MalwareTech / Log4jToolsLinks
Tools for investigating Log4j CVE-2021-44228
☆94Updated 3 years ago
Alternatives and similar repositories for Log4jTools
Users that are interested in Log4jTools are comparing it to the libraries listed below
Sorting:
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 11 months ago
- ☆70Updated 2 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- Valhalla API Client☆70Updated 2 years ago
- ☆69Updated 4 years ago
- SNIcat☆128Updated 4 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 5 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Updated 5 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆33Updated 8 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- A Pythonic interface and command line tool for interacting with the InQuest Labs API.☆36Updated 2 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆188Updated last year
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- ☆80Updated 5 years ago