神兵利器 | Goby转Xray格式EXP工具(附下载)
2022-12-8 09:13:14 Author: EchoSec(查看原文) 阅读量:59 收藏

0x01 前言

——

Goby和Xray是深受网络安全爱好者包括本人)使用的社区/商业化的渗透测试工具,在Nemo项目中也集成了调用Xray进行Poc扫描。pocGoby2Xray的初衷是通过“翻译”两种工具的Poc规则和语法后进行“转换”,方便统一使用Xray的调用Poc。

0x01使用

——

Usage of main:  -f string      transform one goby poc file  -o string      the xray poc output path,default is same as src file  -p string      transform poc file for path      ➜  pocGoby2Xray git:(main) ✗ go run main.go -p gobypoc -o xraypoc2022/11/17 21:40:51 Discuz!ML_3.x_RCE_CNVD-2019-22239.json:not support SetVariable regex2022/11/17 21:40:51 Discuz_ML_3.x_RCE__CNVD_2019_22239.json:not support SetVariable regex2022/11/17 21:40:51 GitLab_RCE_CVE-2021-22205.json:not support SetVariable regex2022/11/17 21:40:51 Gitlab_RCE_CVE_2021_22205.json:not support SetVariable regex2022/11/17 21:40:51 Tianwen_ERP_system_FileUpload_CNVD_2020_28119.json:not support SetVariable regex2022/11/17 21:40:51 Tianwen_ERP_system__uploadfile.aspx_Arbitraryvfilevupload.json:not support SetVariable regex2022/11/17 21:40:51 VMware_vCenter_Log4shell_CVE-2021-44228_(1).json:not support SetVariable regex2022/11/17 21:40:51 VMware_vCenter_Log4shell_CVE_2021_44228_1.json:not support SetVariable regex2022/11/17 21:40:51 [+]Finish: 360/368

0x03 获取方式


点击下方名片回复"20221206"获取


文章来源: http://mp.weixin.qq.com/s?__biz=MzU3MTU3NTY2NA==&mid=2247486871&idx=1&sn=9fb6e1df5b3ecd77a19fc2b265fc2213&chksm=fcdf5188cba8d89e5a37a09a7785afd4dddf0980dead5087679dfe8ce2a57e32e6deb9c4c3ef#rd
如有侵权请联系:admin#unsafe.sh