☆71Jan 23, 2026Updated 2 months ago
Alternatives and similar repositories for log4jshell-lab
Users that are interested in log4jshell-lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆72Dec 21, 2022Updated 3 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- ☆14Apr 27, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆27Feb 6, 2022Updated 4 years ago
- A modern CLI for Tenable.io written in Go☆14Nov 28, 2020Updated 5 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- ☆18May 6, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆27Aug 8, 2021Updated 4 years ago
- Slides from presentations I give!☆29Feb 27, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Full Antivirus Evasion for Mimikatz☆14Mar 10, 2017Updated 9 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Jan 14, 2022Updated 4 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Dec 20, 2021Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Jan 13, 2023Updated 3 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆19Dec 13, 2021Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆43Oct 4, 2021Updated 4 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Splunk app to monitor the /etc directory of Splunk for all changes of .conf files☆13Jan 26, 2018Updated 8 years ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- ☆19Mar 16, 2021Updated 5 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 4 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 3 months ago
- ☆36May 27, 2024Updated last year
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆110May 24, 2020Updated 5 years ago
- ☆20Jun 25, 2019Updated 6 years ago
- Scanner for Cross-Site WebSocket Hijacking☆41Feb 19, 2026Updated last month