This repository provides a Proof of Concept (PoC) for testing various vulnerabilities in the Apache HTTP Server, including Filename Confusion Attacks, SSRF, Denial of Service, and others related to recent CVEs.
The tool sends crafted HTTP requests to assess whether the server is vulnerable to certain types of attacks.
The tool performs HTTP requests to potential endpoints that might be vulnerable to confusion attacks or misconfigurations. It checks for specific patterns and encodings that could lead to unauthorized access or system failures.
The tool checks for vulnerabilities on the following paths:
You can install the required Python library using:
pip install requests
git clone https://github.com/mrmtwoj/apache-vulnerability-testing.git
cd apache-vulnerability-testing
To use the tool, provide the target URL you want to test:
python3 poc_vulnerability_testing.py --target http://<target-ip>
For example:
python3 poc_vulnerability_testing.py --target http://192.168.1.10
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…