Cybereason / Logout4Shell
Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell
☆1,708Updated 3 years ago
Alternatives and similar repositories for Logout4Shell
Users that are interested in Logout4Shell are comparing it to the libraries listed below
Sorting:
- ☆2,081Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆731Updated 3 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,117Updated last year
- ☆363Updated 2 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,895Updated 2 years ago
- A community sourced list of log4j-affected software☆1,126Updated 2 years ago
- Apache Log4j 远程代码执行☆82Updated 2 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,567Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,414Updated 2 years ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆291Updated 3 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,281Updated 2 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆436Updated 2 years ago
- Simple local scanner for vulnerable log4j instances☆375Updated 2 years ago
- Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228☆857Updated 3 years ago
- A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-syst…☆639Updated 3 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆941Updated 3 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Updated 3 years ago
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆493Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆789Updated 2 years ago
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆531Updated 2 years ago
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Reque…☆1,450Updated last year
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆952Updated 3 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Updated 2 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆921Updated 3 years ago
- A malicious LDAP server for JNDI injection attacks☆1,036Updated last year
- log4j rce test environment and poc☆311Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,439Updated 2 years ago
- Trojan Source: Invisible Vulnerabilities☆1,262Updated 2 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,827Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,103Updated 6 months ago