Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed
This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only. (by MrCl0wnLab)
reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities (by six2dez)
Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed | reconftw | |
---|---|---|
1 | 3 | |
24 | 6,109 | |
- | 2.9% | |
4.1 | 8.3 | |
almost 3 years ago | 7 days ago | |
Shell | ||
- | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed
Posts with mentions or reviews of Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-05-08.
reconftw
Posts with mentions or reviews of reconftw.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-06-23.
- Automated recognition frameworks?
-
I made a CLI that streamlines Ethical Hacking workflow
Checkout ReconFTW
-
Tools for subdomain brute forcing
reconFTW = https://github.com/six2dez/reconftw
What are some alternatives?
When comparing Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed and reconftw you can also consider the following projects:
nuclei-templates - Community curated list of templates for the nuclei engine to find security vulnerabilities.
LazyRecon - An automated approach to performing recon for bug bounty hunting and penetration testing.
k8s-bigip-ctlr - Repository for F5 Container Ingress Services for Kubernetes & OpenShift.
Sn1per - Attack Surface Management Platform
CVE-2022-1388-checker - Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)
axiom - The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!