关联漏洞
介绍
# CVE-2025-5777: The Ultimate PoC & Scanner 🚀





An advanced, powerful, and easy-to-use tool designed to detect and exploit **CVE-2025-5777 (CitrixBleed 2)**. This script not only identifies the vulnerability but also helps in demonstrating its impact by parsing human-readable information from the memory leak.
---
## What is CVE-2025-5777?
**CVE-2025-5777** is a critical memory leak vulnerability in NetScaler (formerly Citrix) ADC and Gateway products. It allows an unauthenticated, remote attacker to read chunks of sensitive data from the server's memory, such as session cookies, usernames, passwords, and other private information.
A successful attack resulting in a session cookie leak can lead to a full **Account Takeover**, completely bypassing login credentials and multi-factor authentication (MFA).
---
## ✨ Features
* **High-Speed Asynchronous Scanning:** Utilizes `asyncio` and `aiohttp` to scan multiple targets quickly and efficiently.
* **Intelligent Data Parsing:** Automatically extracts human-readable strings from raw binary memory dumps.
* **Sensitive Data Detection:** Automatically identifies and highlights high-impact patterns like session cookies (`NSC_AAAC`).
* **Comprehensive Reporting:** Saves all findings to a clean `leaks.txt` file for easy analysis.
---
## ⚠️ Disclaimer
This tool is created for **educational and authorized bug bounty purposes ONLY**. Unauthorized use of this tool on any system is illegal. The developer is not responsible for any misuse or damage caused by this tool.
---
## 🎥 Video Tutorial: Finding & Exploiting
For a full, step-by-step guide on how to find and exploit vulnerabilities, I have created a detailed video. This video demonstrates the complete process, from identifying targets to executing the exploit.
**Watch the full step-by-step video guide here:**
[**Live Hacking Demo: Finding and Exploiting a Critical Vulnerability**](https://youtu.be/p3Edctu2g8M?si=lgHYp9DDRqMVdID0)
---
## 📚 Official References
* **NIST NVD:** [CVE-2025-5777 Detail](https://nvd.nist.gov/vuln/detail/CVE-2025-5777)
* **Citrix Support:** [CTX693420 Security Bulletin](https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420)
---
## 🙏 Credits and Acknowledgements
* **Tool Developer & Researcher:** **CyberTechAjju**
* **Original Vulnerability Research:** The foundational research and original exploit concepts for this vulnerability were published by security researchers at **Watchtwr Labs** and others in the community. This tool builds upon their essential work.
---
## 📜 License
This project is licensed under the MIT License. See the `LICENSE` file for more details.
文件快照
[4.0K] /data/pocs/d36dcdbf3d3fb7eaf9a4a31ed0c7b8794395d37a
├── [1.1K] CVE-2025-5777.bcheck
├── [2.2K] CVE-2025-5777.yaml
├── [8.3K] cve5777expolit.py
└── [3.1K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。