Categories: Kali Linux

Joomla Vulnerability Component Scanner – JCS

JCS (Joomla Component Scanner) made for penetration testing reason on Joomla CMS JCS can help you with the most recent component vulnerabilities and endeavors. The database can refresh from a few resources and a Crawler has been actualized to discover components and components’ connection.

This version backings Exploitdb and Packetstorm vulnerabilities to make a database for Joomla components JCS can likewise make a Report in HTML for you.

Joomla Component Scanner Features:

  • Multi-Thread
  • Delay between requests
  • Custom Http Headers
  • Supports Http-Proxy
  • Supports Http Authentication:
    1. BASIC
    2. DIGEST
  • Component crawler base by Regex-Pattern
  • Component’s Page Identification By:
    1. Page Comparison
    2. Regex Pattern
    3. Searching in HTML tags example: <title>not found</title>
    4. Checking Http Status Code

Report Sample:

R K

Recent Posts

Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing

Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…

7 hours ago

THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping

This repository was created with the aim of assisting companies and independent researchers about Tactics,…

7 hours ago

MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities

A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…

7 hours ago

Ethical Hacking And Penetration Testing Tools – Harnessing Python For Robust Cybersecurity Solutions

This repository contains tools created by yogSahare0 while learning Python 3 for ethical hacking and penetration testing.…

3 days ago

SentinelEye – Automated Wireless Security Toolkit

"NetSecChallenger" provides a suite of automated tools designed for security professionals and network administrators to…

3 days ago

Autohack : Your Step-By-Step Guide To Installation And Setup

The essential tool for cybersecurity enthusiasts! This guide provides a detailed walkthrough on how to…

3 days ago