MalwareTech / Log4jToolsLinks
Tools for investigating Log4j CVE-2021-44228
☆95Updated 3 years ago
Alternatives and similar repositories for Log4jTools
Users that are interested in Log4jTools are comparing it to the libraries listed below
Sorting:
- ☆70Updated last year
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 9 months ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- A repo to support the book☆108Updated 4 years ago
- ☆84Updated last month
- Valhalla API Client☆70Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- ☆69Updated 3 years ago
- Artifacts for the Black Hat talk.☆105Updated 5 years ago
- ☆19Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- ☆80Updated 5 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆82Updated 2 weeks ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- SNIcat☆127Updated 4 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 6 months ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆117Updated 6 months ago
- ☆100Updated 10 months ago
- This repository is for the vagrant instances of VulnHub machines☆47Updated 11 months ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago