A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts
  • This scanning tool is used for discovering and fuzzing for Log4J RCE CVE-2021–44228 vulnerability.
  • This shall be used by security teams to scan their infrastructure for Log4J RCE, and also test for WAF bypasses that can result in achieving code execution on the organization’s environment.
  • Kali Linux OS.

You’re done.

So, We have set up a DIR BUSTER.

Happy Hacking!

  • Download the dex2jar zip file from https://sourceforge.net/projects/dex2jar/ and extract it after completion of the downloading.
  • Open the extracted dex2jar zip file and access the command prompt from the same path.
  • Copy your apk file to extracted dex2jar zip folder.
  • Type d2j-dex2jar “test.apk” (Instead of test.apk type your apk file name) in the command prompt and press enter.
  • Once after completion dex2jar (apk file).
  • Download JD-GUI from https://github.com/java-decompiler/jd-gui/releases.
  • Open the JD-GUI and drag the dex2jar (apk file) into JD-GUI.

You’re done.

So, We have decompiled the android APK file to a JAR file using DEX2JAR and JD-GUI.

Happy Hacking!

You’re done.

So, We have set up the installation for APK Tool.

Happy Hacking!

NIKHIL KUMAR GANDLA

Security Re-Searcher

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store