MalwareTech / Log4jToolsLinks
Tools for investigating Log4j CVE-2021-44228
☆95Updated 4 years ago
Alternatives and similar repositories for Log4jTools
Users that are interested in Log4jTools are comparing it to the libraries listed below
Sorting:
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 3 years ago
- ☆71Updated last week
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- nse script to inject jndi payloads☆46Updated 4 years ago
- ☆69Updated 4 years ago
- Valhalla API Client☆70Updated last week
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Updated last year
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 4 years ago
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆72Updated 3 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- A repo to support the book☆112Updated 4 years ago
- ☆80Updated 6 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Updated 2 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- Python utility to generate filesystem content for Obsidian.☆87Updated 2 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- Reads and prints information from the website MalAPI.io☆39Updated 4 years ago
- A CLI tool to identify the hash type of a given hash.☆113Updated 3 years ago
- List of Repositories☆103Updated 4 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 3 years ago
- SNIcat☆128Updated 4 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
- ☆101Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- automated password spraying tool☆147Updated 4 years ago