A community sourced list of log4j-affected software
☆1,124Nov 9, 2022Updated 3 years ago
Alternatives and similar repositories for log4j-affected-db
Users that are interested in log4j-affected-db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,886Jun 15, 2022Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 4 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆440Dec 27, 2022Updated 3 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,434Nov 23, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Dec 20, 2021Updated 4 years ago
- ☆2,077Dec 13, 2021Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆951Jan 15, 2022Updated 4 years ago
- Log4j jndi injects the Payload generator☆487Dec 13, 2021Updated 4 years ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,429Dec 27, 2022Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,399Dec 16, 2021Updated 4 years ago
- Remote Code Injection In Log4j☆471Jan 18, 2022Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆936Sep 2, 2025Updated 7 months ago
- Simple local scanner for vulnerable log4j instances☆374Aug 1, 2022Updated 3 years ago
- Log4Shell scanner for Burp Suite☆486Sep 24, 2023Updated 2 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,697Dec 22, 2021Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Jan 7, 2022Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,049Jul 10, 2022Updated 3 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,850Feb 12, 2024Updated 2 years ago
- ☆172Feb 14, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆496Oct 24, 2022Updated 3 years ago
- Grafana Unauthorized arbitrary file reading vulnerability☆368Feb 14, 2023Updated 3 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,141Apr 26, 2024Updated last year
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Feb 25, 2023Updated 3 years ago
- Cybersecurity Evaluation Tool☆1,811Updated this week
- A malicious LDAP server for JNDI injection attacks☆1,079Sep 28, 2023Updated 2 years ago
- A set of guidelines and best practices for an awesome engineering team☆273Mar 26, 2026Updated 3 weeks ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Dec 20, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,565Jun 30, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- ☆2,666Mar 5, 2024Updated 2 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,977Jul 20, 2021Updated 4 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆754Apr 14, 2021Updated 5 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Dec 11, 2024Updated last year