cisagov / log4j-affected-db
A community sourced list of log4j-affected software
☆1,119Updated 2 years ago
Alternatives and similar repositories for log4j-affected-db:
Users that are interested in log4j-affected-db are comparing it to the libraries listed below
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,897Updated 2 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,279Updated 2 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆344Updated 2 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆435Updated 2 years ago
- Detector for Log4Shell exploitation attempts☆731Updated 2 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆487Updated last year
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆349Updated 3 years ago
- Simple local scanner for vulnerable log4j instances☆375Updated 2 years ago
- ☆360Updated last year
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,113Updated 8 months ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆291Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,408Updated 2 years ago
- ☆436Updated 2 years ago
- CISA's catalog of bad practices that are exceptionally risky.☆203Updated last month
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,710Updated 3 years ago
- ☆168Updated 2 years ago
- A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-syst…☆638Updated 2 years ago
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Reque…☆1,438Updated 8 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,884Updated this week
- External monitoring for organization assets☆384Updated 7 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆837Updated 2 years ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆552Updated 2 months ago
- log4j rce test environment and poc☆310Updated 3 years ago
- Log4j Vulnerability Scanner for Windows☆156Updated last year
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,569Updated 2 years ago
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆493Updated 2 years ago
- Cybersecurity Evaluation Tool☆1,487Updated this week
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆531Updated 2 years ago
- Global Security Database☆314Updated 8 months ago
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆940Updated 3 years ago