Project Name: Apt_t00ls High-risk Vulnerability Exploitation Tool
Experts: White-hua, I0veD, luckyh
Project Address: https://github.com/White-hua/Apt_t00ls
Advantages: This tool is constructed using Java language to create POCs and validate vulnerabilities. The graphical interface makes it more convenient and easy to operate, with clear feedback results. It is open-source and has strong self-expansion capabilities. The POC integration is new and updates quickly.
The project release provides packaged JAR files, eliminating the need for self-packaging.
User Experience#
I initially used this tool in a recent attack and defense exercise in a prefecture-level city. It was used to screen important target system assets and then perform batch verification of their Nday vulnerabilities, such as OA systems, Hikvision, and gateways. This tool allows for quick and efficient acquisition of target asset permissions and finding network isolation breakthroughs.
For example, the recent YouYong KSOA v9.0 arbitrary file upload vulnerability can be successfully exploited.
You can independently edit the webshell that needs to be uploaded, with the default upload being the shell of Bingshen 4.0.
Current vulnerabilities that can be tested with this tool: