Skip to content

Commit c24f151

Browse files
authored
Update README.md
1 parent 10de9fd commit c24f151

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

README.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
# Hunt4Spring
22

3-
Hunt4Spring helps with identifying as well as exploiting URLs which are potentially vulnerable to <a href="https://tanzu.vmware.com/security/cve-2022-22965">CVE-2022-22965</a> aka Spring4Shell.
3+
Hunt4Spring helps with identifying as well as exploiting URLs which are potentially vulnerable to [CVE-2022-22965](https://tanzu.vmware.com/security/cve-2022-22965) aka Spring4Shell.
44

5-
**Video Demo:**
5+
**Video Demo:** https://www.youtube.com/watch?v=JnAnXDFKkF0
66

77
## Usage :
88

@@ -169,15 +169,14 @@ $ ./hunt4spring -file test.txt -exploit
169169
170170
### Output
171171
The output file saves the data in JSON format like below:
172-
#### Example
173172
```json
174173
[
175-
{
174+
{
176175
"host": "http://127.0.0.1:8080/",
177176
"is_vulnerable": true,
178177
"exploit_completed": true,
179178
"payload_path": "http://127.0.0.1:8080/shell.jsp?pwd=hunt4spring\u0026cmd=whoami"
180-
}
179+
}
181180
]
182181
```
183182
@@ -209,4 +208,4 @@ Currently the tool is at v0.1.
209208
### Credits
210209
The Research Team at [RedHunt Labs](https://redhuntlabs.com) would like to thank [vx-underground](https://www.vx-underground.org/) for the POC hosted on their <a href="https://share.vx-underground.org/">website</a>.
211210
212-
##### **[`To know more about our Attack Surface Management platform, check out NVADR.`](https://redhuntlabs.com/nvadr)**
211+
##### **[`To know more about our Attack Surface Management platform, check out NVADR.`](https://redhuntlabs.com/nvadr)**

0 commit comments

Comments
 (0)