☆15Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for log4j_response
Users that are interested in log4j_response are comparing it to the libraries listed below
Sorting:
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Scripts and things.☆13Jan 23, 2026Updated last month
- Parse greppable Nmap output as a tree☆14Nov 13, 2022Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Cookiecutter template for new Ansible projects☆12Jul 14, 2017Updated 8 years ago
- WIP - A tutorial for OWASP ZAP☆13Feb 12, 2020Updated 6 years ago
- ☆35Mar 19, 2022Updated 4 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- ☆21Jun 23, 2018Updated 7 years ago
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- ☆10Jul 29, 2016Updated 9 years ago
- Damn Vulnerable Web Application (DVWA) Vagrant Box for testing☆14Jun 23, 2016Updated 9 years ago
- devops☆12Mar 30, 2015Updated 10 years ago
- Rule-creation tool for CiscoRouter Scanner☆16Dec 17, 2014Updated 11 years ago
- Ansible modules that use Netmiko☆11Dec 7, 2017Updated 8 years ago
- ☆12Jul 14, 2025Updated 8 months ago
- ☆12Aug 5, 2015Updated 10 years ago
- Home router IDS solution with a Raspberry Pi 3. Dynamically resolves device name, manufacturer, and alerts user of Snort analytics throug…☆14Apr 4, 2019Updated 6 years ago
- ☆39Sep 25, 2023Updated 2 years ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated last week
- ☆17May 21, 2022Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆48Feb 21, 2021Updated 5 years ago
- List with File Extensions used by Ransomware☆37Mar 5, 2026Updated 2 weeks ago
- parse Tor consensus to generate google maps and google earth KML of tor relays☆21Feb 20, 2018Updated 8 years ago
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Sep 11, 2016Updated 9 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- A set of libraries and functions for simplifying automating Cisco devices through SecureCRT.☆14Nov 19, 2021Updated 4 years ago
- ☆16May 20, 2022Updated 3 years ago
- Herramienta para Windows que permite automatizar tareas de Footprint y Fingerprint en un Test de Intrusión☆15Jan 1, 2018Updated 8 years ago
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Feb 4, 2022Updated 4 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago