Diverto / nse-log4shell
Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)
☆351Updated 3 years ago
Alternatives and similar repositories for nse-log4shell:
Users that are interested in nse-log4shell are comparing it to the libraries listed below
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆436Updated 2 years ago
- log4j rce test environment and poc☆311Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆177Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆732Updated 3 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆399Updated 4 months ago
- ☆363Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,012Updated 2 years ago
- A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.☆127Updated 3 years ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆291Updated 3 years ago
- Log4Shell scanner for Burp Suite☆484Updated last year
- Simple local scanner for vulnerable log4j instances☆374Updated 2 years ago
- Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading☆196Updated 3 years ago
- Remote command execution vulnerability scanner for Log4j.☆254Updated last year
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 3 years ago
- Collect information of Windows PC when doing incident response☆252Updated last year
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆149Updated 3 years ago
- Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.☆60Updated 3 years ago
- ☆317Updated 3 months ago
- Divide full port scan results and use it for targeted Nmap runs☆318Updated 9 months ago
- Overlord - Red Teaming Infrastructure Automation☆619Updated 10 months ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆256Updated 3 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,030Updated 5 months ago
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆938Updated 3 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆796Updated 11 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆299Updated last year
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆375Updated 11 months ago
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 2 years ago