├── Cheetah注册服务(Windows).exe ├── README.md ├── StartV1.8.bat ├── StartV1.8.sh ├── StartV1.9.bat ├── StartV1.9.sh ├── WkerIDE.jar ├── config └── cache ├── ico ├── Wker.jpg ├── wker.gif └── wkerico.jpg ├── jar ├── BaseLibrary.jar ├── JSLibrary.jar ├── ORCLibrary.jar ├── PortLibrary.jar ├── SocketLibrary.jar └── TimeLibrary.jar ├── plugins └── CheetahScriptSearch.jar ├── script ├── ATTACKUTILS │ ├── MYSQLAttack.wker │ ├── SQLAttack.wker │ ├── encryption.wker │ └── js.js ├── BASE │ └── baseStruct.wker ├── SQL注入 │ └── MySQL │ │ └── MYSQL_Interject.wker ├── SSTI注入 │ └── SSTI注入.Wker ├── WEB_EXP │ ├── Apache_EXP │ │ └── Apache-Solr任意文件读取.wker │ ├── RG-UAC_1day_EXP │ │ └── RG-UAC_1day.wker │ ├── Seacms_EXP │ │ └── seacms_getshell.wker │ ├── 网康前台RCE │ │ ├── 网康前台RCE_EXP.wker │ │ └── 网康前台RCE_POC.wker │ ├── 羊毛_POC&EXP │ │ ├── 羊毛EXP.wker │ │ └── 羊毛POC.wker │ ├── 致远OA_EXP │ │ └── 致远OA-test.jsp.wker │ └── 通达OA_EXP │ │ ├── OAShell.txt │ │ └── 通达OA.wker ├── 二进制_EXP │ ├── CVE-2016-0638.wker │ ├── CVE-2016-3510.wker │ ├── CVE-2017-3248.wker │ ├── CVE-2018-2628.wker │ ├── CVE-2018-2893.wker │ ├── Demo.wker │ └── vsftp_bdoor.wker ├── 信息收集 │ ├── CMS识别.wker │ ├── IP旁站查询.wker │ ├── dir.txt │ ├── whoise查询.wker │ ├── 在线指纹查询.wker │ ├── 子域名查询.wker │ ├── 旁站查询.wker │ ├── 目录扫描.wker │ ├── 端口扫描.wker │ ├── 网站IP地址匹配.wker │ ├── 网站匹配链接.wker │ └── 网站邮箱匹配.wker ├── 暴力破解 │ └── 验证码爆破例子.wker ├── 渗透辅助 │ ├── 360soso搜索.wker │ ├── CSRF页面生成.wker │ ├── csrfDemo.html │ ├── fofa搜索.wker │ ├── md5解密.wker │ ├── poc.html │ ├── 判断http或http.wker │ ├── 微信公众号文章搜索.wker │ ├── 必应搜索.wker │ ├── 搜狗搜索.wker │ ├── 百度搜索.wker │ └── 钟馗之眼搜索.wker ├── 漏洞探测 │ ├── 360天擎 │ │ ├── 360天擎SQL注入.wker │ │ └── 360天擎越权访问.wker │ ├── 74cms │ │ ├── 74cms_jobs_near_list_php_sql_inject.wker │ │ ├── 74cms_sql1.wker │ │ ├── 74cms_sql2.wker │ │ └── 74cms_sql3.wker │ ├── ActiveMQ │ │ ├── ActiveMQ 反序列化漏洞.wker │ │ ├── ActiveMQ任意文件写入漏洞.wker │ │ └── activemq-default-password.wker │ ├── Adobe │ │ └── Adobe ColdFusion 文件读取漏洞.wker │ ├── Airflow │ │ └── airflow-unauth.wker │ ├── Apache │ │ ├── Apache Solr 远程命令执行漏洞.wker │ │ ├── Apache solr XML 实体注入漏洞.wker │ │ ├── Apache样例文件泄露泄露漏洞.wker │ │ ├── CVE-2020-17519 Apache Flink 任意文件读取漏洞.wker │ │ ├── apache-flink-upload-rce.wker │ │ ├── apache-kylin-unauth-cve-2020-13937.wker │ │ ├── apache-ofbiz-cve-2018-8033-xxe.wker │ │ └── apache-ofbiz-cve-2020-9496-xml-deserialization.wker │ ├── Apereo │ │ └── Apereo CAS 4.1 反序列化命令执行漏洞.wker │ ├── AppWeb │ │ └── AppWeb认证绕过漏洞(CVE-2018-8715).wker │ ├── Atlassian │ │ ├── Atlassian Confluence 路径穿越.wker │ │ └── Atlassian Jira 信息泄露漏洞 CVE-2020-14181.wker │ ├── BSPHP │ │ └── BSPHP验证系统信息泄露.wker │ ├── CGI │ │ └── PHP-CGI远程代码执行漏洞.wker │ ├── CVE │ │ ├── CVE-2015-1427.wker │ │ ├── CVE-2017-10271.txt │ │ ├── CVE-2017-10271.wker │ │ ├── CVE-2017-3506.txt │ │ ├── CVE-2017-3506.wker │ │ └── exchange-cve-2021-26855-ssrf.wker │ ├── Cocoon │ │ └── Apache Cocoon Xml 注入 CVE-2020-11991.wker │ ├── Couchdb │ │ ├── Couchdb 垂直权限绕过漏洞(CVE-2017-12635.wker │ │ └── couchdb-unauth.wker │ ├── D-Link │ │ ├── D-Link DCS系列监控 账号密码信息泄露漏洞 CNVD-2020-25078.wker │ │ ├── dlink-850l-info-leak.wker │ │ ├── dlink-cve-2019-17506.wker │ │ ├── dlink-cve-2020-9376-dump-credentials.wker │ │ └── dlink-dsl-2888a-rce.wker │ ├── Discuz │ │ ├── DZxgetshell.wker │ │ ├── Discuz 7.x6.x 全局变量防御绕过导致代码执行.wker │ │ ├── Discuz7_2_admincp_php_xss.wker │ │ ├── Discuz7_2_ajax_php_xss.wker │ │ ├── Disucz3_flvplayer_swf_xss.wker │ │ ├── discuz7_2_faq_sql_inject.wker │ │ └── discuz7_2_post_php_xss.wker │ ├── Django │ │ ├── Django Open redirect possibility.wker │ │ └── Django debug page XSS漏洞.wker │ ├── Drupal │ │ ├── Drupal 7.32 “Drupalgeddon” SQL注入漏洞.wker │ │ ├── DrupalRCE.wker │ │ ├── drupal-cve-2018-7600-rce-18.wker │ │ ├── drupal-cve-2018-7600-rce.wker │ │ └── drupal-cve-2019-6340.wker │ ├── ElasticSearch │ │ ├── ElasticSearch Groovy 沙盒绕过 && 代码执行漏洞.wker │ │ ├── ElasticSearch目录遍历漏洞.wker │ │ ├── ElasticSearch远程命令执行.wker │ │ ├── Elasticsearch写入webshell漏洞.wker │ │ └── elasticsearch-unauth.wker │ ├── Exchange │ │ └── Microsoft Exchange SSRF漏洞 CVE-2021-26885.wker │ ├── Flask │ │ └── Flask(Jinja2) 服务端模板注入漏洞.wker │ ├── GitLab │ │ └── GitLab Graphql邮箱信息泄露漏洞 CVE-2020-26413.wker │ ├── KesionCMS │ │ └── KesionCMS_asp_sql_inject.wker │ ├── Kylin │ │ ├── Apache Kylin Console 控制台弱口令.wker │ │ └── Apache Kylin 未授权配置泄露 CVE-2020-13937.wker │ ├── MacCMS │ │ ├── MacCMS GetShell.wker │ │ ├── MacCMS_v8_inc_ajax_sql.wker │ │ ├── MacCMS_v8_inc_api_sql_inject.wker │ │ ├── maccms-rce.wker │ │ └── maccmsv10-backdoor.wker │ ├── Magento │ │ └── Magento 2.2 SQL注入漏洞.wker │ ├── MessageSolution │ │ └── MessageSolution 邮件归档系统EEA 信息泄露漏洞 CNVD-2021-10543.wker │ ├── Nodejs │ │ └── Node.js 目录穿越漏洞.wker │ ├── PHPUnit │ │ └── PHPUnit Remote Code Execution.wker │ ├── PageAdmin │ │ └── PageAdmin可“伪造”VIEWSTATE执行任意SQL查询&重置管理员密码漏洞.wker │ ├── SiteEngine │ │ ├── SiteEngine6.0 comments.php SQL注入漏洞.wker │ │ └── SiteEngine7.0 comments.php SQL注入漏洞.wker │ ├── Spring │ │ ├── Spring Data Commons 远程命令执行漏洞.wker │ │ ├── Spring Security OAuth2 远程命令执行漏洞.wker │ │ ├── spring-cloud-cve-2020-5405.wker │ │ ├── spring-cloud-cve-2020-5410.wker │ │ ├── spring-cve-2016-4977.wker │ │ ├── springboot-env-unauth.wker │ │ └── springcloud-cve-2019-3799.wker │ ├── Struts2 │ │ ├── S2-006.wker │ │ ├── S2-009.wker │ │ ├── S2-013.wker │ │ ├── S2-016.wker │ │ ├── S2-019.wker │ │ ├── S2-032.wker │ │ ├── S2-045.wker │ │ ├── S2-052.wker │ │ ├── S2-053.wker │ │ ├── S2-057.wker │ │ └── S2-dev.wker │ ├── Supervisord │ │ └── Supervisord 远程命令执行漏洞.wker │ ├── Zblog │ │ ├── Zblog_file_include.wker │ │ └── zblog_1_8_search_asp_xss.wker │ ├── alibaba │ │ ├── Alibaba Nacos 任意用户创建.wker │ │ ├── Alibaba Nacos 未授权访问漏洞.wker │ │ ├── alibaba-canal-info-leak.wker │ │ └── alibaba-nacos-v1-auth-bypass.wker │ ├── aspcms │ │ ├── AspCms_SiteSetting_getshell.wker │ │ ├── aspcms-backend-leak.wker │ │ └── aspcms_sqlinterject.wker │ ├── bash │ │ └── bash-cve-2014-6271.wker │ ├── bt742 │ │ └── bt742-pma-unauthorized-access.wker │ ├── cacti │ │ └── cacti-weathermap-file-write.wker │ ├── chinaunicom │ │ └── chinaunicom-modem-default-password.wker │ ├── cisco │ │ └── cisco-cve-2020-3452-readfile.wker │ ├── citrix │ │ ├── citrix-cve-2019-19781-path-traversal.wker │ │ ├── citrix-cve-2020-8191-xss.wker │ │ ├── citrix-cve-2020-8193-unauthorized.wker │ │ └── citrix-xenmobile-cve-2020-8209.wker │ ├── cmseasy │ │ ├── cmseasy header.php 报错注入漏洞.wker │ │ ├── cmseasy_header_detail_sqli.wker │ │ └── cmseasy_swfupload_xss.wker │ ├── coldfusion │ │ └── coldfusion-cve-2010-2861-lfi.wker │ ├── confluence │ │ ├── confluence-cve-2015-8399.wker │ │ └── confluence-cve-2019-3396-lfi.wker │ ├── consul │ │ ├── consul-rexec-rce.wker │ │ └── consul-service-rce.wker │ ├── coremail │ │ └── coremail_leak.wker │ ├── couchcms │ │ └── couchcms-cve-2018-7662.wker │ ├── craftcms │ │ └── craftcms-seomatic-cve-2020-9757-rce.wker │ ├── dedecms │ │ ├── dede_getshell.wker │ │ ├── dedecms_error_trace_disclosure.wker │ │ ├── dedecms_guige_getshell.wker │ │ ├── dedecms_mysql_error_trace_inc.wker │ │ ├── dedecms_recommend_php_sql_inject.wker │ │ ├── dedecms_search_typeArr_sqli.wker │ │ ├── dedecms_swfupload_xss.wker │ │ ├── dedecms_updatenew.wker │ │ └── dedecms_url_redirect.wker │ ├── docker │ │ ├── docker-api-unauthorized-rce.wker │ │ ├── docker-registry-api-unauth.wker │ │ └── docker_remote_api.wker │ ├── dotnetcms │ │ └── dotnetcms-sqli.wker │ ├── draytek │ │ └── draytek-cve-2020-8515.wker │ ├── dreamgallery │ │ └── dreamgallery album.php SQL注入漏洞.wker │ ├── druid │ │ └── druid-monitor-unauth.wker │ ├── duomicms │ │ └── duomicms-sqli.wker │ ├── dvr │ │ └── dvr-cve-2018-9995.wker │ ├── ecology │ │ ├── ecology-filedownload-directory-traversal.wker │ │ ├── ecology-javabeanshell-rce.wker │ │ ├── ecology-springframework-directory-traversal.wker │ │ ├── ecology-syncuserinfo-sqli.wker │ │ ├── ecology-validate-sqli.wker │ │ └── ecology-workflowcentertreedata-sqli.wker │ ├── ecshop │ │ ├── ecshop-cnvd-2020-58823-sqli.wker │ │ ├── ecshop-rce-3.X.wker │ │ ├── ecshop-rce.wker │ │ ├── ecshop2_7_2_category_sql_inject.wker │ │ ├── ecshop_2_7_3_api_php_sqlinject.wker │ │ ├── ecshop_flow_orderid_sqli.wker │ │ └── ecshop_uc_code_sqli.wker │ ├── etouch │ │ └── etouch-v2-sqli.wker │ ├── eyou │ │ ├── eYou_v5_help_class_sql_inject.wker │ │ ├── eyou_resetpw.wker │ │ ├── eyou_user_kw_sqli.wker │ │ ├── eyou_weakpass.wker │ │ └── eyoucms_getshell.wker │ ├── f5 │ │ └── f5-tmui-cve-2020-5902-rce.wker │ ├── fangweicms │ │ └── fangweicms-sqli.wker │ ├── fastmeeting │ │ └── fastmeeting_download_filedownload漏洞.wker │ ├── feifeicms │ │ └── feifeicms-lfr.wker │ ├── finecms │ │ ├── FineCMS任意文件上传漏洞.wker │ │ └── finecms-sqli.wker │ ├── finereport │ │ └── finereport-directory-traversal.wker │ ├── flink │ │ └── flink-jobmanager-cve-2020-17519-lfi.wker │ ├── forease │ │ └── forease_fileinclude_code_exec.wker │ ├── fortigate │ │ └── fortigate-cve-2018-13379-readfile.wker │ ├── frp │ │ ├── frp-dashboard-defaultpassword.wker │ │ └── frp-dashboard-unauth.wker │ ├── fsmcms │ │ ├── FSMCMS columninfo.jsp文件参数ColumnID SQL注入漏洞.wker │ │ ├── FSMCMS网站重装漏洞.wker │ │ └── fsmcms SQL注入漏洞.wker │ ├── gilacms │ │ └── gilacms-cve-2020-5515.wker │ ├── git │ │ └── git_information_disclosure.wker │ ├── glassfish │ │ └── glassfish-cve-2017-1000028-lfi.wker │ ├── go-pprof │ │ └── go-pprof-leak.wker │ ├── h2 │ │ └── h2-database-web-console-unauthorized-access.wker │ ├── hadoop │ │ └── hadoop-yarn-unauth.wker │ ├── harbor │ │ └── harbor-cve-2019-16097.wker │ ├── hfs │ │ └── hfs.wker │ ├── hikvision │ │ ├── HIKVISION 视频编码设备接入网关 任意文件下载.wker │ │ └── hikvision-cve-2017-7921.wker │ ├── hishop │ │ └── hishop_productlist_sqli.wker │ ├── hudson │ │ └── hudson_ws_disclosure.wker │ ├── ifw8 │ │ └── ifw8-router-cve-2019-16313.wker │ ├── iis │ │ └── iis_parse.wker │ ├── influxdb │ │ └── influxdb-unauth.wker │ ├── jboss │ │ ├── jboss-cve-2010-1871.wker │ │ └── jboss-unauth.wker │ ├── jenkins │ │ └── jenkins-cve-2018-1000861-rce.wker │ ├── jetbrains │ │ └── jetbrains_ide_workspace_disclosure.wker │ ├── jira │ │ ├── jira-cve-2019-8442.wker │ │ ├── jira-cve-2019-8449.wker │ │ ├── jira-cve-2020-14179.wker │ │ └── jira-cve-2020-14181.wker │ ├── joomla │ │ ├── Joomla_spider_form_maker_sqlinject.wker │ │ ├── joomla-component-vreview-sql.wker │ │ ├── joomla-cve-2015-7297-sqli.wker │ │ ├── joomla-cve-2017-8917-sqli.wker │ │ ├── joomla-cve-2018-7314-sql.wker │ │ ├── joomla-ext-zhbaidumap-cve-2018-6605-sqli.wker │ │ ├── joomla_com_docman.wker │ │ └── joomla_index_list_sqli.wker │ ├── jumpserver │ │ └── jumpserver-unauth-rce.wker │ ├── jupyter │ │ └── jupyter-notebook-unauthorized-access.wker │ ├── kafka │ │ └── kafka-manager-unauth.wker │ ├── kibana │ │ ├── kibana-cve-2018-17246.wker │ │ └── kibana-unauth.wker │ ├── kong │ │ └── kong-cve-2020-11710-unauth.wker │ ├── lanproxy │ │ ├── Lanproxy目录遍历 CVE-2021-3019.wker │ │ └── lanproxy-cve-2021-3019-lfi.wker │ ├── laravel │ │ ├── Laravel .env 配置文件泄露 CVE-2017-16894.wker │ │ ├── laravel-debug-info-leak.wker │ │ └── laravel-improper-webdir.wker │ ├── libsys │ │ ├── libsys_ajax_asyn_link_fileread漏洞.wker │ │ ├── libsys_ajax_asyn_link_old_fileread漏洞.wker │ │ └── libsys_ajax_get_file_fileread漏洞.wker │ ├── metinfo │ │ ├── metinfo v5.3 SQL注入漏洞.wker │ │ ├── metinfo-cve-2019-16996-sqli.wker │ │ ├── metinfo-cve-2019-16997-sqli.wker │ │ ├── metinfo-cve-2019-17418-sqli.wker │ │ ├── metinfo-file-read.wker │ │ └── metinfo-lfi-cnvd-2018-13393.wker │ ├── minio │ │ └── minio-default-password.wker │ ├── mongo │ │ └── mongo-express 远程代码执行漏洞.wker │ ├── msvod │ │ └── msvod-sqli.wker │ ├── myucms │ │ └── myucms-lfr.wker │ ├── nagio │ │ ├── nagio-cve-2018-10735.wker │ │ ├── nagio-cve-2018-10736.wker │ │ ├── nagio-cve-2018-10737.wker │ │ └── nagio-cve-2018-10738.wker │ ├── netgear │ │ └── netgear-cve-2017-5521.wker │ ├── nextjs │ │ └── nextjs-cve-2017-16877.wker │ ├── nexus │ │ ├── nexus-cve-2020-10199.wker │ │ ├── nexus-cve-2020-10204.wker │ │ └── nexus-default-password.wker │ ├── nexusdb │ │ └── nexusdb-cve-2020-24571-path-traversal.wker │ ├── nps │ │ └── nps-default-password.wker │ ├── nsfocus │ │ └── nsfocus-uts-password-leak.wker │ ├── nuuo │ │ └── nuuo-file-inclusion.wker │ ├── odoo │ │ ├── odoo-file-read-linux.wker │ │ └── odoo-file-read-win.wker │ ├── openfire │ │ └── openfire-cve-2019-18394-ssrf.wker │ ├── php-cgi │ │ └── php-cgi-cve-2012-1823.wker │ ├── phpcms │ │ ├── phpcms-cve-2018-19127.wker │ │ ├── phpcms_auth_key_leak.wker │ │ ├── phpcms_digg_add_sqli.wker │ │ ├── phpcms_file_red.wker │ │ ├── phpcms_flash_upload_sqli.wker │ │ ├── phpcms_product_code_exec.wker │ │ ├── phpcms_swfupload_xss.wker │ │ ├── phpcms_user_login_sqlinject.wker │ │ ├── phpcms_video_for_ck_sql_inject.wker │ │ └── phpcms_vote_tag_sql_inject.wker │ ├── phpinfo │ │ └── phpinfo_leak.wker │ ├── phpmyadmin │ │ ├── Phpmyadmin Scriptssetup.php Deserialization.wker │ │ ├── phpmyadmin-cve-2018-12613-file-inclusion.wker │ │ └── phpmyadmin_pass_test.wker │ ├── phpok │ │ └── phpok api.php SQL注入漏洞.wker │ ├── phpshe │ │ └── phpshe-sqli.wker │ ├── phpstudy │ │ ├── phpstudy.wker │ │ └── phpstudy_probe.wker │ ├── phpweb │ │ └── phpweb_sqlinject.wker │ ├── pulse │ │ └── pulse-cve-2019-11510.wker │ ├── pyspider │ │ └── pyspider-unauthorized-access.wker │ ├── qibo │ │ ├── QiboCMS_v7_file_down.wker │ │ ├── qibocms-sqli.wker │ │ ├── qibocms_js_f_id_sqli.wker │ │ ├── qibocms_s_fids_sqli.wker │ │ ├── qibocms_search_code_exec.wker │ │ └── qibocms_search_sqli.wker │ ├── qnap │ │ └── qnap-cve-2019-7192.wker │ ├── rails │ │ └── rails-cve-2018-3760-rce.wker │ ├── razor │ │ └── razor-cve-2018-8770.wker │ ├── rconfig │ │ └── rconfig-cve-2019-16663.wker │ ├── resin │ │ ├── resin-cnnvd-200705-315.wker │ │ ├── resin-inputfile-fileread-or-ssrf.wker │ │ └── resin-viewfile-fileread.wker │ ├── rockmongo │ │ └── rockmongo-default-password.wker │ ├── samsung │ │ ├── samsung-wea453e-default-pwd.wker │ │ └── samsung-wea453e-rce.wker │ ├── sangfor │ │ ├── sangfor-edr-arbitrary-admin-login.wker │ │ ├── sangfor-edr-cssp-rce.wker │ │ └── sangfor-edr-tool-rce.wker │ ├── satellian │ │ └── satellian-cve-2020-7980-rce.wker │ ├── seacms │ │ ├── seacms-before-v992-rce.wker │ │ ├── seacms-rce.wker │ │ ├── seacms-sqli.wker │ │ ├── seacms_order_code_exec.wker │ │ ├── seacms_search_code_exec.wker │ │ ├── seacms_search_jq_code_exec.wker │ │ └── seacmsv645-command-exec.wker │ ├── seeyon │ │ ├── seeyon-ajax-unauthorized-access.wker │ │ ├── seeyon-cnvd-2020-62422-readfile.wker │ │ ├── seeyon-wooyun-2015-0108235-sqli.wker │ │ └── seeyon-wooyun-2015-148227.wker │ ├── shop │ │ ├── shop360_do_filedownload.wker │ │ ├── shopNC B2B版 index.php SQL注入漏洞.wker │ │ ├── shopex_ctl_passport_sql_inject.wker │ │ ├── shopex_svinfo_phpinfo_leak.wker │ │ ├── shopnc_index_class_id_sqli.wker │ │ ├── shopnum_GuidBuyList_sqli.wker │ │ ├── shopnum_ProductDetail_sqli.wker │ │ ├── shopnum_ProductListCategory_sqli.wker │ │ └── shopnum_ShoppingCart1_sqli.wker │ ├── siteserver │ │ ├── SiteServer_remoteGetshell.wker │ │ ├── siteserver3.6.4 background_administrator.aspx注入漏洞.wker │ │ ├── siteserver3.6.4 background_keywordsFilting.aspx注入漏洞.wker │ │ ├── siteserver3.6.4 background_log.aspx注入漏洞.wker │ │ ├── siteserver3.6.4 background_taskLog.aspx注入漏洞.wker │ │ └── siteserver3.6.4 user.aspx注入漏洞.wker │ ├── solarwinds │ │ └── solarwinds-cve-2020-10148.wker │ ├── solr │ │ ├── Apache Solr任意文件读取漏洞.wker │ │ ├── solr-cve-2017-12629-xxe.wker │ │ └── solr-velocity-template-rce.wker │ ├── sonarqube │ │ └── sonarqube-cve-2020-27986-unauth.wker │ ├── sonicwall │ │ └── sonicwall-ssl-vpn-rce.wker │ ├── spark │ │ ├── spark-api-unauth.wker │ │ └── spark-webui-unauth.wker │ ├── tensorboard │ │ └── tensorboard-unauth.wker │ ├── terramaster │ │ ├── terramaster-cve-2020-15568.wker │ │ └── terramaster-cve-2020-28188-rce.wker │ ├── thinkadmin │ │ └── thinkadmin-v6-readfile.wker │ ├── thinkcmf │ │ ├── thinkcmf-lfi.wker │ │ └── thinkcmf-write-shell.wker │ ├── thinkphp │ │ ├── ThinkPHP 2.x 任意代码执行漏洞.wker │ │ ├── ThinkPHP5 5.0.23 Remote Code Execution.wker │ │ ├── ThinkPHP5 SQL Injection.wker │ │ ├── Thinkphp5 5.0.225.1.29 Remote Code Execution.wker │ │ ├── thinkphp-v6-file-write.wker │ │ └── thinkphp_exp.wker │ ├── tomcat │ │ └── tomcat-cve-2018-11759.wker │ ├── tongda-meeting │ │ └── tongda-meeting-unauthorized-access.wker │ ├── topsec │ │ └── topsec_change_lab_file_include.wker │ ├── tpshop │ │ └── tpshop-sqli.wker │ ├── typecho │ │ ├── typecho install.php反序列化命令执行漏洞.wker │ │ └── typecho-rce.wker │ ├── uWSGI │ │ └── uWSGI PHP Directory Traversal.wker │ ├── ueditor │ │ ├── ueditor-cnvd-2017-20077-file-upload.wker │ │ ├── ueditor.wker │ │ └── ueditor1.wker │ ├── umail │ │ ├── umail sessionid登录漏洞.wker │ │ └── umail物理路径泄露.wker │ ├── urp │ │ ├── URP综合教务系统任意文件读取漏洞.wker │ │ ├── URP越权查看任意学生课表、成绩(需登录)漏洞.wker │ │ └── urp查询接口曝露漏洞.wker │ ├── vbulletin │ │ ├── vbulletin-cve-2019-16759-bypass.wker │ │ └── vbulletin-cve-2019-16759.wker │ ├── vmware │ │ └── vmware-vcenter-unauthorized-rce-cve-2021-21972.wker │ ├── weaver │ │ ├── weaver-ebridge-file-read-linux.wker │ │ └── weaver-ebridge-file-read-win.wker │ ├── web_xml │ │ └── web_xml_leak.wker │ ├── weblogic │ │ ├── Weblogic LDAP 远程代码执行漏洞 CVE-2021-2109.wker │ │ ├── Weblogic 管理控制台未授权远程命令执行漏洞.wker │ │ ├── weblogic-cve-2020-14750.wker │ │ ├── weblogic_SSRF漏洞.wker │ │ └── weblogic_ssrf.wker │ ├── webmin │ │ └── Webmin Unauthenticated Remote Code Execution .wker │ ├── wecenter │ │ └── wecenter SQL注入漏洞.wker │ ├── wordpress │ │ ├── wordpress-cve-2019-19985-infoleak.wker │ │ ├── wordpress-ext-adaptive-images-lfi.wker │ │ ├── wordpress_admin_ajax_filedownload.wker │ │ ├── wordpress_plugin_azonpop_sqli.wker │ │ ├── wordpress_url_redirect.wker │ │ └── wordpress_woocommerce_code_exec.wker │ ├── wuzhicms │ │ └── wuzhicms-v410-sqli.wker │ ├── xiuno-bbs │ │ └── xiuno-bbs-cvnd-2019-01348-reinstallation.wker │ ├── xplus │ │ ├── xplus MYSQL通用注入漏洞.wker │ │ └── xplus npmaker 2003系统GETSHELL漏洞.wker │ ├── xunchi │ │ └── xunchi-cnvd-2020-23735-file-read.wker │ ├── yccms │ │ └── yccms-rce.wker │ ├── yonyou │ │ ├── yonyou-grp-u8-sqli-to-rce.wker │ │ ├── yonyou-grp-u8-sqli.wker │ │ ├── youphptube-encoder-cve-2019-5127.wker │ │ ├── youphptube-encoder-cve-2019-5128.wker │ │ └── youphptube-encoder-cve-2019-5129.wker │ ├── yungoucms │ │ └── yungoucms-sqli.wker │ ├── zabbix │ │ ├── zabbix-authentication-bypass.wker │ │ ├── zabbix-cve-2016-10134-sqli.wker │ │ ├── zabbix_httpmon_sql_inject.wker │ │ ├── zabbix_jsrpc_sessionid_inject.wker │ │ └── zabbix_jsrpc_sql_inject.wker │ ├── zcms │ │ └── zcms-v3-sqli.wker │ ├── zeit │ │ └── zeit-nodejs-cve-2020-5284-directory-traversal.wker │ ├── zeroshell │ │ └── zeroshell-cve-2019-12725-rce.wker │ ├── zimbra │ │ └── zimbra-cve-2019-9670-xxe.wker │ ├── zzcms │ │ └── zzcms-zsmanage-sqli.wker │ ├── 中新 │ │ └── 中新金盾信息安全管理系统 默认超级管理员密码漏洞.wker │ ├── 南方 │ │ └── nanfang_exp.wker │ ├── 大汉 │ │ ├── 大汉downfile.jsp 任意文件下载漏洞.wker │ │ └── 大汉版通JCMS数据库读取漏洞.wker │ ├── 安财软件 │ │ ├── 安财软件GetFileContent任意文件读取漏洞.wker │ │ ├── 安财软件GetFile任意文件读取漏洞.wker │ │ └── 安财软件GetXMLList任意文件读取漏洞.wker │ ├── 宝塔 │ │ └── baota.wker │ ├── 帆软报表 │ │ ├── 帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757-2.wker │ │ └── 帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757.wker │ ├── 最土 │ │ └── 最土团购SQL注入漏洞.wker │ ├── 未授权漏洞 │ │ ├── Apache Solr 未授权访问漏洞.wker │ │ ├── Docker未授权访问漏洞.wker │ │ ├── ElasticSearch未授权访问漏洞.wker │ │ ├── Jenkins未授权漏洞.wker │ │ ├── Redis未授权访问漏洞.wker │ │ ├── Rsync未授权访问漏洞.wker │ │ ├── XXL-JOB executor 未授权访问漏洞.wker │ │ ├── influxdb未授权访问漏洞.wker │ │ └── 易创思教育建站系统未授权漏洞.wker │ ├── 正方教务系统 │ │ └── 正方教务系统default3.aspx爆破页面.wker │ ├── 泄漏漏洞 │ │ ├── DS_Store泄露漏洞.wker │ │ ├── SVN泄露漏洞.wker │ │ └── git泄露漏洞.wker │ ├── 泛微OA │ │ ├── 泛微OA downfile.php 任意文件下载漏洞.wker │ │ ├── 泛微OA filedownaction SQL注入漏洞.wker │ │ └── 泛微OA 数据库配置泄露漏洞.wker │ ├── 注入漏洞 │ │ └── HOST主机头注入漏洞.wker │ ├── 浪潮 │ │ └── 浪潮ClusterEngineV4.0 远程命令执行漏洞 CVE-2020-21224.wker │ ├── 用友 │ │ └── 用友NC目录遍历漏洞.wker │ ├── 票友 │ │ ├── 票友机票预订系统10处SQL注入漏洞.wker │ │ ├── 票友机票预订系统SQL注入漏洞(绕过).wker │ │ ├── 票友机票预订系统SQL注入漏洞.wker │ │ ├── 票友票务系统int_order.aspx SQL注入漏洞.wker │ │ └── 票友票务系统通用sql注入漏洞.wker │ ├── 网康 │ │ └── 网康前台RCE_POC.wker │ ├── 致远OA │ │ ├── 致远OA A6 数据库敏感信息泄露.wker │ │ ├── 致远OA A6 用户敏感信息泄露.wker │ │ └── 致远OA webmail.do任意文件下载 CNVD-2020-62422.wker │ ├── 蜂网互联 │ │ └── 蜂网互联 企业级路由器v4.31 密码泄露漏洞 CVE-2019-16313.wker │ ├── 跨域漏洞 │ │ └── CORS跨域资源共享漏洞.wker │ ├── 远程命令执行漏洞 │ │ └── HTTP.sys远程命令执行漏洞.wker │ ├── 金和OA │ │ └── 金和OA C6 管理员默认口令.wker │ ├── 金窗教务系统 │ │ └── 金窗教务系统存在多处SQL注射漏洞.wker │ ├── 锐捷 │ │ └── 锐捷NBR路由器 EWEB网管系统 远程命令执行漏洞.wker │ └── 齐治 │ │ └── 齐治堡垒机任意用户登录.wker └── 综合漏洞 │ ├── Ladp注入.wker │ ├── SQL注入.wker │ ├── XPATH注入.wker │ ├── XSS注入.wker │ └── xss.txt └── tessdata ├── configs ├── api_config ├── digits └── hocr ├── eng.traineddata ├── osd.traineddata ├── pdf.ttf └── pdf.ttx /Cheetah注册服务(Windows).exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/Cheetah注册服务(Windows).exe -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/README.md -------------------------------------------------------------------------------- /StartV1.8.bat: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/StartV1.8.bat -------------------------------------------------------------------------------- /StartV1.8.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/StartV1.8.sh -------------------------------------------------------------------------------- /StartV1.9.bat: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/StartV1.9.bat -------------------------------------------------------------------------------- /StartV1.9.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/StartV1.9.sh -------------------------------------------------------------------------------- /WkerIDE.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/WkerIDE.jar -------------------------------------------------------------------------------- /config/cache: -------------------------------------------------------------------------------- 1 | cache -------------------------------------------------------------------------------- /ico/Wker.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/ico/Wker.jpg -------------------------------------------------------------------------------- /ico/wker.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/ico/wker.gif -------------------------------------------------------------------------------- /ico/wkerico.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/ico/wkerico.jpg -------------------------------------------------------------------------------- /jar/BaseLibrary.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/jar/BaseLibrary.jar -------------------------------------------------------------------------------- /jar/JSLibrary.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/jar/JSLibrary.jar -------------------------------------------------------------------------------- /jar/ORCLibrary.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/jar/ORCLibrary.jar -------------------------------------------------------------------------------- /jar/PortLibrary.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/jar/PortLibrary.jar -------------------------------------------------------------------------------- /jar/SocketLibrary.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/jar/SocketLibrary.jar -------------------------------------------------------------------------------- /jar/TimeLibrary.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/jar/TimeLibrary.jar -------------------------------------------------------------------------------- /plugins/CheetahScriptSearch.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/plugins/CheetahScriptSearch.jar -------------------------------------------------------------------------------- /script/ATTACKUTILS/MYSQLAttack.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/ATTACKUTILS/MYSQLAttack.wker -------------------------------------------------------------------------------- /script/ATTACKUTILS/SQLAttack.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/ATTACKUTILS/SQLAttack.wker -------------------------------------------------------------------------------- /script/ATTACKUTILS/encryption.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/ATTACKUTILS/encryption.wker -------------------------------------------------------------------------------- /script/ATTACKUTILS/js.js: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/ATTACKUTILS/js.js -------------------------------------------------------------------------------- /script/BASE/baseStruct.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/BASE/baseStruct.wker -------------------------------------------------------------------------------- /script/SQL注入/MySQL/MYSQL_Interject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/SQL注入/MySQL/MYSQL_Interject.wker -------------------------------------------------------------------------------- /script/SSTI注入/SSTI注入.Wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/SSTI注入/SSTI注入.Wker -------------------------------------------------------------------------------- /script/WEB_EXP/Apache_EXP/Apache-Solr任意文件读取.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/Apache_EXP/Apache-Solr任意文件读取.wker -------------------------------------------------------------------------------- /script/WEB_EXP/RG-UAC_1day_EXP/RG-UAC_1day.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/RG-UAC_1day_EXP/RG-UAC_1day.wker -------------------------------------------------------------------------------- /script/WEB_EXP/Seacms_EXP/seacms_getshell.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/Seacms_EXP/seacms_getshell.wker -------------------------------------------------------------------------------- /script/WEB_EXP/网康前台RCE/网康前台RCE_EXP.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/网康前台RCE/网康前台RCE_EXP.wker -------------------------------------------------------------------------------- /script/WEB_EXP/网康前台RCE/网康前台RCE_POC.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/网康前台RCE/网康前台RCE_POC.wker -------------------------------------------------------------------------------- /script/WEB_EXP/羊毛_POC&EXP/羊毛EXP.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/羊毛_POC&EXP/羊毛EXP.wker -------------------------------------------------------------------------------- /script/WEB_EXP/羊毛_POC&EXP/羊毛POC.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/羊毛_POC&EXP/羊毛POC.wker -------------------------------------------------------------------------------- /script/WEB_EXP/致远OA_EXP/致远OA-test.jsp.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/致远OA_EXP/致远OA-test.jsp.wker -------------------------------------------------------------------------------- /script/WEB_EXP/通达OA_EXP/OAShell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/通达OA_EXP/OAShell.txt -------------------------------------------------------------------------------- /script/WEB_EXP/通达OA_EXP/通达OA.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/WEB_EXP/通达OA_EXP/通达OA.wker -------------------------------------------------------------------------------- /script/二进制_EXP/CVE-2016-0638.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/二进制_EXP/CVE-2016-0638.wker -------------------------------------------------------------------------------- /script/二进制_EXP/CVE-2016-3510.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/二进制_EXP/CVE-2016-3510.wker -------------------------------------------------------------------------------- /script/二进制_EXP/CVE-2017-3248.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/二进制_EXP/CVE-2017-3248.wker -------------------------------------------------------------------------------- /script/二进制_EXP/CVE-2018-2628.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/二进制_EXP/CVE-2018-2628.wker -------------------------------------------------------------------------------- /script/二进制_EXP/CVE-2018-2893.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/二进制_EXP/CVE-2018-2893.wker -------------------------------------------------------------------------------- /script/二进制_EXP/Demo.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/二进制_EXP/Demo.wker -------------------------------------------------------------------------------- /script/二进制_EXP/vsftp_bdoor.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/二进制_EXP/vsftp_bdoor.wker -------------------------------------------------------------------------------- /script/信息收集/CMS识别.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/CMS识别.wker -------------------------------------------------------------------------------- /script/信息收集/IP旁站查询.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/IP旁站查询.wker -------------------------------------------------------------------------------- /script/信息收集/dir.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/dir.txt -------------------------------------------------------------------------------- /script/信息收集/whoise查询.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/whoise查询.wker -------------------------------------------------------------------------------- /script/信息收集/在线指纹查询.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/在线指纹查询.wker -------------------------------------------------------------------------------- /script/信息收集/子域名查询.