authomize / log4j-log4shell-affected
Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability
☆54Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for log4j-log4shell-affected
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago
- Kerberoast Detection Script☆30Updated 3 weeks ago
- Exploit for HiveNightmare - CVE-2021–36934☆61Updated 2 weeks ago
- ☆39Updated last year
- nse script to inject jndi payloads☆45Updated 2 years ago
- Azure AD enumeration over MS Graph☆80Updated last year
- Searching .evtx logs for remote connections☆23Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆98Updated 4 months ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Tool to perform lateral movement between AAD joined devices☆52Updated 2 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Open IOC sharing platform☆53Updated 2 weeks ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Ingest openldap data into bloodhound☆78Updated 3 years ago
- Silver SAML forgery tool☆43Updated 8 months ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Virtual Security Operations Center☆49Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆83Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 2 years ago
- ☆79Updated last year
- Triaging Windows event logs based on SANS Poster☆37Updated last year
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆33Updated 11 months ago
- BloodHound with a twist of cloud☆74Updated 4 years ago
- Slides and materials for conference presentations☆11Updated last year
- Automate the build of a vulnerable AD environment.☆34Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆65Updated 2 years ago