Egyscan
EJS-Exploit
Egyscan | EJS-Exploit | |
---|---|---|
1 | 1 | |
179 | 11 | |
- | - | |
8.2 | 0.0 | |
5 days ago | over 2 years ago | |
Python | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Egyscan
EJS-Exploit
-
Simple Remote Code Execution on EJS Web Applications with express-fileupload
TLDR with no explaination
What are some alternatives?
phpvuln - 🕸️ Audit tool to find common vulnerabilities in PHP source code
express-fileupload - Simple express file upload middleware that wraps around busboy
Vailyn - A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
CVE-2022-26134 - CVE-2022-26134 - Atlassian Confluence unauthenticated OGNL injection vulnerability (RCE).
waf-bypass - Check your WAF before an attacker does
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
CVE-2021-40444 - CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
Youtube-Downloader - Download video and audio from YouTube links.
hackerone-reports - Top disclosed reports from HackerOne
py4jshell - Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.
PoC-CVE-2022-30190 - POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
voicemeeter-remote-python - Voicemeeter Remote API for Python 3