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/子域名查询.wker -------------------------------------------------------------------------------- /script/信息收集/旁站查询.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/旁站查询.wker -------------------------------------------------------------------------------- /script/信息收集/目录扫描.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/目录扫描.wker -------------------------------------------------------------------------------- /script/信息收集/端口扫描.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/端口扫描.wker -------------------------------------------------------------------------------- /script/信息收集/网站IP地址匹配.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/网站IP地址匹配.wker -------------------------------------------------------------------------------- /script/信息收集/网站匹配链接.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/网站匹配链接.wker -------------------------------------------------------------------------------- /script/信息收集/网站邮箱匹配.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/信息收集/网站邮箱匹配.wker -------------------------------------------------------------------------------- /script/暴力破解/验证码爆破例子.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/暴力破解/验证码爆破例子.wker -------------------------------------------------------------------------------- /script/渗透辅助/360soso搜索.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/360soso搜索.wker -------------------------------------------------------------------------------- /script/渗透辅助/CSRF页面生成.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/CSRF页面生成.wker -------------------------------------------------------------------------------- /script/渗透辅助/csrfDemo.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/csrfDemo.html -------------------------------------------------------------------------------- /script/渗透辅助/fofa搜索.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/fofa搜索.wker -------------------------------------------------------------------------------- /script/渗透辅助/md5解密.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/md5解密.wker -------------------------------------------------------------------------------- /script/渗透辅助/poc.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/poc.html -------------------------------------------------------------------------------- /script/渗透辅助/判断http或http.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/判断http或http.wker -------------------------------------------------------------------------------- /script/渗透辅助/微信公众号文章搜索.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/微信公众号文章搜索.wker -------------------------------------------------------------------------------- /script/渗透辅助/必应搜索.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/必应搜索.wker -------------------------------------------------------------------------------- /script/渗透辅助/搜狗搜索.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/搜狗搜索.wker -------------------------------------------------------------------------------- /script/渗透辅助/百度搜索.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/百度搜索.wker -------------------------------------------------------------------------------- /script/渗透辅助/钟馗之眼搜索.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/渗透辅助/钟馗之眼搜索.wker -------------------------------------------------------------------------------- /script/漏洞探测/360天擎/360天擎SQL注入.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/360天擎/360天擎SQL注入.wker -------------------------------------------------------------------------------- /script/漏洞探测/360天擎/360天擎越权访问.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/360天擎/360天擎越权访问.wker -------------------------------------------------------------------------------- /script/漏洞探测/74cms/74cms_jobs_near_list_php_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/74cms/74cms_jobs_near_list_php_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/74cms/74cms_sql1.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/74cms/74cms_sql1.wker -------------------------------------------------------------------------------- /script/漏洞探测/74cms/74cms_sql2.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/74cms/74cms_sql2.wker -------------------------------------------------------------------------------- /script/漏洞探测/74cms/74cms_sql3.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/74cms/74cms_sql3.wker -------------------------------------------------------------------------------- /script/漏洞探测/ActiveMQ/ActiveMQ 反序列化漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ActiveMQ/ActiveMQ 反序列化漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/ActiveMQ/ActiveMQ任意文件写入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ActiveMQ/ActiveMQ任意文件写入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/ActiveMQ/activemq-default-password.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ActiveMQ/activemq-default-password.wker -------------------------------------------------------------------------------- /script/漏洞探测/Adobe/Adobe ColdFusion 文件读取漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Adobe/Adobe ColdFusion 文件读取漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Airflow/airflow-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Airflow/airflow-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/Apache/Apache Solr 远程命令执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Apache/Apache Solr 远程命令执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Apache/Apache solr XML 实体注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Apache/Apache solr XML 实体注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Apache/Apache样例文件泄露泄露漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Apache/Apache样例文件泄露泄露漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Apache/CVE-2020-17519 Apache Flink 任意文件读取漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Apache/CVE-2020-17519 Apache Flink 任意文件读取漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Apache/apache-flink-upload-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Apache/apache-flink-upload-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/Apache/apache-kylin-unauth-cve-2020-13937.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Apache/apache-kylin-unauth-cve-2020-13937.wker -------------------------------------------------------------------------------- /script/漏洞探测/Apache/apache-ofbiz-cve-2018-8033-xxe.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Apache/apache-ofbiz-cve-2018-8033-xxe.wker -------------------------------------------------------------------------------- /script/漏洞探测/Apache/apache-ofbiz-cve-2020-9496-xml-deserialization.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Apache/apache-ofbiz-cve-2020-9496-xml-deserialization.wker -------------------------------------------------------------------------------- /script/漏洞探测/Apereo/Apereo CAS 4.1 反序列化命令执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Apereo/Apereo CAS 4.1 反序列化命令执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/AppWeb/AppWeb认证绕过漏洞(CVE-2018-8715).wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/AppWeb/AppWeb认证绕过漏洞(CVE-2018-8715).wker -------------------------------------------------------------------------------- /script/漏洞探测/Atlassian/Atlassian Confluence 路径穿越.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Atlassian/Atlassian Confluence 路径穿越.wker -------------------------------------------------------------------------------- /script/漏洞探测/Atlassian/Atlassian Jira 信息泄露漏洞 CVE-2020-14181.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Atlassian/Atlassian Jira 信息泄露漏洞 CVE-2020-14181.wker -------------------------------------------------------------------------------- /script/漏洞探测/BSPHP/BSPHP验证系统信息泄露.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/BSPHP/BSPHP验证系统信息泄露.wker -------------------------------------------------------------------------------- /script/漏洞探测/CGI/PHP-CGI远程代码执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/CGI/PHP-CGI远程代码执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/CVE/CVE-2015-1427.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/CVE/CVE-2015-1427.wker -------------------------------------------------------------------------------- /script/漏洞探测/CVE/CVE-2017-10271.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/CVE/CVE-2017-10271.txt -------------------------------------------------------------------------------- /script/漏洞探测/CVE/CVE-2017-10271.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/CVE/CVE-2017-10271.wker -------------------------------------------------------------------------------- /script/漏洞探测/CVE/CVE-2017-3506.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/CVE/CVE-2017-3506.txt -------------------------------------------------------------------------------- /script/漏洞探测/CVE/CVE-2017-3506.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/CVE/CVE-2017-3506.wker -------------------------------------------------------------------------------- /script/漏洞探测/CVE/exchange-cve-2021-26855-ssrf.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/CVE/exchange-cve-2021-26855-ssrf.wker -------------------------------------------------------------------------------- /script/漏洞探测/Cocoon/Apache Cocoon Xml 注入 CVE-2020-11991.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Cocoon/Apache Cocoon Xml 注入 CVE-2020-11991.wker -------------------------------------------------------------------------------- /script/漏洞探测/Couchdb/Couchdb 垂直权限绕过漏洞(CVE-2017-12635.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Couchdb/Couchdb 垂直权限绕过漏洞(CVE-2017-12635.wker -------------------------------------------------------------------------------- /script/漏洞探测/Couchdb/couchdb-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Couchdb/couchdb-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/D-Link/D-Link DCS系列监控 账号密码信息泄露漏洞 CNVD-2020-25078.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/D-Link/D-Link DCS系列监控 账号密码信息泄露漏洞 CNVD-2020-25078.wker -------------------------------------------------------------------------------- /script/漏洞探测/D-Link/dlink-850l-info-leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/D-Link/dlink-850l-info-leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/D-Link/dlink-cve-2019-17506.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/D-Link/dlink-cve-2019-17506.wker -------------------------------------------------------------------------------- /script/漏洞探测/D-Link/dlink-cve-2020-9376-dump-credentials.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/D-Link/dlink-cve-2020-9376-dump-credentials.wker -------------------------------------------------------------------------------- /script/漏洞探测/D-Link/dlink-dsl-2888a-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/D-Link/dlink-dsl-2888a-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/Discuz/DZxgetshell.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Discuz/DZxgetshell.wker -------------------------------------------------------------------------------- /script/漏洞探测/Discuz/Discuz 7.x6.x 全局变量防御绕过导致代码执行.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Discuz/Discuz 7.x6.x 全局变量防御绕过导致代码执行.wker -------------------------------------------------------------------------------- /script/漏洞探测/Discuz/Discuz7_2_admincp_php_xss.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Discuz/Discuz7_2_admincp_php_xss.wker -------------------------------------------------------------------------------- /script/漏洞探测/Discuz/Discuz7_2_ajax_php_xss.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Discuz/Discuz7_2_ajax_php_xss.wker -------------------------------------------------------------------------------- /script/漏洞探测/Discuz/Disucz3_flvplayer_swf_xss.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Discuz/Disucz3_flvplayer_swf_xss.wker -------------------------------------------------------------------------------- /script/漏洞探测/Discuz/discuz7_2_faq_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Discuz/discuz7_2_faq_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/Discuz/discuz7_2_post_php_xss.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Discuz/discuz7_2_post_php_xss.wker -------------------------------------------------------------------------------- /script/漏洞探测/Django/Django Open redirect possibility.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Django/Django Open redirect possibility.wker -------------------------------------------------------------------------------- /script/漏洞探测/Django/Django debug page XSS漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Django/Django debug page XSS漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Drupal/Drupal 7.32 “Drupalgeddon” SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Drupal/Drupal 7.32 “Drupalgeddon” SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Drupal/DrupalRCE.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Drupal/DrupalRCE.wker -------------------------------------------------------------------------------- /script/漏洞探测/Drupal/drupal-cve-2018-7600-rce-18.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Drupal/drupal-cve-2018-7600-rce-18.wker -------------------------------------------------------------------------------- /script/漏洞探测/Drupal/drupal-cve-2018-7600-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Drupal/drupal-cve-2018-7600-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/Drupal/drupal-cve-2019-6340.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Drupal/drupal-cve-2019-6340.wker -------------------------------------------------------------------------------- /script/漏洞探测/ElasticSearch/ElasticSearch Groovy 沙盒绕过 && 代码执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ElasticSearch/ElasticSearch Groovy 沙盒绕过 && 代码执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/ElasticSearch/ElasticSearch目录遍历漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ElasticSearch/ElasticSearch目录遍历漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/ElasticSearch/ElasticSearch远程命令执行.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ElasticSearch/ElasticSearch远程命令执行.wker -------------------------------------------------------------------------------- /script/漏洞探测/ElasticSearch/Elasticsearch写入webshell漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ElasticSearch/Elasticsearch写入webshell漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/ElasticSearch/elasticsearch-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ElasticSearch/elasticsearch-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/Exchange/Microsoft Exchange SSRF漏洞 CVE-2021-26885.