Apache Sling / AEM Security Auditor

Comprehensive Security Auditing for Apache Sling & AEM

A professional-grade security auditing tool designed for IT auditors and security professionals to identify misconfigurations, vulnerabilities, and security weaknesses in Apache Sling and Adobe Experience Manager (AEM) instances.

Developed by:

Ruben Silva | GitHub | Patreon

🚀 Quick Start

1
2
3
4
5
6
7
8
9
# Clone the repository
git clone https://github.com/Auditing-Korner/Apache-Sling-Auditor.git
cd Apache-Sling-Auditor

# Install dependencies
pip install -r requirements.txt

# Run a scan
python auditor.py -t http://target.com:4502

✨ Key Features

🔍 Multi-Mode Scanning

Quick, Full, and Stealth modes optimized for different scenarios. Choose the right mode for your security assessment needs.

⚡ High Performance

Asynchronous scanning with concurrent requests for fast results. Efficient I/O operations for maximum throughput.

🎯 CVE Detection

Automated detection of 10+ known CVEs including Log4Shell, XSS, SSRF, Path Traversal, and Information Disclosure.

💥 Active Exploitation

Generate PoCs and validate vulnerabilities with exploitation mode. Create proof-of-concept files for confirmed issues.

🔐 Brute Force Testing

Automated credential testing with configurable wordlists. Support for form-based and HTTP Basic authentication.

📊 Detailed Reporting

Rich console output and comprehensive JSON reports. Color-coded severity levels and detailed vulnerability information. HTML reports planned for future releases.

📚 Documentation

📦 [Installation Guide](/Apache-Sling-Auditor/installation)
Get started with installation and setup
🚀 [Quick Start](/Apache-Sling-Auditor/quick-start)
Run your first scan in minutes
✨ [Features](/Apache-Sling-Auditor/features)
Complete feature list and capabilities
📖 [Usage Guide](/Apache-Sling-Auditor/usage)
Detailed usage instructions
⚙️ [Configuration](/Apache-Sling-Auditor/configuration)
Configure the auditor
🎯 [CVE Detection](/Apache-Sling-Auditor/cve-detection)
Supported vulnerabilities
💥 [Exploitation](/Apache-Sling-Auditor/exploitation)
Exploitation capabilities
📚 [API Reference](/Apache-Sling-Auditor/api-reference)
Command-line options
💡 [Examples](/Apache-Sling-Auditor/examples)
Usage examples and scenarios
🔧 [Troubleshooting](/Apache-Sling-Auditor/troubleshooting)
Common issues and solutions

🎯 Use Cases

⚠️ FOR EDUCATIONAL AND AUTHORIZED USE ONLY
This tool is intended for security auditing and testing purposes by authorized personnel only. Always obtain explicit written permission before scanning any system.

⚠️ Known Limitations

📦 Installation

1
2
3
4
5
6
# Create virtual environment
python -m venv venv
source venv/bin/activate  # On Windows: .\venv\Scripts\activate

# Install dependencies
pip install -r requirements.txt

🔧 Basic Usage

1
2
3
4
5
6
7
8
9
10
11
# Full scan
python auditor.py -t http://target.com:4502

# Quick scan
python auditor.py -t http://target.com:4502 --mode quick

# With exploitation
python auditor.py -t http://target.com:4502 --exploit

# Brute force testing
python auditor.py -t http://target.com:4502 --brute-force

📈 Statistics

10+
CVEs Detected
3
Scan Modes
6
Security Categories
Exploitation Options

🤝 Contributing

Contributions are welcome! See the Contributing Guide for details.

📄 License

This project is licensed under the GPL-3.0 License - see the LICENSE file for details.

👤 Author

Ruben Silva