A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
☆13Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for log4j-scan
Users that are interested in log4j-scan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- LDAP library for auditing MS AD☆13Nov 28, 2023Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 5 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- SMBMap is a handy SMB enumeration tool☆38Jun 18, 2024Updated last year
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"☆18Apr 30, 2020Updated 5 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- 获取棱角社区攻防日报内容进行日报推送☆21Oct 26, 2021Updated 4 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…