Categories: Kali Linux

JCS – Joomla Vulnerability For Penetration Testing Component Scanner

JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component vulnerabilities and exploits. Database can update from several resources and a Crawler has been implemented to find components and component’s link.

This version supports Exploitdb and Packetstorm vulnerabilities to create a database for joomla components it can also create a Report in HTML for you.

Features of JCS

  • Multi-Thread
  • Delay between requests
  • Custom Http Headers
  • Supports Http-Proxy
  • Supports Http Authentication:
    • BASIC
    • DIGEST
  • Component crawler base by Regex-Pattern
  • Component’s Page Identification By:
    • Page Comparison
    • Regex Pattern
    • Searching in HTML tags example: <title>not found</title>
    • Checking Http Status Code

Compiling

Open the project in Visual Studio and click build

Report Sample

R K

Recent Posts

BypassAV : Techniques To Evade Antivirus And EDR Systems

BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…

15 hours ago

ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)

ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…

15 hours ago

Trigon : A Revolutionary Kernel Exploit For iOS

Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…

15 hours ago

Bug Bounty Report Templates : Enhancing Efficiency In Vulnerability Reporting

Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…

15 hours ago

FullBypass : A Tool For AMSI And PowerShell CLM Bypass

FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…

17 hours ago

Carseat : A Python Implementation Of Seatbelt

Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…

20 hours ago