log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
☆1,280Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for log4j-scanner
Users that are interested in log4j-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,435Nov 23, 2022Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 4 years ago
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,565Jun 30, 2022Updated 3 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,889Jun 15, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities☆657Apr 7, 2022Updated 3 years ago
- Log4Shell scanner for Burp Suite☆485Sep 24, 2023Updated 2 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,850Feb 12, 2024Updated 2 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆939Sep 2, 2025Updated 6 months ago
- Detector for Log4Shell exploitation attempts☆725Feb 12, 2022Updated 4 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆487Feb 25, 2023Updated 3 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,139Apr 26, 2024Updated last year
- ☆2,078Dec 13, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,398Dec 16, 2021Updated 4 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Dec 11, 2024Updated last year
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Dec 21, 2021Updated 4 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,587Updated this week
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,045Jul 10, 2022Updated 3 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Dec 27, 2022Updated 3 years ago
- Azure Security Resources and Notes☆1,717Feb 17, 2026Updated last month
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A malicious LDAP server for JNDI injection attacks☆1,076Sep 28, 2023Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,484Mar 2, 2026Updated 3 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,203May 1, 2025Updated 10 months ago
- CrowdStrike Archive Scan Tool☆87Feb 3, 2022Updated 4 years ago
- An OOB interaction gathering server and client library☆4,236Mar 10, 2026Updated 2 weeks ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆12,088Updated this week
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,155Jan 21, 2026Updated 2 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,718Mar 18, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,549Jan 18, 2026Updated 2 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,429Dec 27, 2022Updated 3 years ago
- Gather and update all available and newest CVEs with their PoC.☆7,624Mar 20, 2026Updated last week
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- Six Degrees of Domain Admin☆10,558Mar 2, 2026Updated 3 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,442Mar 16, 2026Updated last week
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year