Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing up to and including 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache commons text |
||
netapp bluexp - |
||
juniper security_threat_response_manager |
||
juniper security_threat_response_manager 7.5.0 |
CVE-2022-42889 dockerized sample application (Apache Commons Text RCE)
CVE-2022-42889 Test application This repository contains a simple application using Apache Commons Text 19 which is vulnerable to CVE-2022-42889 Running the application Build and run the application via docker: docker build -t vulnerable-app docker run vulnerable-app $ docker ps CONTAINER ID IMAGE
CVE-2022-42889 Test application This repository contains a simple application using Apache Commons Text < 110 which is vulnerable to CVE-2022-42889 Running the application Replace DemoApplicationjava nc command by your host ip address Listening with netcat: $ nc -l -p 30000 Build and run docker vulnerable code docker build -t
Text4Shell的burp被动扫描插件
BurpText4ShellScan 使用java编写的Text4shell burp被动扫描插件 简介 java maven项目,可以使用mvn package进行编译 更新 10 - 首次上传,对所有经过burp的包进行被动扫描,扫描对象包括了json、xml、fileupload 11 - 修复了body为空时导致的检测错误,修复了对URL参数不检测的错误 12 - 修复了body仅有json与
Suricata Rules Some quick and nasty Suricata rules I have writtenthey should work! CVE-2022-42889 - aka "Text4Shell" (I think String4Shell is a much better namedon't think it'll catch on though!)
cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10.
cve-2022-42889 cve-2022-42889 Text4Shell affects Apache Commons Text versions 15 through 19 It has been patched as of Commons Text version 110 references: securitylabgithubcom/advisories/GHSL-2022-018_Apache_Commons_Text/ githubcom/karthikuj/cve-2022-42889-text4shell-docker
Text4Shell scanner for Burp Suite
Text4Shell scanner for Burp Suite Detailed description can be found in our blog post about this plugin Note about detection capabilities: this plugin will only supply the built-in active scanner with payloads, thus for optimal coverage vs performance, you'll have to configure your scan properly – just as with any other built-in or extension-provided scan Single-i
Dockerized PoC for CVE-2022-42889 Text4Shell
CVE-2022-42889-Text4Shell-Docker Dockerized PoC for CVE-2022-42889 Text4Shell
CVE-2022-42889 Text4Shell Exploit POC
CVE-2022-42889-Text4Shell-Exploit-POC CVE-2022-42889 Text4Shell Exploit POC
CVE-2022-42889-POC_TEXT4SHELL
CVE-2022-42889-POC_TEXT4SHELL CVE-2022-42889-POC_TEXT4SHELL
Kubernetes Lab for CVE-2022-42889
Text4Shell CVE-2022-42889 Docker Lab for CVE-2022-42889 You can either build the Docker image locally or pull the image from Docker Hub and run the container Clone the repo git clone githubcom/devenes/text4shell-cve-2022-42889git Build the Docker image locally docker build --tag=text4shell
Text4Shell PoC Exploit
CVE-2022-42889 PoC Text4Shell PoC Exploit, with ability to set custom payloads Payload “${prefix:engine:input}” Prefix available - “script”, “dns”, “url” ${script:name} ex - ${script:javascript:javalangRuntimegetRuntime()exec('whoami')} ${url:name} ex - ${url:UTF-8:domaintld} ${dns:name} ex - ${dns:address|
Script to handle CVE 2022-42889
CVE 2022-42889 This script is for removing the older version of Apache Commons Text 19 and replaces it with the newer version (1100) in JMETER_HOME/lib folder
commons-text-tools Quick links Click to find: Find commons-text jar files and their versions Calls to commons-text vulnerable functions Hot patch on commons-text jar files to disable the vulnerable behaviors Scan and patch example Overview CVE-2022-42889 may pose a serious threat to a wide range of Java-based applications The important questions a developer may ask
Subscribe For More #Web Solution Recon Part The goal was to get the flag from the server The challenge was given with a source file, open the pomxml file and if you were familiar with recent CVE's then you've noticed that a libary called commons-text were there Then lets google the libary for vulnerability so we got our CVE no and name the only part left is
CVE-2022-42889 aka text4shell PoC for recently discovered vulnerability in Apache Commons Text by @pwntester: As mentioned in wwwrapid7com/blog/post/2022/10/17/cve-2022-42889-keep-calm-and-stop-saying-4shell/: The vulnerability exists in the StringSubstitutor interpolator object An interpolator is created by the StringSubstitutorcreateInterpolator() method and will
Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.
CVE-2022-42889 PoC This is Proof of Concept for the vulnerability CVE-2022-42889 This code will run the JavaScript code 195 + 324 If vulnerable the output should be: PoC Output: 519 In order to run this you will need: JDK 11 or above Maven When prompted for an exploit string, you can either provide your own exploit string (and hit Ent
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
CVE-2022-42889-PoC Proof of Concept for CVE-2022-42889 remote code execution exploit (Text4Shell Vulnerability) Give a ⭐ for support ❤️ About this vulnerability CVE-2022-42889 is a new critical vulnerability similar to Spring4Shell and Log4Shell Its a RCE (Remote Code Execution) vulnerability with the severity score of 98 This allows hacker to execute arbitary malici
docker for CVE-2022-42889
CVE-2022-42889-POC A simple demo application that shows how to exploit the CVE-2022-42889 vulnerability Utilizes OOB (Out of Band) services to demonstrate dns and url prefixes JavaDocs for commons-text interpolation commons-text JavaDocs Example interpolations script:javascript ("${script:javascript:javalangRuntimegetRuntime()exec('touch /tmp/blop')}"
Proof of Concept Appliction for testing CVE-2022-42889
CVE-2022-42889 PoC Test Application This is a vulnerable application developed as a Proof of Concept for the vulnerability CVE-2022-42889 Maven Installation In order to run this you will need: JDK 17 or above Maven Clone the git repo git clone githubcom/securekomodo/text4shell-pocgit cd text4shell-poc Maven install to crea
A simple and fast Maven dependency vulnerability scanner. Check existence of vuln JARs (transitive)
Simple Maven Dependency vulnerability scanner Inspired by logpresso Scanner where I was able to contribute some parts :-) And I have to do some automatic builds and releases with GitHub Actions Build Simple checkout and build via mvn package GraalVM native-images can be created with mvn package -Pnative An installed GraalVM with native-image must be installed Autove
ClusterImagePolicy demo for cve-2022-42889 text4shell
Text4Shell Demo This demo shows how you can use Sigstore to validate your signed SBOMs against text4shell policies in Kubernetes or on the command line Option 1: Check if your remote OCI image is affected using cue with cosign 20 cosign verify-attestation --policy policy/text4shellcue --type cyclonedxorg/bom --certificate-identity-regexp=* --certificate-oidc-issuer-
This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889.
CVE-2022-42889 (Text4Shell) Testing Script This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889 About Text4Shell (CVE-2022-42889) Text4Shell is a critical vulnerability that affects a wide range of systems The vulnerability lies in the way these systems parse text strin
This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889.
