MalwareTech / Log4jToolsLinks
Tools for investigating Log4j CVE-2021-44228
☆94Updated 4 years ago
Alternatives and similar repositories for Log4jTools
Users that are interested in Log4jTools are comparing it to the libraries listed below
Sorting:
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- ☆71Updated 2 weeks ago
- nse script to inject jndi payloads☆46Updated 4 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- ☆69Updated 4 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Updated last year
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Valhalla API Client☆70Updated 2 weeks ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 4 years ago
- A repo to support the book☆113Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- SNIcat☆128Updated 4 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 4 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆47Updated 6 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 5 months ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆89Updated 7 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Updated 7 months ago
- ☆80Updated 6 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Updated 2 years ago
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆42Updated 8 months ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 5 years ago
- ☆167Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Updated 6 years ago