burmat / nathan burchfield
  • security and systems administration
  • security / hacking
    • Domain Enumeration + Exploitation
      • Command and Control
      • Credential Access
      • Defense Evasion
      • Discovery
      • Execution
      • Impact
      • Lateral Movement
      • Persistence
      • Privilege Escalation
    • Tools and Services
      • Adobe Experience Manager (AEM)
      • amass
      • ike-scan
      • jq
      • Shodan
      • smbmap
      • tmux
      • tshark
      • Voice Over IP (VoIP)
    • One-Liners and Dirty Scripts
    • MSFvenom Cheetsheet
    • Web Application Hacking
      • Cross-Site Scripting (XXS)
      • SQL Injection (SQLi)
    • OSCP / PWK - Random Tips and Tricks
  • systems administration
    • Active Directory Administration
    • Exchange Administration
    • System Fixes
    • Helper Commands
    • Log Parsing
    • SQL Server Administration
    • Windows Terminal Themes
Powered by GitBook
On this page
  • Find AEM
  • Scan Directory
  • Wordlists
  • Nuclei
  1. security / hacking
  2. Tools and Services

Adobe Experience Manager (AEM)

PreviousTools and ServicesNextamass

Last updated 7 months ago

Source:

Find AEM

python3 aem_discoverer.py --file urls.txt

Scan Directory

aemscan aem_url

Wordlists

Nuclei

  • nuclei -l hosts -tags AEM -t /root/nuclei-templates

https://twitter.com/Alra3ees/status/1410062155248979968?s=20&t=IJ1SKGHYSxj6h1e94oFkdQ
https://github.com/0ang3el/aem-hacker…
https://github.com/Raz0r/aemscan
https://github.com/emadshanab/Adobe-Experience-Manager…
@pdnuclei