PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
☆293Dec 21, 2021Updated 4 years ago
Alternatives and similar repositories for log4shell-rex
Users that are interested in log4shell-rex are comparing it to the libraries listed below
Sorting:
- Go reverse shell for Win/Linux/OSX☆17May 15, 2019Updated 6 years ago
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- Log4j jndi injects the Payload generator☆486Dec 13, 2021Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆725Feb 12, 2022Updated 4 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 3 years ago
- Log4j jndi injection fuzz tool☆70Dec 24, 2021Updated 4 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,889Jun 15, 2022Updated 3 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆206Dec 15, 2021Updated 4 years ago
- ☆11Mar 2, 2024Updated 2 years ago
- 一个LDAP请求监听器,摆脱dnslog平台☆291Apr 7, 2023Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Ransomware simulator written in Golang☆473Jun 30, 2022Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆950Jan 15, 2022Updated 4 years ago
- openam-CVE-2021-35464 tomcat 执行命令回显☆87Dec 15, 2022Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆779Feb 3, 2023Updated 3 years ago
- Pushes Sysmon Configs☆90Jun 11, 2021Updated 4 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆487Feb 25, 2023Updated 3 years ago
- Windows Common Log File System Driver POC☆95Dec 21, 2021Updated 4 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆516Jul 15, 2022Updated 3 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- Log4j Vulnerability Scanner for Windows☆159Dec 10, 2025Updated 3 months ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,476Mar 2, 2026Updated 2 weeks ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆356Nov 25, 2022Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Jun 10, 2022Updated 3 years ago
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 3 months ago
- Really stupid re-implementation of invoke-wmiexec☆13Jul 14, 2022Updated 3 years ago
- Evtx Log (xml) Browser☆56Mar 12, 2023Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,434Nov 23, 2022Updated 3 years ago
- ☆451Aug 4, 2021Updated 4 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 3 years ago