MalwareTech / Log4jTools
Tools for investigating Log4j CVE-2021-44228
☆94Updated 3 years ago
Alternatives and similar repositories for Log4jTools:
Users that are interested in Log4jTools are comparing it to the libraries listed below
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- ☆68Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Python utility to generate filesystem content for Obsidian.☆84Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆184Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- ☆69Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- Valhalla API Client☆68Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- User enumeration with Microsoft Teams API☆170Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆113Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- ☆97Updated 5 months ago
- ☆47Updated 2 months ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆117Updated last month
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- A pure python tool for finding and comparing typo-squatting, bytesqatting, and homoglyph domain attacks and brand impersonation☆38Updated 6 months ago
- Posts about different topics☆36Updated last year
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆43Updated last year
- Run several volatility plugins at the same time☆114Updated 2 years ago
- A repo to support the book☆107Updated 3 years ago
- ☆41Updated 3 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆79Updated last year
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year