CVE-2020-9484-Mass-Scan
Vulnerability Scanner
A tool designed to scan a list of URLs against Apache Tomcat deserialization vulnerabilities that could lead to Remote Code Execution.
CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE
32 stars
3 watching
15 forks
Language: Shell
last commit: over 4 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Scans networks to identify vulnerabilities by correlating CPEs with CVEs using an API | 562 |
| Automates CVE vulnerability detection from Git commit messages | 402 |
| A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. | 758 |
| An offensive information and vulnerability scanner that identifies potential security issues in web applications | 2,238 |
| A tool for identifying potential vulnerabilities in websites by fetching known URLs and filtering out ones with open redirects or SSRF parameters. | 168 |
| A tool designed to scan websites for Cross-Site Scripting (XSS) vulnerabilities | 214 |
| An account security scanner that detects vulnerabilities in online accounts by hashing credentials and checking against data breaches. | 157 |
| A tool that scans websites for Log4j2 remote code execution vulnerabilities using multiple DNS log platforms and supports various scan types | 776 |
| Automated vulnerability scanning and management tool for macOS applications. | 25 |
| Identifies and exploits a vulnerability in OpenSSH versions 2.3 to 7.4 allowing mass username enumeration. | 146 |
| A tool for detecting and analyzing security vulnerabilities in Xamarin mobile applications | 89 |
| A tool that automates the identification and classification of vulnerabilities in web applications | 318 |
| Identifies vulnerabilities in WordPress websites by scanning plugins and themes | 28 |
| A tool designed to detect and log Citrix ADC vulnerability scans and exploitation attempts | 114 |
| An open-source tool for evaluating web application vulnerabilities by analyzing the separation of concerns in web applications. | 232 |