A community sourced list of log4j-affected software
☆1,124Nov 9, 2022Updated 3 years ago
Alternatives and similar repositories for log4j-affected-db
Users that are interested in log4j-affected-db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,889Jun 15, 2022Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 4 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Dec 27, 2022Updated 3 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,435Nov 23, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Dec 20, 2021Updated 4 years ago
- ☆2,078Dec 13, 2021Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆950Jan 15, 2022Updated 4 years ago
- Log4j jndi injects the Payload generator☆486Dec 13, 2021Updated 4 years ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,428Dec 27, 2022Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,398Dec 16, 2021Updated 4 years ago
- Remote Code Injection In Log4j☆469Jan 18, 2022Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆725Feb 12, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆939Sep 2, 2025Updated 6 months ago
- Simple local scanner for vulnerable log4j instances☆374Aug 1, 2022Updated 3 years ago
- Log4Shell scanner for Burp Suite☆485Sep 24, 2023Updated 2 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,698Dec 22, 2021Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Jan 7, 2022Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,045Jul 10, 2022Updated 3 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,850Feb 12, 2024Updated 2 years ago
- ☆171Feb 14, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆496Oct 24, 2022Updated 3 years ago
- Grafana Unauthorized arbitrary file reading vulnerability☆368Feb 14, 2023Updated 3 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,140Apr 26, 2024Updated last year
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆487Feb 25, 2023Updated 3 years ago
- Cybersecurity Evaluation Tool☆1,790Updated this week
- A malicious LDAP server for JNDI injection attacks☆1,076Sep 28, 2023Updated 2 years ago
- A set of guidelines and best practices for an awesome engineering team☆272Updated this week
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Dec 20, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,565Jun 30, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,502Dec 21, 2023Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- ☆2,667Mar 5, 2024Updated 2 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,973Jul 20, 2021Updated 4 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆753Apr 14, 2021Updated 4 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Dec 11, 2024Updated last year