MalwareTech / Log4jToolsLinks
Tools for investigating Log4j CVE-2021-44228
☆94Updated 3 years ago
Alternatives and similar repositories for Log4jTools
Users that are interested in Log4jTools are comparing it to the libraries listed below
Sorting:
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- ☆70Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Artifacts for the Black Hat talk.☆103Updated 5 years ago
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆70Updated 2 years ago
- ☆69Updated 4 years ago
- A repo to support the book☆109Updated 4 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 10 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- ☆80Updated 5 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 7 months ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- Valhalla API Client☆70Updated 2 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆132Updated 3 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- SNIcat☆128Updated 4 years ago
- List of Repositories☆100Updated 3 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆117Updated 7 months ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 5 years ago
- ☆100Updated 11 months ago