byt3bl33d3r / log4j-scanLinks
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
☆12Updated 3 years ago
Alternatives and similar repositories for log4j-scan
Users that are interested in log4j-scan are comparing it to the libraries listed below
Sorting:
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Tactics, Techniques, and Procedures☆25Updated 4 months ago
- Bash script to generate reverse shell payloads☆19Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ☆25Updated 2 years ago
- Subdomain Scan (knockpy) in Python3☆12Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 6 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- ☆14Updated 2 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 3 months ago
- ☆14Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Pentesting notes☆17Updated 3 months ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆19Updated 5 years ago
- OSCP Preperation☆14Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- LDAP library for auditing MS AD☆12Updated last year