Git Product home page Git Product logo

aem-hacker's People

Contributors

0ang3el avatar bikappa avatar byqwert avatar moh-nur avatar pheelbert avatar sneakerhax avatar wimsymons avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

aem-hacker's Issues

Help me please

I used aem_hacker.py and used burp collaborator payload as a host and then got a callback from a server. The server sent salesforcesecret in the request. Any idea how to exploit this further? Or should I just report this to the company?

false positive of the Flash-xss

I have encountered a lot of false positives of the flash-based xss but I don't know why it is happening. Would you mind taking a look?

CVE-2019-8088?

Thought to ask - when are you planning to add check for CVE-2019-8088 and some others findings you reported to Adobe? :) I don't have your email hence asking here.

address use error

Could you point out why I am getting this error, as I restarted the machine and also killed required process?

Traceback (most recent call last):
  File "aem_hacker.py", line 1532, in <module>
    main()
  File "aem_hacker.py", line 1513, in main
    httpd = run_detector(args.port)
  File "aem_hacker.py", line 1475, in run_detector
    httpd = HTTPServer(('', port), handler)
  File "/usr/lib/python3.5/socketserver.py", line 441, in __init__
    self.server_activate()
  File "/usr/lib/python3.5/socketserver.py", line 463, in server_activate
    self.socket.listen(self.request_queue_size)
OSError: [Errno 98] Address already in use

Seems that you provided bad URL. Try another one, bye.

my input url is an AEM but still getting an error "Seems that you provided bad URL. Try another one, bye.",

Fixed it by editting the preflight function:

def preflight(url, proxy=None, debug=False):
    try:
        http_request(url, proxy=proxy, debug=debug)
    except:
        return True
    else:
        return True

I know that this is not a good fix but it should be fix properly.

Decrease request pr. second?

I would love if there was an ability to adjust requests per second. I'm in a bug bounty program limiting to 5 requests per second. Where can I edit the aem_hacker.py file to limit the requests, or can you ad a parameter for this?

OSError: [Errno 98] Address already in use

While I run this cmd: python3 aem_hacker.py -u https://site.com --host 100.000.00.000
The error comes.

Traceback (most recent call last):
  File "aem_hacker.py", line 1676, in <module>
    main()
  File "aem_hacker.py", line 1648, in main
    httpd = run_detector(args.port)
  File "aem_hacker.py", line 1605, in run_detector
    httpd = HTTPServer(('', port), handler)
  File "/usr/lib/python3.8/socketserver.py", line 452, in __init__
    self.server_bind()
  File "/usr/lib/python3.8/http/server.py", line 138, in server_bind
    socketserver.TCPServer.server_bind(self)
  File "/usr/lib/python3.8/socketserver.py", line 466, in server_bind
    self.socket.bind(self.server_address)
OSError: [Errno 98] Address already in use

Solutions?
Thank you

how to proxy all request through burp

hi thanks for the tool love it am having a issue here because i keep getting a ssrf hit on my burp but unable to corrolate the issue to a specific domain is there a way to proxy all traffic through burp so i could see which request is actually working?

aem_discover.py

Hello,
When trying to find the AEM pages the script doesn't give any output on the screen. I mean no error and result.

I am sure there is multiple application which is using an AEM.

Thanks

Download configuration and HTML content

The aem_discoverer.py script did not get called by aem_hacker.py. I am still learning how to run it (placing a URL inside a file and supplying that file's name in the --file argument showed the URL and exited the script).

In the meantime I figured I could crawl our AEM sites in search of forgotten test pages and internal user IDs.

time python3 aem_slurper.py HOST 2>&1 | tee HOST.txt
sort -k3 HOST.txt > HOST-sorted-by-path.txt
less HOST-sorted-by-path.txt

Durbo Serializer (response.bin payload generation)

Fantastic work here @0ang3el, thanks for the hard work!

I was wondering if you could share your process for generating the response.bin payload. Hex-editing the one you have just isn't working for additional features I'd like to add to the resulting JSP. Do you have any documentation for serializing/generating the replication-ready binary?

Thanks in advance!

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.