CVE-2022-42889 (Text4Shell) Testing Script This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889 About Text4Shell (CVE-2022-42889) Text4Shell is a critical vulnerability that affects a wide range of systems The vulnerability lies in the way these systems parse text strin
CVE-2022-42889 - Text4Shell exploit
Text4shell-exploit This is a Proof of Concept exploiting the vulnerability in Apache Commons Text [CVE-2022-42889] Vulnerable versions : 150 to (not including) 1100 Impact Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary code on the vulnerable asset Vulnerable application to verify the PoC Application developed by @secure
commons-text-tools Quick links Click to find: Find commons-text jar files and their versions Calls to commons-text vulnerable functions Hot patch on commons-text jar files to disable the vulnerable behaviors Scan and patch example Overview CVE-2022-42889 may pose a serious threat to a wide range of Java-based applications The important questions a developer may ask
Hi there 👋, I am CRYXNET Software Engineer Apprentice | Cybersecurity Researcher I'm a software engineer apprentice and a cybersecurity researcher with a passion for all things related to red teaming, exploit development, pentesting, digital forensics, incident handling and threat detection I love to dive into the intricacies of cybersecurity and work on finding new wa
Text4Shell Vulnerability Scanner for Windows
THIS SCRIPT IS PROVIDED TO YOU "AS IS" TO THE EXTENT PERMITTED BY LAW, QUALYS HEREBY DISCLAIMS ALL WARRANTIES AND LIABILITY FOR THE PROVISION OR USE OF THIS SCRIPT IN NO EVENT SHALL THESE SCRIPTS BE DEEMED TO BE CLOUD SERVICES AS PROVIDED BY QUALYS Direct Download Links githubcom/Qualys/text4scanwin/releases/download/100/Text4Scanzip Text4Scanner Descrip
DataScript Examples Library
DataScript Examples Content Switching HTTP Host Switching HTTP Host Switching using Host Header HTTP Host Switching using Host Header and String Groups HTTP URI Switching - Simple HTTP URI Switching - Advanced HTTP IP Switching HTTP Content Switch based on HTTP POST / REQUEST DATA HTTP URI Switching using String Groups - Advanced L4 Traffic Management Radius-DHCP-HTTPS SNI Base
Tool that auomatically check's if a url/param is vulnerable to text4shell
Installation git clone giturlcom cd text4shell && pip install -r requirementstxt Usage Scan URL(s) forms and try injecting payload python text4shellpy -u <URL> OR python text4shellpy -uf <URL_FILE> Attempt i
python script for CVE-2022-42889
CVE-2022-42889 Python script for CVE-2022-42889 To test this locally follow the docker POC: githubcom/karthikuj/cve-2022-42889-text4shell-docker For a PHP version of this: githubcom/ClickCyber/cve-2022-42889 If youre running this and exploiting it locally, the IP you need to use is the gateway generated when the docker container is created After getting a bash
A demonstration of CVE-2022-42889 (text4shell) remote code execution vulnerability
text4shell A demonstration of CVE-2022-42889 (text4shell) remote code execution vulnerability Details in Don't Panic!: CVE-2022-42889 Text4shell vulnerability in Apache Commons Text
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
CVE-2022-42889-PoC Proof of Concept for CVE-2022-42889 remote code execution exploit (Text4Shell Vulnerability) Give a ⭐ for support ❤️ About this vulnerability CVE-2022-42889 is a new critical vulnerability similar to Spring4Shell and Log4Shell Its a RCE (Remote Code Execution) vulnerability with the severity score of 98 This allows hacker to execute arbitary malici
有关burpsuite的插件(非商店),文章以及使用技巧的收集(此项目不再提供burpsuite破解文件,如需要请在博客mrxn.net下载)---Collection of burpsuite plugins (non-stores), articles and tips for using Burpsuite, no crack version file
Burp-Suite-collections BurpSuite 相关收集项目,插件主要是非BApp Store(商店) 所有的汉化或者使用burpsuite都是在你配置好了Java环境的前提下!!!相关教程 最新版(202212之后)激活参考这个项目 自己解决,本项目不提供 新版burp(202209之后)激活参考scz大佬的方法:地址 本项目仅用于bu
SecureCodingDemo CVE-2022-42889 National Vulnerability Database link : nvdnistgov/vuln/detail/CVE-2022-42889#vulnCurrentDescriptionTitle The program I used was written by karthikuj on github I will link here the repository that contains the code as well as instructions on how you can perform this exploit on the sample program Github: githubcom/karthikuj/cve
An intentionally vulnerable webapp to get your hands dirty with CVE-2022-42889.
Commons-Text Goat This is a webapp that is intentionally vulnerable to CVE-2022-42889 It uses an embedded Jetty server and Maven to start a servlet listening at port 8080 at URL \api This endpoint accepts a URL parameter cmd This is embedded between ${ and } and passed to the StringSubstitutor function; which inturn implements the StringLookupFactory The vulnerability exist
Dockerbuild artefacts to build a container to that runs jfrog scan_commons_text_calls_jar.py
text4shell-scan-common-text-calls Dockerbuild artefacts to build a container to that runs jfrog scan_commons_text_calls_jarpy After you build the container, to run the container to scan vulnerable jar files for system calls referenced in CVE-2022-42889 using the scan_common_text_callspy script developed by jfrog/text4shell-tools (Credit goes to jfrog!!!): 1 - CD into the fold
This project includes a python script which generates malicious commands leveraging CVE-2022-42889 vulnerability
Text4ShellPayloads This project includes a python script which generates malicious commands leveraging CVE-2022-42889 vulnerability The vulnerable server was set up according to the guidance of "Karthik U J" by following the step in githubcom/karthikuj/cve-2022-42889-text4shell-docker
Personal writeup for PKU GeekGame 2nd
GeekGame 2nd Writeup 第一次打CTF类比赛,Waku Waku †签到† 即使没有看过第一届的签到题,也一眼就认出来了符号是特殊字体。但当我用Adobe Acrobat打开PDF,试着复制这些符号时,问题出现了:我复制选项呢? 点击编辑文本,发现pdf被加密,无法编辑。导出成Word等也需要密码。于是
通过 jvm 启动参数 以及 jps pid进行拦截非法参数
cve-2022-42889-intercept 低于 Java11版本的需要注意,更高的版本已经取消了Javascript解释器 本次方案针对 Java8 通过 jvm 启动参数 以及 jps pid进行拦截非法参数 quick start -----------------------load cve-2022-42889 check start cve-2022-42889 is_deep_match orgapachecommonstextStringSubstitutor mdgetReturnType()getActualName
Explore the Cyber Realm 🌐 Welcome to my world of cybersecurity, where passion meets expertise! I'm an Application Security Consultant at Martian Defense, an Application Security Engineer, and a Technical Content Writer at Medium About Me I'm not just a cybersecurity enthusiast (unlike the modern trend where the "cyber enthusiast/infulencer" has no experi
CVE-2022-42889 Test application This repository contains a simple application using Apache Commons Text 19 which is vulnerable to CVE-2022-42889 Steps to reproduce the exploit Steps to reproduce the exploit in a repo Copy DemoApplicationjava to your repo Run the main method, with default string (suggested) If your output for the default string is 519 Or if your app run
Why does info endpoint not return git info when running in azure app service image? Running command: java -cp /home/site/wwwroot/demo-001-SNAPSHOTjar:/usr/local/appservice/lib/azureappservicejar: -Djavautilloggingconfigfile=/usr/local/appservice/loggingproperties -Dfileencoding=UTF-8 -Dserverport=80 -XX:ErrorFile=/home/LogFiles/java_error__dev_%plog -XX:+CrashOnOu
A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.
