Home

Awesome

🕵️ Zaber

Yet another CVE-2019-9670 exploit, but in Golang

<div align="center"> <img src="./assets/preview.png" width="800"> </div> <br> <p align="center"> <img src="https://img.shields.io/github/license/oppsec/zaber?color=cyan&logo=github&logoColor=cyan&style=for-the-badge"> <img src="https://img.shields.io/github/issues/oppsec/zaber?color=cyan&logo=github&logoColor=cyan&style=for-the-badge"> <img src="https://img.shields.io/github/stars/oppsec/zaber?color=cyan&label=STARS&logo=github&logoColor=cyan&style=for-the-badge"> <img src="https://img.shields.io/github/forks/oppsec/zaber?color=cyan&logo=github&logoColor=cyan&style=for-the-badge"> <img src="https://img.shields.io/github/languages/code-size/oppsec/zaber?color=cyan&logo=github&logoColor=cyan&style=for-the-badge"> </p>
<br>

🕵️ What is Zaber?

🕵️ Zaber is a Golang tool created to exploit the vulnerability defined as CVE-2019-9670 (XXE in Zimbra Collaboration 8.7.X < 8.7.11p10)

<br>

⚡ Installing / Getting started

A quick guide of how to install and use Zaber.

1. go install github.com/oppsec/zaber
2. zaber -u https://example.com

You can use go install github.com/oppsec/zaber@latest to update the tool

<br><br>

⚙️ Pre-requisites

<br><br>

✨ Features

<br><br>

🔨 Contributing

A quick guide of how to contribute with the project.

1. Create a fork from Zaber repository.
2. Download the project with git clone https://github.com/your/zaber.git
3. cd zaber/
4. Make your changes.
5. Commit and make a git push.
6. Open a pull request.

<br><br>

⚠️ Warning