Tools for investigating Log4j CVE-2021-44228
☆94Dec 23, 2021Updated 4 years ago
Alternatives and similar repositories for Log4jTools
Users that are interested in Log4jTools are comparing it to the libraries listed below
Sorting:
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- AIL project training materials☆39Feb 24, 2026Updated 3 weeks ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆28Jul 27, 2025Updated 7 months ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Jan 15, 2020Updated 6 years ago
- catch log4j exploits in the wild? maybe if we're lucky... .☆16Aug 14, 2023Updated 2 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 6 months ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- SecuritySnack data that doesn't fit into a single tweet.☆45Feb 26, 2026Updated 3 weeks ago
- Citrix Scanner for CVE-2023-3519☆53Jul 24, 2023Updated 2 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Collection of port scans of the North Korean IPv4 subnets from different vps☆17Nov 25, 2025Updated 3 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- ☆30Aug 19, 2020Updated 5 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆13Feb 24, 2020Updated 6 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Rumble Network Discovery API☆17May 16, 2024Updated last year
- Summarize CTI reports with OpenAI☆18Updated this week
- Tools for preservation of floppy disks☆15Nov 22, 2025Updated 3 months ago
- a low-interaction honeypot☆95Jun 4, 2017Updated 8 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago