AlexLynd / log4j-shell-pocLinks
A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.
☆11Updated 3 years ago
Alternatives and similar repositories for log4j-shell-poc
Users that are interested in log4j-shell-poc are comparing it to the libraries listed below
Sorting:
- ☆13Updated 3 years ago
- ☆44Updated 4 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- ☆46Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆33Updated 9 months ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- Encodes a message using emojis based on a specified pattern.☆18Updated last year
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- Exploit code for CVE-2019-17662☆18Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Just a better dirbuster☆13Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆85Updated 4 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆51Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Updated 3 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Updated 3 years ago
- A custom script I created because I got tired of installing my tools manually!☆16Updated 2 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆43Updated last month
- WebHook for Red Team☆26Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 6 years ago