diff --git a/.gitignore b/.gitignore index 9fa6f4e5..a3a28d08 100644 --- a/.gitignore +++ b/.gitignore @@ -14,7 +14,7 @@ logs urls* *.txt -*.html +*/reports/*.html *.json # Dependency directories (remove the comment below to include it) diff --git a/README.md b/README.md index 8d51e3b9..01ed0b39 100644 --- a/README.md +++ b/README.md @@ -7,17 +7,17 @@
- Download • - Wiki • - Helper Function + Download • + Wiki • + Helper Function
@@ -441,7 +441,7 @@ you can install it with: **Binary** ```sh -$ https://github.com/zan8in/afrog/releases/latest +$ https://github.com/zan8in/afrog/v3/releases/latest ``` **Github** @@ -454,7 +454,7 @@ $ ./afrog -h **Go** ```sh -$ go install -v github.com/zan8in/afrog/cmd/afrog@latest +$ go install -v github.com/zan8in/afrog/v3/cmd/afrog@latest ``` ## Running afrog @@ -553,14 +553,14 @@ The JNDI vulnerability refers to security vulnerabilities that exploit the JNDI To obtain JNDI, follow these steps: -- To obtain the source code and compile the JAR file, please visit the official website [github.com/r00tSe7en/JNDIMonitor](https://github.com/r00tSe7en/JNDIMonitor). Alternatively, you can go to the official afrog website [afrog/helper/jndi](https://github.com/zan8in/afrog/tree/main/helper/jndi) to download the pre-compiled JAR file +- To obtain the source code and compile the JAR file, please visit the official website [github.com/r00tSe7en/JNDIMonitor](https://github.com/r00tSe7en/JNDIMonitor). Alternatively, you can go to the official afrog website [afrog/helper/jndi](https://github.com/zan8in/afrog/v3/tree/main/helper/jndi) to download the pre-compiled JAR file - Upload the `JNDIMonitor-2.0.1-SNAPSHOT.jar` file to the server (such as a VPS server), and execute the following startup command: ```sh java -jar ./JNDIMonitor-2.0.1-SNAPSHOT.jar -i 0.0.0.0 -l 1389 -p 3456 ``` -Below are example methods for writing POCs. [Please click to view](https://github.com/zan8in/afrog/wiki/Examples#solr-log4j-rce). +Below are example methods for writing POCs. [Please click to view](https://github.com/zan8in/afrog/v3/wiki/Examples#solr-log4j-rce). ## Json Output (For developers) @@ -587,9 +587,9 @@ afrog -t https://example.com -ja result.json ## Screenshot - + - + ## As Library @@ -623,7 +623,7 @@ More examples: To join the afrog communication group on WeChat, please first add the afrog personal account and mark it as **afrog**. Then, you will be added to the group by the administrator. -{{.Request}}+
{{.Response}}+
No matching
+ {{end}} +Column1 | +Column2 | + +
---|---|
{{.VulID}} | +{{.Target}} | + +
+ + {{.VulID}} + {{.Severity}} + {{.FullTarget}} + | + + +||
+ name: {{.PocInfo.Info.Name}} author: {{.PocInfo.Info.Author}}
+ {{if .PocInfo.Info.Created}}
+ created: {{.PocInfo.Info.Created}}
+ {{end}}
+
+ {{if .PocInfo.Info.Description}}
+ description: {{.PocInfo.Info.Description}} + {{end}} + + {{if .PocInfo.Info.Reference}} + reference: + {{range $key, $value := .PocInfo.Info.Reference}} + - {{$value}} + {{end}} + {{end}} + + {{if .PocInfo.Info.Affected}} + affected: {{.PocInfo.Info.Affected}} + {{end}} + + {{if .PocInfo.Info.Solutions}} + solutions: {{.PocInfo.Info.Solutions}} + {{end}} + + + |
+ ||
{{.FullTarget}} | +||
+
+
+
+
+ →
+
+
+ ←
+ |
+
No matching | + +