Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046
☆21Dec 23, 2021Updated 4 years ago
Alternatives and similar repositories for Log4j_CVE-2021-45046
Users that are interested in Log4j_CVE-2021-45046 are comparing it to the libraries listed below
Sorting:
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- Log4j_dos_CVE-2021-45105☆13Dec 19, 2021Updated 4 years ago
- log4j 1.x RCE Poc -- CVE-2021-4104☆20Dec 14, 2021Updated 4 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated 3 weeks ago
- ☆13Feb 9, 2022Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago
- A research project to crawl and analyze Top 1 million domains☆23Feb 7, 2023Updated 3 years ago
- ☆71Jan 23, 2026Updated last month
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Learning volatility plugins.☆19Feb 16, 2021Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- ☆26Jul 7, 2021Updated 4 years ago
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- ☆27Mar 5, 2023Updated 3 years ago
- git clone all repositories and gists from a given GitHub username☆32Feb 27, 2026Updated last week
- Pull secrets from an AWS environment☆67Feb 2, 2020Updated 6 years ago
- ☆31Jan 28, 2020Updated 6 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- ☆27Jun 18, 2024Updated last year
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆35Nov 7, 2022Updated 3 years ago
- Repository for storing code for O'Reilly book☆34Feb 11, 2024Updated 2 years ago
- Guerilla Mail CLI + Go module☆34Feb 25, 2023Updated 3 years ago
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆72Dec 21, 2022Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)☆36Jan 7, 2022Updated 4 years ago
- generate CobaltStrike's cross-platform payload☆34Jun 16, 2024Updated last year
- CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server☆91Jan 21, 2023Updated 3 years ago
- ☆83Nov 20, 2021Updated 4 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago