Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)
☆48Feb 23, 2022Updated 4 years ago
Alternatives and similar repositories for Log4JShell-Bytecode-Detector
Users that are interested in Log4JShell-Bytecode-Detector are comparing it to the libraries listed below
Sorting:
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Dockerized NGINX with some tweaks☆11Nov 3, 2021Updated 4 years ago
- WARNING - Work in Progress - It is not Bug Free! Use with Caution. This repository contains Dockerfiles and accompanying scripts that all…☆13Jun 22, 2022Updated 3 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Feb 11, 2026Updated 2 weeks ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- The ModSecurity Pcap Connector☆27Jan 13, 2016Updated 10 years ago
- Duitku Payment gateway for PHPNuxBill☆12Aug 23, 2025Updated 6 months ago
- ☆24Sep 28, 2022Updated 3 years ago
- OCSP Responder monitor☆37Aug 5, 2024Updated last year
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- Python bindings for libModSecurity (aka ModSecurity v3)☆28Sep 18, 2018Updated 7 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago
- TOPPERSユーザーズフォーラム:ユーザのためのQ&Aおよび情報交換の場☆12Jun 16, 2022Updated 3 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Jun 29, 2024Updated last year
- Detections for CVE-2021-44228 inside of nested binaries☆35Dec 18, 2021Updated 4 years ago
- Certificate Revocation List monitor☆48Aug 6, 2024Updated last year
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Dec 18, 2016Updated 9 years ago
- ☆12Sep 15, 2025Updated 5 months ago
- Resources for the Kubernetes Fundamentals course.☆13Jan 14, 2025Updated last year
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- Cloud-Z gathers performance related information and benchmarks on cloud instances with support for multiple cloud providers.☆15Feb 18, 2023Updated 3 years ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- Aplikasi untuk menganalisis log Mikrotik dengan interface modern menggunakan EJS, Express, Element UI, dan Alpine.js.☆27Nov 8, 2025Updated 3 months ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Fathimah bot Telegram support plugins.☆13Aug 19, 2017Updated 8 years ago
- Auto-deploy to GitHub using WP2Static☆11May 18, 2019Updated 6 years ago
- 👤 🗑 Deletes users that did not log in in the last days.☆10Updated this week
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago