YfryTchsGD / Log4jAttackSurface
☆2,080Updated 3 years ago
Alternatives and similar repositories for Log4jAttackSurface
Users that are interested in Log4jAttackSurface are comparing it to the libraries listed below
Sorting:
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,414Updated 2 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,708Updated 3 years ago
- Apache Log4j 远程代码执行☆82Updated 2 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆941Updated 3 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,117Updated last year
- A malicious LDAP server for JNDI injection attacks☆1,036Updated last year
- A community sourced list of log4j-affected software☆1,126Updated 2 years ago
- ☆3,514Updated 4 months ago
- Detector for Log4Shell exploitation attempts☆731Updated 3 years ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆805Updated last year
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,567Updated 2 years ago
- ☆2,505Updated 2 years ago
- An OOB interaction gathering server and client library☆3,751Updated last week
- ☆363Updated 2 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,895Updated 2 years ago
- log4j rce test environment and poc☆311Updated 3 years ago
- Burpsuite extension for log4j2rce☆28Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆921Updated 3 years ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,380Updated 9 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,081Updated last month
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,907Updated this week
- ☆1,185Updated 2 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,882Updated last year
- Gather and update all available and newest CVEs with their PoC.☆6,965Updated this week
- Trojan Source: Invisible Vulnerabilities☆1,260Updated 2 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Updated 3 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,595Updated 3 weeks ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,346Updated 6 months ago
- CVE-2021-40444 PoC☆1,629Updated 3 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,827Updated last year