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Exchange/Microsoft Exchange SSRF漏洞 CVE-2021-26885.wker -------------------------------------------------------------------------------- /script/漏洞探测/Flask/Flask(Jinja2) 服务端模板注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Flask/Flask(Jinja2) 服务端模板注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/GitLab/GitLab Graphql邮箱信息泄露漏洞 CVE-2020-26413.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/GitLab/GitLab Graphql邮箱信息泄露漏洞 CVE-2020-26413.wker -------------------------------------------------------------------------------- /script/漏洞探测/KesionCMS/KesionCMS_asp_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/KesionCMS/KesionCMS_asp_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/Kylin/Apache Kylin Console 控制台弱口令.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Kylin/Apache Kylin Console 控制台弱口令.wker -------------------------------------------------------------------------------- /script/漏洞探测/Kylin/Apache Kylin 未授权配置泄露 CVE-2020-13937.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Kylin/Apache Kylin 未授权配置泄露 CVE-2020-13937.wker -------------------------------------------------------------------------------- /script/漏洞探测/MacCMS/MacCMS GetShell.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/MacCMS/MacCMS GetShell.wker -------------------------------------------------------------------------------- /script/漏洞探测/MacCMS/MacCMS_v8_inc_ajax_sql.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/MacCMS/MacCMS_v8_inc_ajax_sql.wker -------------------------------------------------------------------------------- /script/漏洞探测/MacCMS/MacCMS_v8_inc_api_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/MacCMS/MacCMS_v8_inc_api_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/MacCMS/maccms-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/MacCMS/maccms-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/MacCMS/maccmsv10-backdoor.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/MacCMS/maccmsv10-backdoor.wker -------------------------------------------------------------------------------- /script/漏洞探测/Magento/Magento 2.2 SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Magento/Magento 2.2 SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/MessageSolution/MessageSolution 邮件归档系统EEA 信息泄露漏洞 CNVD-2021-10543.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/MessageSolution/MessageSolution 邮件归档系统EEA 信息泄露漏洞 CNVD-2021-10543.wker -------------------------------------------------------------------------------- /script/漏洞探测/Nodejs/Node.js 目录穿越漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Nodejs/Node.js 目录穿越漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/PHPUnit/PHPUnit Remote Code Execution.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/PHPUnit/PHPUnit Remote Code Execution.wker -------------------------------------------------------------------------------- /script/漏洞探测/PageAdmin/PageAdmin可“伪造”VIEWSTATE执行任意SQL查询&重置管理员密码漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/PageAdmin/PageAdmin可“伪造”VIEWSTATE执行任意SQL查询&重置管理员密码漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/SiteEngine/SiteEngine6.0 comments.php SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/SiteEngine/SiteEngine6.0 comments.php SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/SiteEngine/SiteEngine7.0 comments.php SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/SiteEngine/SiteEngine7.0 comments.php SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Spring/Spring Data Commons 远程命令执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Spring/Spring Data Commons 远程命令执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Spring/Spring Security OAuth2 远程命令执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Spring/Spring Security OAuth2 远程命令执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Spring/spring-cloud-cve-2020-5405.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Spring/spring-cloud-cve-2020-5405.wker -------------------------------------------------------------------------------- /script/漏洞探测/Spring/spring-cloud-cve-2020-5410.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Spring/spring-cloud-cve-2020-5410.wker -------------------------------------------------------------------------------- /script/漏洞探测/Spring/spring-cve-2016-4977.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Spring/spring-cve-2016-4977.wker -------------------------------------------------------------------------------- /script/漏洞探测/Spring/springboot-env-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Spring/springboot-env-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/Spring/springcloud-cve-2019-3799.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Spring/springcloud-cve-2019-3799.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-006.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-006.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-009.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-009.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-013.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-013.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-016.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-016.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-019.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-019.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-032.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-032.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-045.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-045.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-052.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-052.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-053.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-053.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-057.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-057.wker -------------------------------------------------------------------------------- /script/漏洞探测/Struts2/S2-dev.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Struts2/S2-dev.wker -------------------------------------------------------------------------------- /script/漏洞探测/Supervisord/Supervisord 远程命令执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Supervisord/Supervisord 远程命令执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/Zblog/Zblog_file_include.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Zblog/Zblog_file_include.wker -------------------------------------------------------------------------------- /script/漏洞探测/Zblog/zblog_1_8_search_asp_xss.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/Zblog/zblog_1_8_search_asp_xss.wker -------------------------------------------------------------------------------- /script/漏洞探测/alibaba/Alibaba Nacos 任意用户创建.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/alibaba/Alibaba Nacos 任意用户创建.wker -------------------------------------------------------------------------------- /script/漏洞探测/alibaba/Alibaba Nacos 未授权访问漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/alibaba/Alibaba Nacos 未授权访问漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/alibaba/alibaba-canal-info-leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/alibaba/alibaba-canal-info-leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/alibaba/alibaba-nacos-v1-auth-bypass.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/alibaba/alibaba-nacos-v1-auth-bypass.wker -------------------------------------------------------------------------------- /script/漏洞探测/aspcms/AspCms_SiteSetting_getshell.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/aspcms/AspCms_SiteSetting_getshell.wker -------------------------------------------------------------------------------- /script/漏洞探测/aspcms/aspcms-backend-leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/aspcms/aspcms-backend-leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/aspcms/aspcms_sqlinterject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/aspcms/aspcms_sqlinterject.wker -------------------------------------------------------------------------------- /script/漏洞探测/bash/bash-cve-2014-6271.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/bash/bash-cve-2014-6271.wker -------------------------------------------------------------------------------- /script/漏洞探测/bt742/bt742-pma-unauthorized-access.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/bt742/bt742-pma-unauthorized-access.wker -------------------------------------------------------------------------------- /script/漏洞探测/cacti/cacti-weathermap-file-write.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/cacti/cacti-weathermap-file-write.wker -------------------------------------------------------------------------------- /script/漏洞探测/chinaunicom/chinaunicom-modem-default-password.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/chinaunicom/chinaunicom-modem-default-password.wker -------------------------------------------------------------------------------- /script/漏洞探测/cisco/cisco-cve-2020-3452-readfile.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/cisco/cisco-cve-2020-3452-readfile.wker -------------------------------------------------------------------------------- /script/漏洞探测/citrix/citrix-cve-2019-19781-path-traversal.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/citrix/citrix-cve-2019-19781-path-traversal.wker -------------------------------------------------------------------------------- /script/漏洞探测/citrix/citrix-cve-2020-8191-xss.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/citrix/citrix-cve-2020-8191-xss.wker -------------------------------------------------------------------------------- /script/漏洞探测/citrix/citrix-cve-2020-8193-unauthorized.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/citrix/citrix-cve-2020-8193-unauthorized.wker -------------------------------------------------------------------------------- /script/漏洞探测/citrix/citrix-xenmobile-cve-2020-8209.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/citrix/citrix-xenmobile-cve-2020-8209.wker -------------------------------------------------------------------------------- /script/漏洞探测/cmseasy/cmseasy header.php 报错注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/cmseasy/cmseasy header.php 报错注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/cmseasy/cmseasy_header_detail_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/cmseasy/cmseasy_header_detail_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/cmseasy/cmseasy_swfupload_xss.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/cmseasy/cmseasy_swfupload_xss.wker -------------------------------------------------------------------------------- /script/漏洞探测/coldfusion/coldfusion-cve-2010-2861-lfi.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/coldfusion/coldfusion-cve-2010-2861-lfi.wker -------------------------------------------------------------------------------- /script/漏洞探测/confluence/confluence-cve-2015-8399.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/confluence/confluence-cve-2015-8399.wker -------------------------------------------------------------------------------- /script/漏洞探测/confluence/confluence-cve-2019-3396-lfi.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/confluence/confluence-cve-2019-3396-lfi.wker -------------------------------------------------------------------------------- /script/漏洞探测/consul/consul-rexec-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/consul/consul-rexec-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/consul/consul-service-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/consul/consul-service-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/coremail/coremail_leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/coremail/coremail_leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/couchcms/couchcms-cve-2018-7662.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/couchcms/couchcms-cve-2018-7662.wker -------------------------------------------------------------------------------- /script/漏洞探测/craftcms/craftcms-seomatic-cve-2020-9757-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/craftcms/craftcms-seomatic-cve-2020-9757-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/dedecms/dede_getshell.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dedecms/dede_getshell.wker -------------------------------------------------------------------------------- /script/漏洞探测/dedecms/dedecms_error_trace_disclosure.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dedecms/dedecms_error_trace_disclosure.wker -------------------------------------------------------------------------------- /script/漏洞探测/dedecms/dedecms_guige_getshell.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dedecms/dedecms_guige_getshell.wker -------------------------------------------------------------------------------- /script/漏洞探测/dedecms/dedecms_mysql_error_trace_inc.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dedecms/dedecms_mysql_error_trace_inc.wker -------------------------------------------------------------------------------- /script/漏洞探测/dedecms/dedecms_recommend_php_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dedecms/dedecms_recommend_php_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/dedecms/dedecms_search_typeArr_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dedecms/dedecms_search_typeArr_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/dedecms/dedecms_swfupload_xss.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dedecms/dedecms_swfupload_xss.wker -------------------------------------------------------------------------------- /script/漏洞探测/dedecms/dedecms_updatenew.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dedecms/dedecms_updatenew.wker -------------------------------------------------------------------------------- /script/漏洞探测/dedecms/dedecms_url_redirect.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dedecms/dedecms_url_redirect.wker -------------------------------------------------------------------------------- /script/漏洞探测/docker/docker-api-unauthorized-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/docker/docker-api-unauthorized-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/docker/docker-registry-api-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/docker/docker-registry-api-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/docker/docker_remote_api.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/docker/docker_remote_api.wker -------------------------------------------------------------------------------- /script/漏洞探测/dotnetcms/dotnetcms-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dotnetcms/dotnetcms-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/draytek/draytek-cve-2020-8515.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/draytek/draytek-cve-2020-8515.wker -------------------------------------------------------------------------------- /script/漏洞探测/dreamgallery/dreamgallery album.php SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dreamgallery/dreamgallery album.php SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/druid/druid-monitor-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/druid/druid-monitor-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/duomicms/duomicms-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/duomicms/duomicms-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/dvr/dvr-cve-2018-9995.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/dvr/dvr-cve-2018-9995.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecology/ecology-filedownload-directory-traversal.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecology/ecology-filedownload-directory-traversal.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecology/ecology-javabeanshell-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecology/ecology-javabeanshell-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecology/ecology-springframework-directory-traversal.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecology/ecology-springframework-directory-traversal.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecology/ecology-syncuserinfo-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecology/ecology-syncuserinfo-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecology/ecology-validate-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecology/ecology-validate-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecology/ecology-workflowcentertreedata-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecology/ecology-workflowcentertreedata-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecshop/ecshop-cnvd-2020-58823-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecshop/ecshop-cnvd-2020-58823-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecshop/ecshop-rce-3.X.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecshop/ecshop-rce-3.X.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecshop/ecshop-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecshop/ecshop-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecshop/ecshop2_7_2_category_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecshop/ecshop2_7_2_category_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecshop/ecshop_2_7_3_api_php_sqlinject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecshop/ecshop_2_7_3_api_php_sqlinject.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecshop/ecshop_flow_orderid_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecshop/ecshop_flow_orderid_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/ecshop/ecshop_uc_code_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ecshop/ecshop_uc_code_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/etouch/etouch-v2-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/etouch/etouch-v2-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/eyou/eYou_v5_help_class_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/eyou/eYou_v5_help_class_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/eyou/eyou_resetpw.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/eyou/eyou_resetpw.wker -------------------------------------------------------------------------------- /script/漏洞探测/eyou/eyou_user_kw_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/eyou/eyou_user_kw_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/eyou/eyou_weakpass.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/eyou/eyou_weakpass.wker -------------------------------------------------------------------------------- /script/漏洞探测/eyou/eyoucms_getshell.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/eyou/eyoucms_getshell.wker -------------------------------------------------------------------------------- /script/漏洞探测/f5/f5-tmui-cve-2020-5902-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/f5/f5-tmui-cve-2020-5902-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/fangweicms/fangweicms-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/fangweicms/fangweicms-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/fastmeeting/fastmeeting_download_filedownload漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/fastmeeting/fastmeeting_download_filedownload漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/feifeicms/feifeicms-lfr.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/feifeicms/feifeicms-lfr.wker -------------------------------------------------------------------------------- /script/漏洞探测/finecms/FineCMS任意文件上传漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/finecms/FineCMS任意文件上传漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/finecms/finecms-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/finecms/finecms-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/finereport/finereport-directory-traversal.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/finereport/finereport-directory-traversal.wker -------------------------------------------------------------------------------- /script/漏洞探测/flink/flink-jobmanager-cve-2020-17519-lfi.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/flink/flink-jobmanager-cve-2020-17519-lfi.wker -------------------------------------------------------------------------------- /script/漏洞探测/forease/forease_fileinclude_code_exec.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/forease/forease_fileinclude_code_exec.wker -------------------------------------------------------------------------------- /script/漏洞探测/fortigate/fortigate-cve-2018-13379-readfile.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/fortigate/fortigate-cve-2018-13379-readfile.wker -------------------------------------------------------------------------------- /script/漏洞探测/frp/frp-dashboard-defaultpassword.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/frp/frp-dashboard-defaultpassword.wker -------------------------------------------------------------------------------- /script/漏洞探测/frp/frp-dashboard-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/frp/frp-dashboard-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/fsmcms/FSMCMS columninfo.jsp文件参数ColumnID SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/fsmcms/FSMCMS columninfo.jsp文件参数ColumnID SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/fsmcms/FSMCMS网站重装漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/fsmcms/FSMCMS网站重装漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/fsmcms/fsmcms SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/fsmcms/fsmcms SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/gilacms/gilacms-cve-2020-5515.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/gilacms/gilacms-cve-2020-5515.wker -------------------------------------------------------------------------------- /script/漏洞探测/git/git_information_disclosure.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/git/git_information_disclosure.wker -------------------------------------------------------------------------------- /script/漏洞探测/glassfish/glassfish-cve-2017-1000028-lfi.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/glassfish/glassfish-cve-2017-1000028-lfi.wker -------------------------------------------------------------------------------- /script/漏洞探测/go-pprof/go-pprof-leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/go-pprof/go-pprof-leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/h2/h2-database-web-console-unauthorized-access.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/h2/h2-database-web-console-unauthorized-access.wker -------------------------------------------------------------------------------- /script/漏洞探测/hadoop/hadoop-yarn-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/hadoop/hadoop-yarn-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/harbor/harbor-cve-2019-16097.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/harbor/harbor-cve-2019-16097.wker -------------------------------------------------------------------------------- /script/漏洞探测/hfs/hfs.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/hfs/hfs.wker -------------------------------------------------------------------------------- /script/漏洞探测/hikvision/HIKVISION 视频编码设备接入网关 任意文件下载.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/hikvision/HIKVISION 视频编码设备接入网关 任意文件下载.wker -------------------------------------------------------------------------------- /script/漏洞探测/hikvision/hikvision-cve-2017-7921.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/hikvision/hikvision-cve-2017-7921.wker -------------------------------------------------------------------------------- /script/漏洞探测/hishop/hishop_productlist_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/hishop/hishop_productlist_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/hudson/hudson_ws_disclosure.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/hudson/hudson_ws_disclosure.wker -------------------------------------------------------------------------------- /script/漏洞探测/ifw8/ifw8-router-cve-2019-16313.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ifw8/ifw8-router-cve-2019-16313.wker -------------------------------------------------------------------------------- /script/漏洞探测/iis/iis_parse.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/iis/iis_parse.wker -------------------------------------------------------------------------------- /script/漏洞探测/influxdb/influxdb-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/influxdb/influxdb-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/jboss/jboss-cve-2010-1871.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jboss/jboss-cve-2010-1871.wker -------------------------------------------------------------------------------- /script/漏洞探测/jboss/jboss-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jboss/jboss-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/jenkins/jenkins-cve-2018-1000861-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jenkins/jenkins-cve-2018-1000861-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/jetbrains/jetbrains_ide_workspace_disclosure.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jetbrains/jetbrains_ide_workspace_disclosure.wker -------------------------------------------------------------------------------- /script/漏洞探测/jira/jira-cve-2019-8442.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jira/jira-cve-2019-8442.wker -------------------------------------------------------------------------------- /script/漏洞探测/jira/jira-cve-2019-8449.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jira/jira-cve-2019-8449.wker -------------------------------------------------------------------------------- /script/漏洞探测/jira/jira-cve-2020-14179.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jira/jira-cve-2020-14179.wker -------------------------------------------------------------------------------- /script/漏洞探测/jira/jira-cve-2020-14181.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jira/jira-cve-2020-14181.wker -------------------------------------------------------------------------------- /script/漏洞探测/joomla/Joomla_spider_form_maker_sqlinject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/joomla/Joomla_spider_form_maker_sqlinject.wker -------------------------------------------------------------------------------- /script/漏洞探测/joomla/joomla-component-vreview-sql.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/joomla/joomla-component-vreview-sql.wker -------------------------------------------------------------------------------- /script/漏洞探测/joomla/joomla-cve-2015-7297-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/joomla/joomla-cve-2015-7297-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/joomla/joomla-cve-2017-8917-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/joomla/joomla-cve-2017-8917-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/joomla/joomla-cve-2018-7314-sql.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/joomla/joomla-cve-2018-7314-sql.wker -------------------------------------------------------------------------------- /script/漏洞探测/joomla/joomla-ext-zhbaidumap-cve-2018-6605-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/joomla/joomla-ext-zhbaidumap-cve-2018-6605-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/joomla/joomla_com_docman.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/joomla/joomla_com_docman.wker -------------------------------------------------------------------------------- /script/漏洞探测/joomla/joomla_index_list_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/joomla/joomla_index_list_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/jumpserver/jumpserver-unauth-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jumpserver/jumpserver-unauth-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/jupyter/jupyter-notebook-unauthorized-access.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/jupyter/jupyter-notebook-unauthorized-access.wker -------------------------------------------------------------------------------- /script/漏洞探测/kafka/kafka-manager-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/kafka/kafka-manager-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/kibana/kibana-cve-2018-17246.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/kibana/kibana-cve-2018-17246.wker -------------------------------------------------------------------------------- /script/漏洞探测/kibana/kibana-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/kibana/kibana-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/kong/kong-cve-2020-11710-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/kong/kong-cve-2020-11710-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/lanproxy/Lanproxy目录遍历 CVE-2021-3019.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/lanproxy/Lanproxy目录遍历 CVE-2021-3019.wker -------------------------------------------------------------------------------- /script/漏洞探测/lanproxy/lanproxy-cve-2021-3019-lfi.