YfryTchsGD / Log4jAttackSurfaceLinks
☆2,079Updated 3 years ago
Alternatives and similar repositories for Log4jAttackSurface
Users that are interested in Log4jAttackSurface are comparing it to the libraries listed below
Sorting:
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,706Updated 3 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,133Updated last year
- Apache Log4j 远程代码执行☆84Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,437Updated 3 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆954Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆730Updated 3 years ago
- A community sourced list of log4j-affected software☆1,123Updated 3 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,892Updated 3 years ago
- ☆364Updated 2 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,283Updated 3 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,569Updated 3 years ago
- log4j rce test environment and poc☆311Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆934Updated 3 months ago
- A malicious LDAP server for JNDI injection attacks☆1,073Updated 2 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,847Updated last year
- ☆2,509Updated 2 years ago
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Reque…☆1,460Updated last year
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆832Updated 4 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆899Updated 3 years ago
- ☆1,109Updated 5 years ago
- Trojan Source: Invisible Vulnerabilities☆1,271Updated 2 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆437Updated 2 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Updated 2 years ago
- An OOB interaction gathering server and client library☆4,080Updated this week
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆531Updated 3 years ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆294Updated 3 years ago
- A tool for IDN homograph attacks and detection.☆739Updated 4 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆679Updated 3 years ago
- ☆999Updated 4 years ago
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes☆1,146Updated 2 years ago