Operational information regarding the Spring4Shell vulnerability in the Spring Core Framework
☆175Apr 20, 2023Updated 2 years ago
Alternatives and similar repositories for spring4shell
Users that are interested in spring4shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,660Oct 19, 2023Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,209May 1, 2025Updated 11 months ago
- Find, verify, and analyze leaked credentials☆25,667Updated this week
- ☆79Apr 6, 2022Updated 4 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆15Jul 1, 2020Updated 5 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- FuckAnywhere - 这是一个BurpSuite Jython(Python)插件,用于在HTTP请求中随处插入你想要进行测试的代码。☆52Mar 19, 2026Updated 3 weeks ago
- ☆26Jun 2, 2022Updated 3 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- An npm package to defang and refang IoC☆13Apr 8, 2026Updated last week
- ☆11Apr 8, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 6 months ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- ☆37Jun 23, 2022Updated 3 years ago
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- All about subdomain enumeration☆16Feb 5, 2019Updated 7 years ago
- Rust Weaponization for Red Team Engagements.☆16Oct 9, 2021Updated 4 years ago
- ☆13Dec 29, 2020Updated 5 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆15Dec 22, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆19Mar 15, 2024Updated 2 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆788Oct 29, 2022Updated 3 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,886Jun 15, 2022Updated 3 years ago
- ☆25May 9, 2021Updated 4 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- CVE-2022-22963 PoC☆117Mar 30, 2022Updated 4 years ago