An All-In-One Pure Python PoC for CVE-2021-44228
☆178Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for python-log4rce
Users that are interested in python-log4rce are comparing it to the libraries listed below
Sorting:
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,043Jul 10, 2022Updated 3 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆351Dec 20, 2021Updated 4 years ago
- log4j rce test environment and poc☆311Dec 15, 2021Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆937Sep 2, 2025Updated 6 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,434Nov 23, 2022Updated 3 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆327Mar 9, 2022Updated 4 years ago
- Dump stuff without touching disk☆164Oct 29, 2020Updated 5 years ago
- Remote Code Injection In Log4j☆469Jan 18, 2022Updated 4 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- Detector for Log4Shell exploitation attempts☆725Feb 12, 2022Updated 4 years ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- Hacking Artifactory with server side template injection☆51Mar 12, 2020Updated 6 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆950Jan 15, 2022Updated 4 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆549Jul 16, 2021Updated 4 years ago
- Process Ghosting Tool☆176Jun 22, 2021Updated 4 years ago
- ☆384Aug 19, 2021Updated 4 years ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆256Dec 21, 2021Updated 4 years ago
- NTLM relaying for Windows made easy☆581Apr 25, 2023Updated 2 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,970Jul 20, 2021Updated 4 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆327Jul 5, 2021Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235May 20, 2021Updated 4 years ago
- Simple local scanner for vulnerable log4j instances☆374Aug 1, 2022Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago
- Log4j jndi injects the Payload generator☆486Dec 13, 2021Updated 4 years ago
- PoC for UUID shellcode execution using DInvoke☆155Mar 8, 2021Updated 5 years ago
- ☆347Mar 17, 2023Updated 3 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit☆170Oct 11, 2021Updated 4 years ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆496Oct 24, 2022Updated 3 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆454Dec 23, 2020Updated 5 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,451Dec 18, 2022Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago