NCSC-NL / spring4shellLinks
Operational information regarding the Spring4Shell vulnerability in the Spring Core Framework
☆175Updated 2 years ago
Alternatives and similar repositories for spring4shell
Users that are interested in spring4shell are comparing it to the libraries listed below
Sorting:
- a drop-in replacement for Nmap powered by shodan.io☆3,173Updated 9 months ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,657Updated 2 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Updated 3 years ago
- ☆79Updated 3 years ago
- Nginx 18.1 04/09/22 zero-day repo☆371Updated 3 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Updated 4 years ago
- CVE-2022-22963 PoC☆117Updated 3 years ago
- A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities☆658Updated 3 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Updated 2 years ago
- Simple local scanner for applications containing vulnerable Spring libraries☆125Updated 3 years ago
- A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.☆126Updated 4 years ago
- Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.☆59Updated 4 years ago
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- CVE-2021-1675 Detection Info☆215Updated 2 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆177Updated 4 years ago
- Cisco Anyconnect VPN unauth RCE (rwx stack)☆238Updated 4 years ago
- A community sourced list of log4j-affected software☆1,122Updated 3 years ago
- Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit☆325Updated 3 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,429Updated last year
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆726Updated 3 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Updated last year
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆294Updated 4 years ago
- Log4j Vulnerability Scanner for Windows☆158Updated last month
- Bugbounty Resources☆541Updated 2 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆327Updated 3 years ago
- PoC exploits I wrote. They're as is and I will not offer support☆278Updated last year
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆332Updated 3 years ago
- log4j rce test environment and poc☆311Updated 4 years ago
- ☆345Updated 4 years ago