CodeShield-Security / Log4JShell-Bytecode-DetectorLinks
Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)
☆49Updated 3 years ago
Alternatives and similar repositories for Log4JShell-Bytecode-Detector
Users that are interested in Log4JShell-Bytecode-Detector are comparing it to the libraries listed below
Sorting:
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228) and the possible Spring RCE vulnerability.☆34Updated 3 years ago
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆41Updated last year
- A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x "JNDI LDAP" vulnerability.☆70Updated 3 years ago
- A Java library for calculating CVSSv2 and CVSSv3 scores and vectors☆46Updated 7 months ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- ☆168Updated 5 months ago
- ☆79Updated 3 years ago
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆53Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- Static Token And Credential Scanner☆96Updated 2 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 4 years ago
- Everything I needed to understand what was going on with "Spring4Shell" - translated source materials, exploit, links to demo apps, and m…☆107Updated 3 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Updated 5 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆20Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- A simple Java command-line utility to mirror the entire contents of VulnDB.☆45Updated 3 weeks ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Unofficial api for cve.mitre.org☆40Updated 3 years ago
- Simple local scanner for applications containing vulnerable Spring libraries☆126Updated 3 years ago
- Presentations from the CX Security Labs team☆33Updated 2 weeks ago
- ☆20Updated 3 years ago
- Artifacts for the Black Hat talk.☆105Updated 5 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated last year
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- ☆14Updated 6 years ago
- Request Smuggling Firewall☆52Updated 5 years ago
- Nessus Audit files☆33Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago