CVE-2021-41773
Egyscan
CVE-2021-41773 | Egyscan | |
---|---|---|
1 | 1 | |
83 | 179 | |
- | - | |
2.6 | 8.6 | |
about 2 years ago | 4 months ago | |
Python | Python | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CVE-2021-41773
-
Oh My WebServer TryHackMe Machine Writeup and Walkthrough
After studing, what was the flaw a written a custom exploit for this specific CVE which will give us RCE on the server, you can find that exploit here.
Egyscan
What are some alternatives?
pwn_jenkins - Notes about attacking Jenkins servers
phpvuln - 🕸️ Audit tool to find common vulnerabilities in PHP source code
pwntools - CTF framework and exploit development library
Vailyn - A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
AutoSploit - Automated Mass Exploiter
waf-bypass - Check your WAF before an attacker does
CVE-2021-40444 - CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
hackerone-reports - Top disclosed reports from HackerOne
EJS-Exploit - Remote Code Execution EJS Web Applications using express-fileupload
PoC-CVE-2022-30190 - POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
voicemeeter-remote-python - Voicemeeter Remote API for Python 3
metamaska - μετάμάσκα - malevolent payload classifier