IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228
☆16Dec 19, 2021Updated 4 years ago
Alternatives and similar repositories for Exploitation-of-Log4j2-CVE-2021-44228
Users that are interested in Exploitation-of-Log4j2-CVE-2021-44228 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Parses the WMI object database....looking for persistence☆35Dec 12, 2019Updated 6 years ago
- spider☆20Mar 31, 2019Updated 7 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆21Aug 3, 2024Updated last year
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆65Dec 18, 2024Updated last year
- Looks stuff up (MD5, SHA256, IP, Domains, URL's, strings e.g. mutexes)...☆35May 2, 2017Updated 9 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 5 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆67Mar 19, 2015Updated 11 years ago
- Small visualizator for PE files☆70Sep 20, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 7 years ago
- USN to JSON☆22Apr 4, 2020Updated 6 years ago
- PoC-Malware-TTPs☆49Mar 26, 2023Updated 3 years ago
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- A Wordpress exploitation toolkit☆15Nov 22, 2017Updated 8 years ago
- Tool to parse SRU database☆25Mar 1, 2018Updated 8 years ago
- Crack base64(sha256(username)) hash from Microsoft Event ID 1029☆24Aug 4, 2023Updated 2 years ago
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 6 months ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automatically set traffic rules for Dynamic IP Addresses from a Dynamic DNS Domain☆12May 31, 2022Updated 3 years ago
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Mar 25, 2020Updated 6 years ago
- An NTFS journal parser☆80Mar 3, 2016Updated 10 years ago
- ☆35Aug 4, 2018Updated 7 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 5 years ago
- repo for sharing stuff☆17Jul 1, 2025Updated 10 months ago
- Sigma rules converted for direct use with Zircolite☆14May 5, 2026Updated last week
- Windows 10 Live Information viewer☆39Jan 27, 2022Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- ☆10Aug 11, 2025Updated 9 months ago
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆47Apr 4, 2026Updated last month