MalwareTech / Log4jToolsLinks
Tools for investigating Log4j CVE-2021-44228
☆95Updated 3 years ago
Alternatives and similar repositories for Log4jTools
Users that are interested in Log4jTools are comparing it to the libraries listed below
Sorting:
- ☆69Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- ☆69Updated 3 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- A repo to support the book☆108Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- ☆169Updated 5 years ago
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- ☆79Updated 5 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆66Updated 3 years ago
- JIRA Secure Attachment Looter☆70Updated 4 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆117Updated 3 months ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- ☆28Updated 4 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- ☆200Updated 3 weeks ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated last month
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆115Updated 5 years ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 4 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- ☆98Updated 7 months ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago