☆15Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for log4j_response
Users that are interested in log4j_response are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Scripts and things.☆13Jan 23, 2026Updated 3 months ago
- Parse greppable Nmap output as a tree☆13Nov 13, 2022Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 7 months ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- WIP - A tutorial for OWASP ZAP☆13Feb 12, 2020Updated 6 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- ☆21Jun 23, 2018Updated 7 years ago
- Rule-creation tool for CiscoRouter Scanner☆16Dec 17, 2014Updated 11 years ago
- Ansible modules that use Netmiko☆11Dec 7, 2017Updated 8 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16May 12, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Home router IDS solution with a Raspberry Pi 3. Dynamically resolves device name, manufacturer, and alerts user of Snort analytics throug…☆14Apr 4, 2019Updated 7 years ago
- ☆39Sep 25, 2023Updated 2 years ago
- THOR APT Scanner User Manual☆21Apr 22, 2026Updated last week
- ☆17May 21, 2022Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆48Feb 21, 2021Updated 5 years ago
- parse Tor consensus to generate google maps and google earth KML of tor relays☆21Feb 20, 2018Updated 8 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- Ansible Configuration Files☆11Mar 30, 2015Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- System Call Integrity Layer - experimental security research☆26Apr 14, 2026Updated 2 weeks ago
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆15Apr 19, 2026Updated last week
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- Hunt malware with Volatility☆50Mar 3, 2026Updated last month
- ☆17May 28, 2022Updated 3 years ago
- Intentionally Vulnerable to Spring4Shell☆52Apr 1, 2022Updated 4 years ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- ☆16May 20, 2022Updated 3 years ago
- Herramienta para Windows que permite automatizar tareas de Footprint y Fingerprint en un Test de Intrusión☆15Jan 1, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆16Aug 11, 2018Updated 7 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Cisco Catalyst 9300 running IOS XE 17.1.1 with Docker AppHosting, using Remote Desktop to run Wireshark☆16Jan 22, 2020Updated 6 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Phishing URL Detection Tool☆14May 22, 2023Updated 2 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago