This repository provides a Proof of Concept (PoC) for testing various vulnerabilities in the Apache HTTP Server, including Filename Confusion Attacks, SSRF, Denial of Service, and others related to recent CVEs.
The tool sends crafted HTTP requests to assess whether the server is vulnerable to certain types of attacks.
The tool performs HTTP requests to potential endpoints that might be vulnerable to confusion attacks or misconfigurations. It checks for specific patterns and encodings that could lead to unauthorized access or system failures.
The tool checks for vulnerabilities on the following paths:
You can install the required Python library using:
pip install requests
git clone https://github.com/mrmtwoj/apache-vulnerability-testing.git
cd apache-vulnerability-testing
To use the tool, provide the target URL you want to test:
python3 poc_vulnerability_testing.py --target http://<target-ip>
For example:
python3 poc_vulnerability_testing.py --target http://192.168.1.10
Before delving into the topic, let's first clarify the role of an Administrator within the…
Embassy is the next-generation framework for embedded applications. Write safe, correct and energy-efficient embedded code…
This repository provides a mapping of Atomic Red Team attack simulations to open-source detection rules,…
Qdrant (read: quadrant) is a vector similarity search engine and vector database. It provides a…
ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for…
EDR bypass technology is not just for attackers. Many malware now have EDR bypass capabilities,…