Project Name: Apt_t00ls High-risk Vulnerability Exploitation Tool
Experts: White-hua, I0veD, luckyh
Project Address: https://github.com/White-hua/Apt_t00ls
Advantages: This tool is constructed using Java language to create POCs and verify vulnerabilities. The graphical interface makes it more convenient and easy to operate, with clearer echo results. It is open source and has strong self-expansion capabilities. POC integration is new and updates quickly.
The project release provides packaged Jar products, eliminating the need for independent packaging.
User Experience#
I initially used this tool during a recent attack and defense exercise in a prefecture-level city. It was used to screen important target system assets and then verify their Nday vulnerabilities in batches, such as OA systems, Hikvision, and gateways, in order to quickly and efficiently obtain target asset permissions and find network isolation breakthroughs.
For example, the recent use of the YouYun KSOA v9.0 arbitrary file upload vulnerability was successful.
You can independently edit the webshell that needs to be uploaded, with the default upload being the shell of Bingshen 4.0.
Current vulnerabilities that can be tested with this tool: