Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability
☆53Dec 19, 2021Updated 4 years ago
Alternatives and similar repositories for log4j-log4shell-affected
Users that are interested in log4j-log4shell-affected are comparing it to the libraries listed below
Sorting:
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Jul 26, 2022Updated 3 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated last month
- ☆15Nov 2, 2022Updated 3 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228☆17Dec 15, 2021Updated 4 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.☆126Dec 14, 2021Updated 4 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Dec 22, 2021Updated 4 years ago
- nse script to inject jndi payloads☆46Dec 13, 2021Updated 4 years ago
- Kumpulan virtex WhatsApp☆32Aug 17, 2020Updated 5 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- ☆24Sep 12, 2024Updated last year
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Apr 24, 2025Updated 10 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated last month
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- Password lists generated by deep learning algorithms.☆34Jan 20, 2020Updated 6 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Jun 28, 2019Updated 6 years ago
- Vandalize old emails. Like an NFT that's easy to prove ownership of.☆35Jul 20, 2023Updated 2 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- GoldenSAML Attack Libraries and Framework☆77Jun 5, 2024Updated last year
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆30Jul 30, 2024Updated last year
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- FETCH THE PASSWORD STRETCHER☆38Dec 8, 2022Updated 3 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- CVE-2021-4034 POC exploit☆36Jan 28, 2022Updated 4 years ago
- All slides from my meetup talks☆37Jun 11, 2025Updated 8 months ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago