://github.com/zan8in/afrog/raw/main/images/threescan.png)
     58 + 
     59 +测试多个 PoC 文件
     60 + 
     61 +```
     62 +afrog -t http://127.0.0.1 -P ./testing/ -o result.html
     63 +```
     64 +![](https://github.com/zan8in/afrog/raw/main/images/fourscan.png)
     65 + 
     66 +输出 html 报告
     67 + 
     68 +![](https://github.com/zan8in/afrog/raw/main/images/2.png)
     69 + 
     70 +![](https://github.com/zan8in/afrog/raw/main/images/3.png)
     71 + 
     72 +## 如何贡献 PoC?
     73 + 
     74 +### [查看教程](https://github.com/zan8in/afrog/blob/main/CONTRIBUTION.md)
     75 + 
     76 +## PoC 列表
     77 +### [查看 PoC 列表](https://github.com/zan8in/afrog/blob/main/POCLIST.md)
     78 + 
     79 + 
     80 + 
     81 +<!--auto_detail_active_begin_e1c6fb434b6f0baf6912c7a1934f772b-->
     82 +## 项目相关
     83 + 
     84 + 
     85 +## 最近更新
     86 + 
     87 +<!--auto_detail_active_end_f9cf7911015e9913b7e691a7a5878527-->
     88 + 
  • ■ ■ ■ ■ ■
    others.md
    1 1  ## 其他 / others
    2 2   
    3  -1. [f8x](#f8x)
    4  -2. [passive-scan-client](#passive-scan-client)
    5  -3. [wam](#wam)
    6  -4. [LBot](#lbot)
     3 +1. [BinAbsInspector](#binabsinspector)
     4 +2. [f8x](#f8x)
     5 +3. [passive-scan-client](#passive-scan-client)
     6 +4. [wam](#wam)
     7 +5. [LBot](#lbot)
    7 8   
    8 9  ----------------------------------------
     10 + 
     11 +### [BinAbsInspector](detail/BinAbsInspector.md)
     12 +![Author](https://img.shields.io/badge/Author-KeenSecurityLab-orange)
     13 +![Language](https://img.shields.io/badge/Language-Java-blue)
     14 +![GitHub stars](https://img.shields.io/github/stars/KeenSecurityLab/BinAbsInspector.svg?style=flat&logo=github)
     15 +![Version](https://img.shields.io/badge/Version-V0.1-red)
     16 + 
     17 +<https://github.com/KeenSecurityLab/BinAbsInspector>
     18 + 
     19 +BinAbsInspector(Binary Abstract Inspector)是一款用于自动化逆向工程和扫描二进制文件漏洞的静态分析器,是 Keenlab 孵化的长期研究项目。基于 Ghidra 的支持下的抽象解释,适用于 Ghidra 的 Pcode 而非汇编。目前支持 x86、x64、armv7 和 aarch64 的二进制文件。
    9 20   
    10 21  ### [f8x](detail/f8x.md)
    11 22  ![Author](https://img.shields.io/badge/Author-ffffffff0x-orange)
    skipped 39 lines
  • ■ ■ ■ ■ ■ ■
    vulnerability_assessment.md
    skipped 2 lines
    3 3  1. [Kunpeng](#kunpeng)
    4 4  2. [Pocassist](#pocassist)
    5 5  3. [myscan](#myscan)
    6  -4. [LSpider](#lspider)
     6 +4. [afrog](#afrog)
     7 +5. [LSpider](#lspider)
    7 8   
    8 9  ----------------------------------------
    9 10   
    skipped 26 lines
    36 37  <https://github.com/amcai/myscan>
    37 38   
    38 39  myscan是参考awvs的poc目录架构,pocsuite3、sqlmap等代码框架,以及搜集互联网上大量的poc,由python3开发而成的被动扫描工具。
     40 + 
     41 +### [afrog](detail/afrog.md)
     42 +![Author](https://img.shields.io/badge/Author-zan8in-orange)
     43 +![Language](https://img.shields.io/badge/Language-Golang-blue)
     44 +![GitHub stars](https://img.shields.io/github/stars/zan8in/afrog.svg?style=flat&logo=github)
     45 +![Version](https://img.shields.io/badge/Version-V1.3.4-red)
     46 + 
     47 +<https://github.com/zan8in/afrog>
     48 + 
     49 +afrog 是一款性能卓越、快速稳定、PoC 可定制的漏洞扫描工具,PoC 包含 CVE、CNVD、默认口令、信息泄露、指纹识别、未授权访问、任意文件读取、命令执行等多种漏洞类型,帮助网络安全从业者快速验证并及时修复漏洞。
    39 50   
    40 51  ### [LSpider](detail/LSpider.md)
    41 52  ![Author](https://img.shields.io/badge/Author-LoRexxar-orange)
    skipped 9 lines
Please wait...
Page is in error, reload to recover