Malwar3Ninja / Exploitation-of-Log4j2-CVE-2021-44228
IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228
☆15Updated 3 years ago
Alternatives and similar repositories for Exploitation-of-Log4j2-CVE-2021-44228:
Users that are interested in Exploitation-of-Log4j2-CVE-2021-44228 are comparing it to the libraries listed below
- Simple C2 over the Trello API☆38Updated 2 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆8Updated 3 years ago
- Custom pentesting tools☆24Updated 4 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆12Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A rogue DNS detector☆23Updated last year
- ☆51Updated 3 years ago
- ☆34Updated last month
- ☆19Updated 3 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- powershell tool for VM evasion☆43Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆17Updated 2 years ago
- ☆19Updated 7 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- ProcDot Malware Sandbox☆22Updated 3 months ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago