AlexLynd / log4j-shell-pocLinks
A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.
☆11Updated 3 years ago
Alternatives and similar repositories for log4j-shell-poc
Users that are interested in log4j-shell-poc are comparing it to the libraries listed below
Sorting:
- ☆15Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- Encodes a message using emojis based on a specified pattern.☆17Updated last year
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆29Updated 4 years ago
- ☆48Updated last year
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Updated 3 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- ☆26Updated 7 months ago
- Just a better dirbuster☆13Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 4 years ago
- Windows Remote Administration Tool that uses Discord as C2☆33Updated 3 years ago
- Exploit code for CVE-2019-17662☆18Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆41Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Xfinity / Comcast Wordlist Generator☆77Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- brute force SSH public-key authentication☆78Updated 8 months ago
- A certificate transparency log keyword sniffer written in python☆87Updated 2 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- CTF toolbox☆22Updated 2 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Updated 6 years ago
- Legba recipes.☆51Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆35Updated 2 months ago
- Find open databases - Powered by Binaryedge.io☆14Updated 6 years ago