YfryTchsGD / Log4jAttackSurfaceLinks
☆2,079Updated 4 years ago
Alternatives and similar repositories for Log4jAttackSurface
Users that are interested in Log4jAttackSurface are comparing it to the libraries listed below
Sorting:
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,703Updated 4 years ago
- Apache Log4j 远程代码执行☆88Updated 2 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,135Updated last year
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆951Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,440Updated 3 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,890Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆728Updated 3 years ago
- A community sourced list of log4j-affected software☆1,122Updated 3 years ago
- ☆366Updated 2 years ago
- A malicious LDAP server for JNDI injection attacks☆1,071Updated 2 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,281Updated 3 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,568Updated 3 years ago
- log4j rce test environment and poc☆311Updated 4 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆934Updated 4 months ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,850Updated last year
- Nginx 18.1 04/09/22 zero-day repo☆371Updated 3 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆833Updated 4 years ago
- Trojan Source: Invisible Vulnerabilities☆1,274Updated 2 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Updated 2 years ago
- ☆3,649Updated last year
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆676Updated 3 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Updated 3 years ago
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Reque…☆1,462Updated last year
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,125Updated 3 years ago
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆532Updated 3 years ago
- ☆2,511Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,472Updated 3 years ago
- PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)☆1,120Updated 2 years ago
- ☆1,109Updated 5 years ago
- An OOB interaction gathering server and client library☆4,137Updated this week