CVE-2022-42889-POC Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889 What's the Issue : Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of orgapachecommonst
CVE-2022-42889 (a.k.a. Text4Shell) RCE Proof of Concept
CVE-2022-42889 (aka Text4Shell) RCE Proof of Concept Text4Shell is the popular name of a critical software vulnerability discovered in the Apache Commons Text library (see CVE-2022-42889) This repo is meant to demonstrate a Remote Code Execution (RCE) that leverages this CVE The vulnerable code is being used in a SpringBoot controller but don't get confused, this IS
EndpointAnalytics Remediation Script Apache-Commons-text
Microsoft Defender Vulnerability management found this thread Update Apache Commons Text Remediation required Description Update Commons Text to a later version to mitigate 1 known vulnerability affecting your devices Associated CVEs Critical 1 Related threats Threat Insights: CVE-2022-42889 in Apache Commons Text java library “text4shell" is associated with one or
A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889
text4shell-scan A fully automated, accurate, and extensive scanner for finding vulnerable text4shell hosts Features Support for lists of URLs Fuzzing for more than 60 HTTP request headers Fuzzing for HTTP POST Data parameters Fuzzing for JSON data parameters Supports DNS callback for vulnerability discovery and validation WAF Bypass payloads Support for custom DNS OOB c
Apache Text4Shell (CVE-2022-42889) Burp Bounty Profile
Apache Commons Text CVE-2022-42889 Overview Apache Text4Shell (CVE-2022-42889) The affected Apache Commons Text versions 15 through 19 and it has been patched in version 110 Apache Commons Text is a Java library described as "a library focused on algorithms working on strings" Usage: Copy Text4Shell(CVE-2022-42889)bb in Burp BountyData\profiles Select Request
DataScript Examples Library
DataScript Examples Content Switching HTTP Host Switching HTTP Host Switching using Host Header HTTP Host Switching using Host Header and String Groups HTTP URI Switching - Simple HTTP URI Switching - Advanced HTTP IP Switching HTTP Content Switch based on HTTP POST / REQUEST DATA HTTP URI Switching using String Groups - Advanced L4 Traffic Management Radius-DHCP-HTTPS SNI Base
CVE-2022-42889 aka Text4Shell research & PoC
CVE-2022-42889 aka text4shell PoC for recently discovered vulnerability in Apache Commons Text by @pwntester: As mentioned in wwwrapid7com/blog/post/2022/10/17/cve-2022-42889-keep-calm-and-stop-saying-4shell/: The vulnerability exists in the StringSubstitutor interpolator object An interpolator is created by the StringSubstitutorcreateInterpolator() method and will
Config files for my GitHub profile.
😑"Hell is not understanding my own code" ⚡ Technologies Follow my Security Blog posts Extending Wazuh detection with OpenSearch integration Integrating Wazuh and Splunk for extended security monitoring Adversary Emulation on AWS with Stratus Red Team and Wazuh Detecting Apache Text4Shell (CVE-2022-42889) with Wazuh Using Wazuh to de
A simple application that shows how to exploit the CVE-2022-42889 vulnerability
CVE-2022-42889-POC A simple demo application that shows how to exploit the CVE-2022-42889 vulnerability Utilizes OOB (Out of Band) services to demonstrate dns and url prefixes JavaDocs for commons-text interpolation commons-text JavaDocs Example interpolations script:javascript ("${script:javascript:javalangRuntimegetRuntime()exec('touch /tmp/blop')}"
text4shell(CVE-2022-42889) BurpSuite Scanner
text4shellburpscanner 本项目基于log4j2burpscanner 修改而来,删除了主动扫描功能,后续有需要再加上 CVE2022-42889 靶场链接如下: githubcom/karthikuj/cve-2022-42889-text4shell-dockergit 也可以关注主页公众号(only security),回复text4shell获取编译好的靶场下载地址 靶场搭建: cd 进目录,执行 docker run -
Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.
