authomize / log4j-log4shell-affected
Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability
☆54Updated 3 years ago
Alternatives and similar repositories for log4j-log4shell-affected:
Users that are interested in log4j-log4shell-affected are comparing it to the libraries listed below
- ☆39Updated 2 years ago
- Silver SAML forgery tool☆49Updated last year
- ☆41Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆94Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 5 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 11 months ago
- Kerberoast Detection Script☆30Updated 5 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- POSIX script for mail security checks of domain names☆75Updated last year
- ☆80Updated last year
- Searching .evtx logs for remote connections☆23Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Exploit for HiveNightmare - CVE-2021–36934☆61Updated last month
- Azure AD enumeration over MS Graph☆80Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Ingest openldap data into bloodhound☆78Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Tool to perform lateral movement between AAD joined devices☆57Updated 2 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Updated 3 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆25Updated 2 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆99Updated 9 months ago
- BloodHound with a twist of cloud☆77Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Continuous kerberoast monitor☆44Updated last year
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆34Updated last year