cckuailong / Log4j_CVE-2021-45046Links
Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046
☆20Updated 3 years ago
Alternatives and similar repositories for Log4j_CVE-2021-45046
Users that are interested in Log4j_CVE-2021-45046 are comparing it to the libraries listed below
Sorting:
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- Default plugins for Jaeles Scanner☆35Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Updated 3 years ago
- ☆36Updated 8 months ago
- ☆19Updated 5 years ago
- Guide For WAF Bypass Techniques☆28Updated 5 years ago
- XMLRPC - RCE in MovableTypePoC☆21Updated 3 years ago
- PoC repository for CVE-2023-29007☆34Updated 2 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- A Burp extension to show the Collaborator client in a tab☆24Updated 2 years ago
- Simple C2 over the Trello API☆39Updated 2 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆17Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- This script helps to identify CVE-2021-26855 ssrf Poc☆22Updated 4 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆57Updated 2 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 5 months ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- ☆26Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated last month
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- S3 bucket enumerator☆30Updated 6 years ago