CVE-2022-42889-text4shell 🔥🔥🔥 Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit Details📃 CVE-2022-42889 affects Apache Commons Text versions 15 through 19 It has been patched as of Commons Text version 110 The vulnerability has been compared to Log4Shell since it is an open-source library-level vulnerability that is likely to impact a wi
Writeup for 2nd PKU GeekGame
2nd PKU GeekGame Writeup wwx 2022-11-27 Misc †签到† 解法同第一届签到题。从 PDF 文件中复制文字,得到 fa{ecm_oPUGeGmV! lgWloet_K_ekae2} 从上往下、从左往右读,获得 flag{Welcome_to_PKU_GeekGameV2!}。 小北问答 · 极速版 第 1 题:支持 WebP 图片格式的最早 Firefox 版本
DataScript Examples Library
DataScript Examples Content Switching HTTP Host Switching HTTP Host Switching using Host Header HTTP Host Switching using Host Header and String Groups HTTP URI Switching - Simple HTTP URI Switching - Advanced HTTP IP Switching HTTP Content Switch based on HTTP POST / REQUEST DATA HTTP URI Switching using String Groups - Advanced L4 Traffic Management Radius-DHCP-HTTPS SNI Base
Includes Security Testing detail of Docker Container
Container-Security (Docker & Kubernetes) Docker: OWASP Top 10 1: Host OS Vulnerabilities If Host OS have vulnerabilities, attacker can use it to gain access to containers and apps running inside them Resolution: Regular patching of host OS, Usage of IDS, Firewall, Implement strict access controls CVE-2021-42013 (Path Traversal + RCE + Reverse Shell Attack) An at
log4j-scan A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts Features Support for lists of URLs Fuzzing for more than 60 HTTP request headers (not only 3-4 headers as previously seen tools) Fuzzing for HTTP POST Data parameters Fuzzing for JSON data parameters Supports DNS callback for vulnerability discovery and validation WAF Bypass
log4j-scan A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts Features Support for lists of URLs Fuzzing for more than 60 HTTP request headers (not only 3-4 headers as previously seen tools) Fuzzing for HTTP POST Data parameters Fuzzing for JSON data parameters Supports DNS callback for vulnerability discovery and validation WAF Bypass
log4jscan A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts Features Support for lists of URLs Fuzzing for more than 60 HTTP request headers (not only 3-4 headers as previously seen tools) Fuzzing for HTTP POST Data parameters Fuzzing for JSON data parameters Supports DNS callback for vulnerability discovery and validation WAF Bypass p
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
log4j-scan A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts Features Support for lists of URLs Fuzzing for more than 60 HTTP request headers (not only 3-4 headers as previously seen tools) Fuzzing for HTTP POST Data parameters Fuzzing for JSON data parameters Supports DNS callback for vulnerability discovery and validation WAF Bypass
MIRROR Java sass compiler using libsass.
Java sass compiler Feature complete java sass compiler Documentation Read the official documentation Check out the example webapp Inspect the API documentation CVE-2022-42889 In October 2022, a critical vulnerability in the commons-text library became known (CVE-2022-42889) jsass uses the commons-text library, but not the affected StringSubstitutor class! Thus, jsass is
Vulnerability Scanner for CVE-2022-42889 (Text4Shell)
Scanner for CVE-2022-42889 (Text4Shell) Description This is a scanner for CVE-2022-42889 (Text4Shell) vulnerability Usage Step Download jar file (jar file is on preparedJar/text4shell-scannerjar) Check java version on your system Run jar file with args (refer to the following example) Sample command > java -jar text4shell-scannerjar /Path/you/want/to/scan
commons-text-tools Quick links Click to find: Find commons-text jar files and their versions Calls to commons-text vulnerable functions Hot patch on commons-text jar files to disable the vulnerable behaviors Scan and patch example Overview CVE-2022-42889 may pose a serious threat to a wide range of Java-based applications The important questions a developer may ask
Jar Analyzer - 一个JAR包分析工具,批量分析搜索,方法调用关系搜索,字符串搜索,Spring分析,CFG分析,JVM Stack Frame分析,远程分析Tomcat,进阶表达式搜索,自定义SQL查询,字节码查看,命令行分析,使用简易RASP保护
Jar-Analyzer V2 CHANGE LOG Jar Analyzer 是一个分析 Jar 文件的 GUI 工具: 支持大 Jar 以及批量 Jars 分析 方便地搜索方法之间的调用关系 分析 LDC 指令定位 Jar 中的字符串 一键分析 Spring Controller/Mapping 对于方法字节码和指令的高级分析 一键反编译,优化对内部类的处理 一键生成方法的 CFG 分析
Vulmon Search is a vulnerability search engine. It gives comprehensive vulnerability information through a very simple user interface.