AlexLynd / log4j-shell-pocLinks
A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.
☆11Updated 2 years ago
Alternatives and similar repositories for log4j-shell-poc
Users that are interested in log4j-shell-poc are comparing it to the libraries listed below
Sorting:
- ☆13Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Exploit code for CVE-2019-17662☆17Updated 3 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆38Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- ☆44Updated last year
- ☆26Updated last month
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- ☆42Updated 3 years ago
- Windows Remote Administration Tool that uses Discord as C2☆29Updated 3 years ago
- Legba recipes.☆50Updated 11 months ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆12Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Xfinity / Comcast Wordlist Generator☆64Updated 2 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆44Updated 3 years ago
- A library that scrapes Linkedin for user data☆23Updated 4 years ago
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- WiFi Hacking Workflow with WiFi Pineapple Mark VII API☆84Updated last year
- Just a better dirbuster☆13Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆33Updated 6 months ago