BinaryDefense / log4j-honeypot-flaskView external linksLinks
Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228
☆151Dec 20, 2021Updated 4 years ago
Alternatives and similar repositories for log4j-honeypot-flask
Users that are interested in log4j-honeypot-flask are comparing it to the libraries listed below
Sorting:
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- ☆71Jan 23, 2026Updated 3 weeks ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- Ransomware leak site monitoring☆314Mar 7, 2022Updated 3 years ago
- Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy☆29Jun 27, 2020Updated 5 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 6 months ago
- Google Meet Phishing Template For Gophish☆48Aug 3, 2022Updated 3 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- Log4j jndi injects the Payload generator☆487Dec 13, 2021Updated 4 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,438Nov 23, 2022Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,440Oct 12, 2025Updated 4 months ago
- Simple PowerShell script to enable process scanning with Yara.☆98Oct 4, 2022Updated 3 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Nov 25, 2023Updated 2 years ago
- Quick and dirty dynamic redirect.rules generator☆169Oct 12, 2022Updated 3 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Quick ESXi Log Parser☆29Oct 20, 2025Updated 3 months ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 2 weeks ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago