NCSC-NL / log4shell
Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
☆1,896Updated 2 years ago
Alternatives and similar repositories for log4shell:
Users that are interested in log4shell are comparing it to the libraries listed below
- Detector for Log4Shell exploitation attempts☆732Updated 3 years ago
- A community sourced list of log4j-affected software☆1,121Updated 2 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,279Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,411Updated 2 years ago
- ☆362Updated 2 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,708Updated 3 years ago
- Simple local scanner for vulnerable log4j instances☆374Updated 2 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆436Updated 2 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,116Updated 11 months ago
- ☆2,079Updated 3 years ago
- A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-syst…☆637Updated 3 years ago
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Reque…☆1,444Updated 10 months ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆349Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆345Updated 3 years ago
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆530Updated 2 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆487Updated 2 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆932Updated 3 years ago
- log4j rce test environment and poc☆309Updated 3 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,568Updated 2 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,216Updated 2 months ago
- ☆622Updated last year
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,822Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,087Updated 5 months ago
- This repo has been replaced by https://www.cloudvulndb.org☆724Updated 2 years ago
- A malicious LDAP server for JNDI injection attacks☆1,026Updated last year
- Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.☆1,837Updated this week
- all paths lead to clouds☆638Updated last year
- ☆205Updated last year
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆839Updated 2 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆881Updated 2 years ago