PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
☆293Dec 21, 2021Updated 4 years ago
Alternatives and similar repositories for log4shell-rex
Users that are interested in log4shell-rex are comparing it to the libraries listed below
Sorting:
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆206Dec 15, 2021Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 3 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆950Jan 15, 2022Updated 4 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,889Jun 15, 2022Updated 3 years ago
- Log4j jndi injects the Payload generator☆486Dec 13, 2021Updated 4 years ago
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Log4j jndi injection fuzz tool☆70Dec 24, 2021Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- Windows Common Log File System Driver POC☆95Dec 21, 2021Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- 一个LDAP请求监听器,摆脱dnslog平台☆293Apr 7, 2023Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆779Feb 3, 2023Updated 3 years ago
- Ransomware simulator written in Golang☆471Jun 30, 2022Updated 3 years ago
- Log4j Vulnerability Scanner for Windows☆159Dec 10, 2025Updated 2 months ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Feb 25, 2023Updated 3 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- ☆171Feb 14, 2025Updated last year
- openam-CVE-2021-35464 tomcat 执行命令回显☆87Dec 15, 2022Updated 3 years ago
- ☆451Aug 4, 2021Updated 4 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,436Nov 23, 2022Updated 3 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆517Jul 15, 2022Updated 3 years ago
- Hide your payload in DNS☆615May 3, 2023Updated 2 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- Simple local scanner for vulnerable log4j instances☆374Aug 1, 2022Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Oct 14, 2022Updated 3 years ago
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆937Sep 2, 2025Updated 5 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,452Feb 14, 2026Updated 2 weeks ago
- C# Lsass parser☆296Oct 13, 2021Updated 4 years ago
- Log4Shell scanner for Burp Suite☆484Sep 24, 2023Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,041Jul 10, 2022Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Jun 10, 2022Updated 3 years ago
- ☆263Apr 10, 2023Updated 2 years ago
- Pushes Sysmon Configs☆90Jun 11, 2021Updated 4 years ago