# CMS-Exploit-Framework **Repository Path**: strwei/CMS-Exploit-Framework ## Basic Information - **Project Name**: CMS-Exploit-Framework - **Description**: 一款 CMS 漏洞利用框架,通过它可以很容易地获取、开发 CMS 漏洞利用插件并对目标应用进行测试。 - **Primary Language**: Python - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 3 - **Created**: 2017-06-02 - **Last Updated**: 2020-12-18 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README CMS Exploit Framework ===================== 简介 --------------------- CMS Exploit Framework 是一款 CMS 漏洞利用框架,通过它可以很容易地获取、开发 CMS 漏洞利用插件并对目标应用进行测试。 安装 --------------------- 本框架采用 Python 语言开发,并且第三方依赖包都已打包,所以您所需要做的只是下载、启动。 ``` chu@sh3ll-me:/tmp » git clone https://github.com/chuhades/CMS-Exploit-Framework.git Cloning into 'CMS-Exploit-Framework'... remote: Counting objects: 352, done. remote: Compressing objects: 100% (182/182), done. remote: Total 352 (delta 159), reused 347 (delta 154) Receiving objects: 100% (352/352), 463.62 KiB | 16.00 KiB/s, done. Resolving deltas: 100% (159/159), done. Checking connectivity... done. chu@sh3ll-me:/tmp » cd CMS-Exploit-Framework chu@sh3ll-me:/tmp/CMS-Exploit-Framework » python console.py _______________________ < CMS Exploit Framework > ----------------------- \ ^__^ \ (oo)\_______ (__)\ )\/\ ||----w | || || + -- --=[ CMS Exploit Framework - 2014/10/10 ] + -- --=[ 6 CMS ] + -- --=[ 11 Plugins ] CMS Exploit Framework > ``` 使用 --------------------- 框架内输入 ```help``` 可查看详细的帮助信息,一般来讲,基本的使用步骤如下: ``` chu@sh3ll-me:/tmp/CMS-Exploit-Framework » python console.py _______________________ < CMS Exploit Framework > ----------------------- \ ^__^ \ (oo)\_______ (__)\ )\/\ ||----w | || || + -- --=[ CMS Exploit Framework - 2014/10/10 ] + -- --=[ 6 CMS ] + -- --=[ 11 Plugins ] CMS Exploit Framework > help Core Commands ============= Command Description ------- ----------- help Help menu use Select a plugin by name vulns List all vulnerabilities in the database update Update the framework vulns -d Clear all vulnerabilities in the database exploit Run current plugin vulns -o Save vulnerabilities to file search Search plugin names and descriptions set