EJS-Exploit
Egyscan
EJS-Exploit | Egyscan | |
---|---|---|
1 | 1 | |
11 | 193 | |
- | - | |
0.0 | 8.2 | |
almost 3 years ago | 8 days ago | |
Python | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
EJS-Exploit
-
Simple Remote Code Execution on EJS Web Applications with express-fileupload
TLDR with no explaination
Egyscan
What are some alternatives?
express-fileupload - Simple express file upload middleware that wraps around busboy
phpvuln - 🕸️ Audit tool to find common vulnerabilities in PHP source code
CVE-2022-26134 - CVE-2022-26134 - Atlassian Confluence unauthenticated OGNL injection vulnerability (RCE).
Vailyn - A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
waf-bypass - Check your WAF before an attacker does
Youtube-Downloader - Download video and audio from YouTube links.
CVE-2021-40444 - CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
py4jshell - Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.
hackerone-reports - Top disclosed reports from HackerOne
PoC-CVE-2022-30190 - POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
voicemeeter-remote-python - Voicemeeter Remote API for Python 3