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/lanproxy/lanproxy-cve-2021-3019-lfi.wker -------------------------------------------------------------------------------- /script/漏洞探测/laravel/Laravel .env 配置文件泄露 CVE-2017-16894.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/laravel/Laravel .env 配置文件泄露 CVE-2017-16894.wker -------------------------------------------------------------------------------- /script/漏洞探测/laravel/laravel-debug-info-leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/laravel/laravel-debug-info-leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/laravel/laravel-improper-webdir.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/laravel/laravel-improper-webdir.wker -------------------------------------------------------------------------------- /script/漏洞探测/libsys/libsys_ajax_asyn_link_fileread漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/libsys/libsys_ajax_asyn_link_fileread漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/libsys/libsys_ajax_asyn_link_old_fileread漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/libsys/libsys_ajax_asyn_link_old_fileread漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/libsys/libsys_ajax_get_file_fileread漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/libsys/libsys_ajax_get_file_fileread漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/metinfo/metinfo v5.3 SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/metinfo/metinfo v5.3 SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/metinfo/metinfo-cve-2019-16996-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/metinfo/metinfo-cve-2019-16996-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/metinfo/metinfo-cve-2019-16997-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/metinfo/metinfo-cve-2019-16997-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/metinfo/metinfo-cve-2019-17418-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/metinfo/metinfo-cve-2019-17418-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/metinfo/metinfo-file-read.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/metinfo/metinfo-file-read.wker -------------------------------------------------------------------------------- /script/漏洞探测/metinfo/metinfo-lfi-cnvd-2018-13393.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/metinfo/metinfo-lfi-cnvd-2018-13393.wker -------------------------------------------------------------------------------- /script/漏洞探测/minio/minio-default-password.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/minio/minio-default-password.wker -------------------------------------------------------------------------------- /script/漏洞探测/mongo/mongo-express 远程代码执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/mongo/mongo-express 远程代码执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/msvod/msvod-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/msvod/msvod-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/myucms/myucms-lfr.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/myucms/myucms-lfr.wker -------------------------------------------------------------------------------- /script/漏洞探测/nagio/nagio-cve-2018-10735.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nagio/nagio-cve-2018-10735.wker -------------------------------------------------------------------------------- /script/漏洞探测/nagio/nagio-cve-2018-10736.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nagio/nagio-cve-2018-10736.wker -------------------------------------------------------------------------------- /script/漏洞探测/nagio/nagio-cve-2018-10737.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nagio/nagio-cve-2018-10737.wker -------------------------------------------------------------------------------- /script/漏洞探测/nagio/nagio-cve-2018-10738.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nagio/nagio-cve-2018-10738.wker -------------------------------------------------------------------------------- /script/漏洞探测/netgear/netgear-cve-2017-5521.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/netgear/netgear-cve-2017-5521.wker -------------------------------------------------------------------------------- /script/漏洞探测/nextjs/nextjs-cve-2017-16877.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nextjs/nextjs-cve-2017-16877.wker -------------------------------------------------------------------------------- /script/漏洞探测/nexus/nexus-cve-2020-10199.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nexus/nexus-cve-2020-10199.wker -------------------------------------------------------------------------------- /script/漏洞探测/nexus/nexus-cve-2020-10204.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nexus/nexus-cve-2020-10204.wker -------------------------------------------------------------------------------- /script/漏洞探测/nexus/nexus-default-password.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nexus/nexus-default-password.wker -------------------------------------------------------------------------------- /script/漏洞探测/nexusdb/nexusdb-cve-2020-24571-path-traversal.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nexusdb/nexusdb-cve-2020-24571-path-traversal.wker -------------------------------------------------------------------------------- /script/漏洞探测/nps/nps-default-password.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nps/nps-default-password.wker -------------------------------------------------------------------------------- /script/漏洞探测/nsfocus/nsfocus-uts-password-leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nsfocus/nsfocus-uts-password-leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/nuuo/nuuo-file-inclusion.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/nuuo/nuuo-file-inclusion.wker -------------------------------------------------------------------------------- /script/漏洞探测/odoo/odoo-file-read-linux.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/odoo/odoo-file-read-linux.wker -------------------------------------------------------------------------------- /script/漏洞探测/odoo/odoo-file-read-win.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/odoo/odoo-file-read-win.wker -------------------------------------------------------------------------------- /script/漏洞探测/openfire/openfire-cve-2019-18394-ssrf.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/openfire/openfire-cve-2019-18394-ssrf.wker -------------------------------------------------------------------------------- /script/漏洞探测/php-cgi/php-cgi-cve-2012-1823.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/php-cgi/php-cgi-cve-2012-1823.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms-cve-2018-19127.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms-cve-2018-19127.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms_auth_key_leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms_auth_key_leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms_digg_add_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms_digg_add_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms_file_red.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms_file_red.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms_flash_upload_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms_flash_upload_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms_product_code_exec.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms_product_code_exec.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms_swfupload_xss.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms_swfupload_xss.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms_user_login_sqlinject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms_user_login_sqlinject.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms_video_for_ck_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms_video_for_ck_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpcms/phpcms_vote_tag_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpcms/phpcms_vote_tag_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpinfo/phpinfo_leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpinfo/phpinfo_leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpmyadmin/Phpmyadmin Scriptssetup.php Deserialization.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpmyadmin/Phpmyadmin Scriptssetup.php Deserialization.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpmyadmin/phpmyadmin-cve-2018-12613-file-inclusion.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpmyadmin/phpmyadmin-cve-2018-12613-file-inclusion.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpmyadmin/phpmyadmin_pass_test.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpmyadmin/phpmyadmin_pass_test.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpok/phpok api.php SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpok/phpok api.php SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpshe/phpshe-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpshe/phpshe-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpstudy/phpstudy.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpstudy/phpstudy.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpstudy/phpstudy_probe.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpstudy/phpstudy_probe.wker -------------------------------------------------------------------------------- /script/漏洞探测/phpweb/phpweb_sqlinject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/phpweb/phpweb_sqlinject.wker -------------------------------------------------------------------------------- /script/漏洞探测/pulse/pulse-cve-2019-11510.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/pulse/pulse-cve-2019-11510.wker -------------------------------------------------------------------------------- /script/漏洞探测/pyspider/pyspider-unauthorized-access.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/pyspider/pyspider-unauthorized-access.wker -------------------------------------------------------------------------------- /script/漏洞探测/qibo/QiboCMS_v7_file_down.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/qibo/QiboCMS_v7_file_down.wker -------------------------------------------------------------------------------- /script/漏洞探测/qibo/qibocms-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/qibo/qibocms-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/qibo/qibocms_js_f_id_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/qibo/qibocms_js_f_id_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/qibo/qibocms_s_fids_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/qibo/qibocms_s_fids_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/qibo/qibocms_search_code_exec.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/qibo/qibocms_search_code_exec.wker -------------------------------------------------------------------------------- /script/漏洞探测/qibo/qibocms_search_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/qibo/qibocms_search_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/qnap/qnap-cve-2019-7192.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/qnap/qnap-cve-2019-7192.wker -------------------------------------------------------------------------------- /script/漏洞探测/rails/rails-cve-2018-3760-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/rails/rails-cve-2018-3760-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/razor/razor-cve-2018-8770.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/razor/razor-cve-2018-8770.wker -------------------------------------------------------------------------------- /script/漏洞探测/rconfig/rconfig-cve-2019-16663.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/rconfig/rconfig-cve-2019-16663.wker -------------------------------------------------------------------------------- /script/漏洞探测/resin/resin-cnnvd-200705-315.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/resin/resin-cnnvd-200705-315.wker -------------------------------------------------------------------------------- /script/漏洞探测/resin/resin-inputfile-fileread-or-ssrf.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/resin/resin-inputfile-fileread-or-ssrf.wker -------------------------------------------------------------------------------- /script/漏洞探测/resin/resin-viewfile-fileread.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/resin/resin-viewfile-fileread.wker -------------------------------------------------------------------------------- /script/漏洞探测/rockmongo/rockmongo-default-password.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/rockmongo/rockmongo-default-password.wker -------------------------------------------------------------------------------- /script/漏洞探测/samsung/samsung-wea453e-default-pwd.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/samsung/samsung-wea453e-default-pwd.wker -------------------------------------------------------------------------------- /script/漏洞探测/samsung/samsung-wea453e-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/samsung/samsung-wea453e-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/sangfor/sangfor-edr-arbitrary-admin-login.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/sangfor/sangfor-edr-arbitrary-admin-login.wker -------------------------------------------------------------------------------- /script/漏洞探测/sangfor/sangfor-edr-cssp-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/sangfor/sangfor-edr-cssp-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/sangfor/sangfor-edr-tool-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/sangfor/sangfor-edr-tool-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/satellian/satellian-cve-2020-7980-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/satellian/satellian-cve-2020-7980-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/seacms/seacms-before-v992-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seacms/seacms-before-v992-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/seacms/seacms-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seacms/seacms-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/seacms/seacms-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seacms/seacms-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/seacms/seacms_order_code_exec.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seacms/seacms_order_code_exec.wker -------------------------------------------------------------------------------- /script/漏洞探测/seacms/seacms_search_code_exec.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seacms/seacms_search_code_exec.wker -------------------------------------------------------------------------------- /script/漏洞探测/seacms/seacms_search_jq_code_exec.