MalwareTech / Log4jTools
Tools for investigating Log4j CVE-2021-44228
☆95Updated 3 years ago
Alternatives and similar repositories for Log4jTools:
Users that are interested in Log4jTools are comparing it to the libraries listed below
- Password Hunter in Active Directory☆197Updated 2 years ago
- ☆68Updated last year
- Hashes for vulnerable LOG4J versions☆153Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆224Updated 4 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆215Updated 3 years ago
- User enumeration with Microsoft Teams API☆167Updated 3 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆89Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆188Updated 3 years ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- ☆68Updated 3 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆77Updated 11 months ago
- ☆108Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆235Updated 3 years ago
- Valhalla API Client☆64Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆218Updated 3 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆175Updated 2 years ago
- A repo to support the book☆104Updated 3 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆154Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 4 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆144Updated 4 years ago
- ☆119Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 2 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆140Updated last year
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆106Updated 6 months ago
- SNIcat☆126Updated 3 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago