MalwareTech / Log4jToolsLinks
Tools for investigating Log4j CVE-2021-44228
☆94Updated 3 years ago
Alternatives and similar repositories for Log4jTools
Users that are interested in Log4jTools are comparing it to the libraries listed below
Sorting:
- nse script to inject jndi payloads☆46Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- ☆69Updated 3 years ago
- ☆70Updated 2 years ago
- Valhalla API Client☆70Updated 2 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 9 months ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 6 months ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆117Updated 7 months ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- ☆19Updated 4 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- SNIcat☆127Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- A repo to support the book☆109Updated 4 years ago
- Fraktal's Ransomware Emulator☆101Updated last year
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆82Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Various scripts and codes☆85Updated 4 years ago