$ python3 exploit.py -h usage: exploit.py [-h] -u URL [-o [OBJECTS [OBJECTS ...]]] [-l] [-c] [-a AURA_CONTEXT] [-r RECORD_ID] [-d] [-f] [-s] Exploit Salesforce through the aura endpoint with the guest privilege optional arguments: -h, --help show this help message and exit -u URL, --url URL set the SITE url. e.g. http://url/site_path -o [OBJECTS [OBJECTS ...]], --objects [OBJECTS [OBJECTS ...]] se
Free one id Multi-target web netcat for reverse shell What is scan4all: integrated vscan, nuclei, ksubdomain, subfinder, etc., fully automated and intelligent。red team tools Code-level optimization, parameter optimization, and individual modules, such as vscan filefuzz, have been rewritten for these integrated projects. In principle, do not repeat the wheel, unless there are bugs, problems Cross-p
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く