back2root / log4shell-rexLinks
PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
☆291Updated 3 years ago
Alternatives and similar repositories for log4shell-rex
Users that are interested in log4shell-rex are comparing it to the libraries listed below
Sorting:
- ☆545Updated last year
- Simple local scanner for applications containing vulnerable Spring libraries☆126Updated 2 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- CVE-2021-1675 Detection Info☆216Updated 2 years ago
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- ☆169Updated 2 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Updated 3 years ago
- POC for CVE-2022-1388☆232Updated 3 years ago
- Everything I needed to understand what was going on with "Spring4Shell" - translated source materials, exploit, links to demo apps, and m…☆107Updated 3 years ago
- Nginx 18.1 04/09/22 zero-day repo☆373Updated 3 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆249Updated 2 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆383Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,022Updated 2 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆945Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆732Updated 3 years ago
- Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.☆60Updated 3 years ago
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆952Updated 3 years ago
- BlueHound - pinpoint the security issues that actually matter☆738Updated last year
- CVE-2023-24055 PoC (KeePass 2.5x)☆254Updated 2 years ago
- ☆452Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 2 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 2 years ago
- Transfer files to and from a Windows host via ICMP in restricted network environments.☆325Updated 3 years ago
- ☆363Updated 2 years ago
- Log4j jndi injects the Payload generator☆487Updated 3 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆412Updated 3 weeks ago
- Log4Shell scanner for Burp Suite☆486Updated last year
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- An Office365 User Attack Tool☆638Updated last year