back2root / log4shell-rex
PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
☆291Updated 3 years ago
Alternatives and similar repositories for log4shell-rex:
Users that are interested in log4shell-rex are comparing it to the libraries listed below
- Detector for Log4Shell exploitation attempts☆732Updated 3 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆349Updated 3 years ago
- Burpsuite extension for log4j2rce☆28Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆153Updated 3 years ago
- ☆537Updated last year
- CVE-2021-1675 Detection Info☆215Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.☆60Updated 3 years ago
- Log4Shell scanner for Burp Suite☆483Updated last year
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆149Updated 3 years ago
- Log4j jndi injects the Payload generator☆486Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,006Updated 2 years ago
- Transfer files to and from a Windows host via ICMP in restricted network environments.☆321Updated 3 years ago
- ☆448Updated 3 years ago
- Nginx 18.1 04/09/22 zero-day repo☆372Updated 2 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆344Updated 2 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆232Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 3 weeks ago
- An Awesome List of Log4Shell resources to help you stay informed and secure! 🔒☆228Updated 2 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆933Updated 3 years ago
- Collect information of Windows PC when doing incident response☆252Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆243Updated 2 years ago
- ☆168Updated 2 years ago
- POC for CVE-2022-1388☆230Updated 2 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Updated 2 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆395Updated 4 months ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆176Updated 3 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆841Updated 3 years ago
- ☆361Updated 2 years ago