Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
JAF is an internally developed, red team-oriented tool from Accenture for interacting with Jenkins build servers.
2 projects | reddit.com/r/netsec | 5 May 2021
I'm maintaining a list of scripts and exploits for Jenkins here: https://github.com/gquere/pwn_jenkins
We haven't tracked posts mentioning DogWalk-rce-poc yet.
Tracking mentions began in Dec 2020.
What are some alternatives?
PoC-CVE-2022-30190 - POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
jenkins-job-wrecker - convert Jenkins job XML to JJB YAML
log4j2-rce-poc - A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228/Log4Shell).
CVE-2022-26134 - CVE-2022-26134 - Atlassian Confluence unauthenticated OGNL injection vulnerability (RCE).
Gopherus - This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
evilgrade - Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.
fuelcms-rce - Fuel CMS 1.4 - Remote Code Execution
RomBuster - RomBuster is a router exploitation tool that allows to disclosure network router admin password.
altwalker-jenkins-example - An example of a simple Jenkins Pipeline for AltWalker.
CVE-2021-41773 - Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773