AlexLynd / log4j-shell-pocLinks
A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.
☆11Updated 2 years ago
Alternatives and similar repositories for log4j-shell-poc
Users that are interested in log4j-shell-poc are comparing it to the libraries listed below
Sorting:
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆24Updated 3 years ago
- This docker image packs the amazing Hak5C² software☆29Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Windows Remote Administration Tool that uses Discord as C2☆29Updated 2 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- ☆13Updated 2 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆14Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- System Files for the Hak5 Shark Jack☆44Updated 9 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated 10 months ago
- Xfinity / Comcast Wordlist Generator☆63Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 5 years ago
- ☆43Updated 10 months ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- A repo containing simple programs to ease pentester with generated commands to avoid syntax issues☆13Updated 5 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆17Updated 3 years ago
- An embedded key/value database for Go.☆11Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Updated 4 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆38Updated 3 years ago
- HoppEye is a simple payload picker for BashBunny based on linking payloads to LED color.☆30Updated 7 years ago
- Internal Network Penetration Test Playbook☆20Updated 3 years ago
- Wireless Pentesting Device☆21Updated 4 years ago