adilsoybali / Log4j-RCE-ScannerLinks
Remote command execution vulnerability scanner for Log4j.
☆254Updated 2 years ago
Alternatives and similar repositories for Log4j-RCE-Scanner
Users that are interested in Log4j-RCE-Scanner are comparing it to the libraries listed below
Sorting:
- Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading☆194Updated 3 years ago
- Go scripts for finding sensitive data like API key / some keywords in the github repository☆159Updated 3 years ago
- Full Nuclei automation script with logic explanation.☆245Updated 3 years ago
- ☆328Updated 4 months ago
- A python tool to check subdomain takeover vulnerability☆336Updated 2 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆398Updated 11 months ago
- Build your own reconnaissance system with Osmedeus Next Generation☆200Updated 3 months ago
- ☆171Updated 3 weeks ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆297Updated last year
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆397Updated 2 months ago
- Log4Shell scanner for Burp Suite☆485Updated 2 years ago
- ☆525Updated 2 years ago
- automated web assets enumeration & scanning [DEPRECATED]☆289Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆267Updated 2 years ago
- Check AWS S3 instances for read/write/delete access☆121Updated 3 years ago
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆228Updated 3 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆358Updated 2 years ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆424Updated 2 months ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆454Updated last year
- Burp Bounty profiles compilation, feel free to contribute!☆148Updated 4 years ago
- Scan only once by IP address and reduce scan times with Nmap for large amounts of data.☆393Updated 3 months ago
- Log4j for nuclei☆68Updated 3 years ago
- Nuclei templates written by geeknik. Claude is my co-pilot. 🤖☆284Updated 3 months ago
- Http request smuggling vulnerability scanner☆229Updated 3 years ago
- Get related domains / subdomains by looking at Google Analytics IDs☆248Updated 3 years ago
- Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.☆251Updated 2 months ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Customisable and automated HTTP header injection☆269Updated last year
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆314Updated 3 years ago