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seacms/seacms_search_jq_code_exec.wker -------------------------------------------------------------------------------- /script/漏洞探测/seacms/seacmsv645-command-exec.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seacms/seacmsv645-command-exec.wker -------------------------------------------------------------------------------- /script/漏洞探测/seeyon/seeyon-ajax-unauthorized-access.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seeyon/seeyon-ajax-unauthorized-access.wker -------------------------------------------------------------------------------- /script/漏洞探测/seeyon/seeyon-cnvd-2020-62422-readfile.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seeyon/seeyon-cnvd-2020-62422-readfile.wker -------------------------------------------------------------------------------- /script/漏洞探测/seeyon/seeyon-wooyun-2015-0108235-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seeyon/seeyon-wooyun-2015-0108235-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/seeyon/seeyon-wooyun-2015-148227.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/seeyon/seeyon-wooyun-2015-148227.wker -------------------------------------------------------------------------------- /script/漏洞探测/shop/shop360_do_filedownload.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/shop/shop360_do_filedownload.wker -------------------------------------------------------------------------------- /script/漏洞探测/shop/shopNC B2B版 index.php SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/shop/shopNC B2B版 index.php SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/shop/shopex_ctl_passport_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/shop/shopex_ctl_passport_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/shop/shopex_svinfo_phpinfo_leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/shop/shopex_svinfo_phpinfo_leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/shop/shopnc_index_class_id_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/shop/shopnc_index_class_id_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/shop/shopnum_GuidBuyList_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/shop/shopnum_GuidBuyList_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/shop/shopnum_ProductDetail_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/shop/shopnum_ProductDetail_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/shop/shopnum_ProductListCategory_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/shop/shopnum_ProductListCategory_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/shop/shopnum_ShoppingCart1_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/shop/shopnum_ShoppingCart1_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/siteserver/SiteServer_remoteGetshell.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/siteserver/SiteServer_remoteGetshell.wker -------------------------------------------------------------------------------- /script/漏洞探测/siteserver/siteserver3.6.4 background_administrator.aspx注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/siteserver/siteserver3.6.4 background_administrator.aspx注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/siteserver/siteserver3.6.4 background_keywordsFilting.aspx注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/siteserver/siteserver3.6.4 background_keywordsFilting.aspx注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/siteserver/siteserver3.6.4 background_log.aspx注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/siteserver/siteserver3.6.4 background_log.aspx注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/siteserver/siteserver3.6.4 background_taskLog.aspx注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/siteserver/siteserver3.6.4 background_taskLog.aspx注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/siteserver/siteserver3.6.4 user.aspx注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/siteserver/siteserver3.6.4 user.aspx注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/solarwinds/solarwinds-cve-2020-10148.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/solarwinds/solarwinds-cve-2020-10148.wker -------------------------------------------------------------------------------- /script/漏洞探测/solr/Apache Solr任意文件读取漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/solr/Apache Solr任意文件读取漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/solr/solr-cve-2017-12629-xxe.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/solr/solr-cve-2017-12629-xxe.wker -------------------------------------------------------------------------------- /script/漏洞探测/solr/solr-velocity-template-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/solr/solr-velocity-template-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/sonarqube/sonarqube-cve-2020-27986-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/sonarqube/sonarqube-cve-2020-27986-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/sonicwall/sonicwall-ssl-vpn-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/sonicwall/sonicwall-ssl-vpn-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/spark/spark-api-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/spark/spark-api-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/spark/spark-webui-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/spark/spark-webui-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/tensorboard/tensorboard-unauth.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/tensorboard/tensorboard-unauth.wker -------------------------------------------------------------------------------- /script/漏洞探测/terramaster/terramaster-cve-2020-15568.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/terramaster/terramaster-cve-2020-15568.wker -------------------------------------------------------------------------------- /script/漏洞探测/terramaster/terramaster-cve-2020-28188-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/terramaster/terramaster-cve-2020-28188-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/thinkadmin/thinkadmin-v6-readfile.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/thinkadmin/thinkadmin-v6-readfile.wker -------------------------------------------------------------------------------- /script/漏洞探测/thinkcmf/thinkcmf-lfi.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/thinkcmf/thinkcmf-lfi.wker -------------------------------------------------------------------------------- /script/漏洞探测/thinkcmf/thinkcmf-write-shell.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/thinkcmf/thinkcmf-write-shell.wker -------------------------------------------------------------------------------- /script/漏洞探测/thinkphp/ThinkPHP 2.x 任意代码执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/thinkphp/ThinkPHP 2.x 任意代码执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/thinkphp/ThinkPHP5 5.0.23 Remote Code Execution.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/thinkphp/ThinkPHP5 5.0.23 Remote Code Execution.wker -------------------------------------------------------------------------------- /script/漏洞探测/thinkphp/ThinkPHP5 SQL Injection.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/thinkphp/ThinkPHP5 SQL Injection.wker -------------------------------------------------------------------------------- /script/漏洞探测/thinkphp/Thinkphp5 5.0.225.1.29 Remote Code Execution.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/thinkphp/Thinkphp5 5.0.225.1.29 Remote Code Execution.wker -------------------------------------------------------------------------------- /script/漏洞探测/thinkphp/thinkphp-v6-file-write.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/thinkphp/thinkphp-v6-file-write.wker -------------------------------------------------------------------------------- /script/漏洞探测/thinkphp/thinkphp_exp.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/thinkphp/thinkphp_exp.wker -------------------------------------------------------------------------------- /script/漏洞探测/tomcat/tomcat-cve-2018-11759.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/tomcat/tomcat-cve-2018-11759.wker -------------------------------------------------------------------------------- /script/漏洞探测/tongda-meeting/tongda-meeting-unauthorized-access.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/tongda-meeting/tongda-meeting-unauthorized-access.wker -------------------------------------------------------------------------------- /script/漏洞探测/topsec/topsec_change_lab_file_include.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/topsec/topsec_change_lab_file_include.wker -------------------------------------------------------------------------------- /script/漏洞探测/tpshop/tpshop-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/tpshop/tpshop-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/typecho/typecho install.php反序列化命令执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/typecho/typecho install.php反序列化命令执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/typecho/typecho-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/typecho/typecho-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/uWSGI/uWSGI PHP Directory Traversal.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/uWSGI/uWSGI PHP Directory Traversal.wker -------------------------------------------------------------------------------- /script/漏洞探测/ueditor/ueditor-cnvd-2017-20077-file-upload.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ueditor/ueditor-cnvd-2017-20077-file-upload.wker -------------------------------------------------------------------------------- /script/漏洞探测/ueditor/ueditor.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ueditor/ueditor.wker -------------------------------------------------------------------------------- /script/漏洞探测/ueditor/ueditor1.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/ueditor/ueditor1.wker -------------------------------------------------------------------------------- /script/漏洞探测/umail/umail sessionid登录漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/umail/umail sessionid登录漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/umail/umail物理路径泄露.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/umail/umail物理路径泄露.wker -------------------------------------------------------------------------------- /script/漏洞探测/urp/URP综合教务系统任意文件读取漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/urp/URP综合教务系统任意文件读取漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/urp/URP越权查看任意学生课表、成绩(需登录)漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/urp/URP越权查看任意学生课表、成绩(需登录)漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/urp/urp查询接口曝露漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/urp/urp查询接口曝露漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/vbulletin/vbulletin-cve-2019-16759-bypass.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/vbulletin/vbulletin-cve-2019-16759-bypass.wker -------------------------------------------------------------------------------- /script/漏洞探测/vbulletin/vbulletin-cve-2019-16759.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/vbulletin/vbulletin-cve-2019-16759.wker -------------------------------------------------------------------------------- /script/漏洞探测/vmware/vmware-vcenter-unauthorized-rce-cve-2021-21972.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/vmware/vmware-vcenter-unauthorized-rce-cve-2021-21972.wker -------------------------------------------------------------------------------- /script/漏洞探测/weaver/weaver-ebridge-file-read-linux.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/weaver/weaver-ebridge-file-read-linux.wker -------------------------------------------------------------------------------- /script/漏洞探测/weaver/weaver-ebridge-file-read-win.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/weaver/weaver-ebridge-file-read-win.wker -------------------------------------------------------------------------------- /script/漏洞探测/web_xml/web_xml_leak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/web_xml/web_xml_leak.wker -------------------------------------------------------------------------------- /script/漏洞探测/weblogic/Weblogic LDAP 远程代码执行漏洞 CVE-2021-2109.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/weblogic/Weblogic LDAP 远程代码执行漏洞 CVE-2021-2109.wker -------------------------------------------------------------------------------- /script/漏洞探测/weblogic/Weblogic 管理控制台未授权远程命令执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/weblogic/Weblogic 管理控制台未授权远程命令执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/weblogic/weblogic-cve-2020-14750.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/weblogic/weblogic-cve-2020-14750.wker -------------------------------------------------------------------------------- /script/漏洞探测/weblogic/weblogic_SSRF漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/weblogic/weblogic_SSRF漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/weblogic/weblogic_ssrf.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/weblogic/weblogic_ssrf.wker -------------------------------------------------------------------------------- /script/漏洞探测/webmin/Webmin Unauthenticated Remote Code Execution .wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/webmin/Webmin Unauthenticated Remote Code Execution .wker -------------------------------------------------------------------------------- /script/漏洞探测/wecenter/wecenter SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/wecenter/wecenter SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/wordpress/wordpress-cve-2019-19985-infoleak.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/wordpress/wordpress-cve-2019-19985-infoleak.wker -------------------------------------------------------------------------------- /script/漏洞探测/wordpress/wordpress-ext-adaptive-images-lfi.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/wordpress/wordpress-ext-adaptive-images-lfi.wker -------------------------------------------------------------------------------- /script/漏洞探测/wordpress/wordpress_admin_ajax_filedownload.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/wordpress/wordpress_admin_ajax_filedownload.wker -------------------------------------------------------------------------------- /script/漏洞探测/wordpress/wordpress_plugin_azonpop_sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/wordpress/wordpress_plugin_azonpop_sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/wordpress/wordpress_url_redirect.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/wordpress/wordpress_url_redirect.wker -------------------------------------------------------------------------------- /script/漏洞探测/wordpress/wordpress_woocommerce_code_exec.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/wordpress/wordpress_woocommerce_code_exec.wker -------------------------------------------------------------------------------- /script/漏洞探测/wuzhicms/wuzhicms-v410-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/wuzhicms/wuzhicms-v410-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/xiuno-bbs/xiuno-bbs-cvnd-2019-01348-reinstallation.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/xiuno-bbs/xiuno-bbs-cvnd-2019-01348-reinstallation.wker -------------------------------------------------------------------------------- /script/漏洞探测/xplus/xplus MYSQL通用注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/xplus/xplus MYSQL通用注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/xplus/xplus npmaker 2003系统GETSHELL漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/xplus/xplus npmaker 2003系统GETSHELL漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/xunchi/xunchi-cnvd-2020-23735-file-read.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/xunchi/xunchi-cnvd-2020-23735-file-read.wker -------------------------------------------------------------------------------- /script/漏洞探测/yccms/yccms-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/yccms/yccms-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/yonyou/yonyou-grp-u8-sqli-to-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/yonyou/yonyou-grp-u8-sqli-to-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/yonyou/yonyou-grp-u8-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/yonyou/yonyou-grp-u8-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/yonyou/youphptube-encoder-cve-2019-5127.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/yonyou/youphptube-encoder-cve-2019-5127.wker -------------------------------------------------------------------------------- /script/漏洞探测/yonyou/youphptube-encoder-cve-2019-5128.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/yonyou/youphptube-encoder-cve-2019-5128.wker -------------------------------------------------------------------------------- /script/漏洞探测/yonyou/youphptube-encoder-cve-2019-5129.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/yonyou/youphptube-encoder-cve-2019-5129.wker -------------------------------------------------------------------------------- /script/漏洞探测/yungoucms/yungoucms-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/yungoucms/yungoucms-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/zabbix/zabbix-authentication-bypass.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zabbix/zabbix-authentication-bypass.wker -------------------------------------------------------------------------------- /script/漏洞探测/zabbix/zabbix-cve-2016-10134-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zabbix/zabbix-cve-2016-10134-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/zabbix/zabbix_httpmon_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zabbix/zabbix_httpmon_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/zabbix/zabbix_jsrpc_sessionid_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zabbix/zabbix_jsrpc_sessionid_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/zabbix/zabbix_jsrpc_sql_inject.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zabbix/zabbix_jsrpc_sql_inject.wker -------------------------------------------------------------------------------- /script/漏洞探测/zcms/zcms-v3-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zcms/zcms-v3-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/zeit/zeit-nodejs-cve-2020-5284-directory-traversal.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zeit/zeit-nodejs-cve-2020-5284-directory-traversal.wker -------------------------------------------------------------------------------- /script/漏洞探测/zeroshell/zeroshell-cve-2019-12725-rce.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zeroshell/zeroshell-cve-2019-12725-rce.wker -------------------------------------------------------------------------------- /script/漏洞探测/zimbra/zimbra-cve-2019-9670-xxe.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zimbra/zimbra-cve-2019-9670-xxe.wker -------------------------------------------------------------------------------- /script/漏洞探测/zzcms/zzcms-zsmanage-sqli.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/zzcms/zzcms-zsmanage-sqli.wker -------------------------------------------------------------------------------- /script/漏洞探测/中新/中新金盾信息安全管理系统 默认超级管理员密码漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/中新/中新金盾信息安全管理系统 默认超级管理员密码漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/南方/nanfang_exp.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/南方/nanfang_exp.wker -------------------------------------------------------------------------------- /script/漏洞探测/大汉/大汉downfile.jsp 任意文件下载漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/大汉/大汉downfile.jsp 任意文件下载漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/大汉/大汉版通JCMS数据库读取漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/大汉/大汉版通JCMS数据库读取漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/安财软件/安财软件GetFileContent任意文件读取漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/安财软件/安财软件GetFileContent任意文件读取漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/安财软件/安财软件GetFile任意文件读取漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/安财软件/安财软件GetFile任意文件读取漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/安财软件/安财软件GetXMLList任意文件读取漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/安财软件/安财软件GetXMLList任意文件读取漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/宝塔/baota.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/宝塔/baota.wker -------------------------------------------------------------------------------- /script/漏洞探测/帆软报表/帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757-2.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/帆软报表/帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757-2.wker -------------------------------------------------------------------------------- /script/漏洞探测/帆软报表/帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/帆软报表/帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757.wker -------------------------------------------------------------------------------- /script/漏洞探测/最土/最土团购SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/最土/最土团购SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/未授权漏洞/Apache Solr 未授权访问漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/未授权漏洞/Apache Solr 未授权访问漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/未授权漏洞/Docker未授权访问漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/未授权漏洞/Docker未授权访问漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/未授权漏洞/ElasticSearch未授权访问漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/未授权漏洞/ElasticSearch未授权访问漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/未授权漏洞/Jenkins未授权漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/未授权漏洞/Jenkins未授权漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/未授权漏洞/Redis未授权访问漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/未授权漏洞/Redis未授权访问漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/未授权漏洞/Rsync未授权访问漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/未授权漏洞/Rsync未授权访问漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/未授权漏洞/XXL-JOB executor 未授权访问漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/未授权漏洞/XXL-JOB executor 未授权访问漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/未授权漏洞/influxdb未授权访问漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/未授权漏洞/influxdb未授权访问漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/未授权漏洞/易创思教育建站系统未授权漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/未授权漏洞/易创思教育建站系统未授权漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/正方教务系统/正方教务系统default3.aspx爆破页面.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/正方教务系统/正方教务系统default3.aspx爆破页面.wker -------------------------------------------------------------------------------- /script/漏洞探测/泄漏漏洞/DS_Store泄露漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/泄漏漏洞/DS_Store泄露漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/泄漏漏洞/SVN泄露漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/泄漏漏洞/SVN泄露漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/泄漏漏洞/git泄露漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/泄漏漏洞/git泄露漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/泛微OA/泛微OA downfile.php 任意文件下载漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/泛微OA/泛微OA downfile.php 任意文件下载漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/泛微OA/泛微OA filedownaction SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/泛微OA/泛微OA filedownaction SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/泛微OA/泛微OA 数据库配置泄露漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/泛微OA/泛微OA 数据库配置泄露漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/注入漏洞/HOST主机头注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/注入漏洞/HOST主机头注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/浪潮/浪潮ClusterEngineV4.0 远程命令执行漏洞 CVE-2020-21224.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/浪潮/浪潮ClusterEngineV4.0 远程命令执行漏洞 CVE-2020-21224.wker -------------------------------------------------------------------------------- /script/漏洞探测/用友/用友NC目录遍历漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/用友/用友NC目录遍历漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/票友/票友机票预订系统10处SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/票友/票友机票预订系统10处SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/票友/票友机票预订系统SQL注入漏洞(绕过).wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/票友/票友机票预订系统SQL注入漏洞(绕过).wker -------------------------------------------------------------------------------- /script/漏洞探测/票友/票友机票预订系统SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/票友/票友机票预订系统SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/票友/票友票务系统int_order.aspx SQL注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/票友/票友票务系统int_order.aspx SQL注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/票友/票友票务系统通用sql注入漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/票友/票友票务系统通用sql注入漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/网康/网康前台RCE_POC.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/网康/网康前台RCE_POC.wker -------------------------------------------------------------------------------- /script/漏洞探测/致远OA/致远OA A6 数据库敏感信息泄露.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/致远OA/致远OA A6 数据库敏感信息泄露.wker -------------------------------------------------------------------------------- /script/漏洞探测/致远OA/致远OA A6 用户敏感信息泄露.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/致远OA/致远OA A6 用户敏感信息泄露.wker -------------------------------------------------------------------------------- /script/漏洞探测/致远OA/致远OA webmail.do任意文件下载 CNVD-2020-62422.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/致远OA/致远OA webmail.do任意文件下载 CNVD-2020-62422.wker -------------------------------------------------------------------------------- /script/漏洞探测/蜂网互联/蜂网互联 企业级路由器v4.31 密码泄露漏洞 CVE-2019-16313.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/蜂网互联/蜂网互联 企业级路由器v4.31 密码泄露漏洞 CVE-2019-16313.wker -------------------------------------------------------------------------------- /script/漏洞探测/跨域漏洞/CORS跨域资源共享漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/跨域漏洞/CORS跨域资源共享漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/远程命令执行漏洞/HTTP.sys远程命令执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/远程命令执行漏洞/HTTP.sys远程命令执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/金和OA/金和OA C6 管理员默认口令.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/金和OA/金和OA C6 管理员默认口令.wker -------------------------------------------------------------------------------- /script/漏洞探测/金窗教务系统/金窗教务系统存在多处SQL注射漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/金窗教务系统/金窗教务系统存在多处SQL注射漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/锐捷/锐捷NBR路由器 EWEB网管系统 远程命令执行漏洞.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/锐捷/锐捷NBR路由器 EWEB网管系统 远程命令执行漏洞.wker -------------------------------------------------------------------------------- /script/漏洞探测/齐治/齐治堡垒机任意用户登录.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/漏洞探测/齐治/齐治堡垒机任意用户登录.wker -------------------------------------------------------------------------------- /script/综合漏洞/Ladp注入.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/综合漏洞/Ladp注入.wker -------------------------------------------------------------------------------- /script/综合漏洞/SQL注入.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/综合漏洞/SQL注入.wker -------------------------------------------------------------------------------- /script/综合漏洞/XPATH注入.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/综合漏洞/XPATH注入.wker -------------------------------------------------------------------------------- /script/综合漏洞/XSS注入.wker: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/综合漏洞/XSS注入.wker -------------------------------------------------------------------------------- /script/综合漏洞/xss.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/script/综合漏洞/xss.txt -------------------------------------------------------------------------------- /tessdata/configs/api_config: -------------------------------------------------------------------------------- 1 | tessedit_zero_rejection T 2 | -------------------------------------------------------------------------------- /tessdata/configs/digits: -------------------------------------------------------------------------------- 1 | tessedit_char_whitelist 0123456789-. 2 | -------------------------------------------------------------------------------- /tessdata/configs/hocr: -------------------------------------------------------------------------------- 1 | tessedit_create_hocr 1 -------------------------------------------------------------------------------- /tessdata/eng.traineddata: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/tessdata/eng.traineddata -------------------------------------------------------------------------------- /tessdata/osd.traineddata: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/tessdata/osd.traineddata -------------------------------------------------------------------------------- /tessdata/pdf.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/tessdata/pdf.ttf -------------------------------------------------------------------------------- /tessdata/pdf.ttx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Wker666/Demo/HEAD/tessdata/pdf.ttx --------------------------------------------------------------------------------