log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
☆1,281Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for log4j-scanner
Users that are interested in log4j-scanner are comparing it to the libraries listed below
Sorting:
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,437Nov 23, 2022Updated 3 years ago
- A community sourced list of log4j-affected software☆1,125Nov 9, 2022Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 3 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,568Jun 30, 2022Updated 3 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,889Jun 15, 2022Updated 3 years ago
- Log4Shell scanner for Burp Suite☆484Sep 24, 2023Updated 2 years ago
- A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities☆657Apr 7, 2022Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆936Sep 2, 2025Updated 6 months ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,849Feb 12, 2024Updated 2 years ago
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- ☆2,078Dec 13, 2021Updated 4 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Feb 25, 2023Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,139Apr 26, 2024Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,300Updated this week
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Dec 27, 2022Updated 3 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Dec 11, 2024Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆3,183May 1, 2025Updated 10 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆12,015Updated this week
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,041Jul 10, 2022Updated 3 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,153Jan 21, 2026Updated last month
- Azure Security Resources and Notes☆1,713Feb 17, 2026Updated 2 weeks ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Dec 21, 2021Updated 4 years ago
- Gather and update all available and newest CVEs with their PoC.☆7,573Feb 28, 2026Updated last week
- A malicious LDAP server for JNDI injection attacks☆1,075Sep 28, 2023Updated 2 years ago
- An OOB interaction gathering server and client library☆4,212Feb 26, 2026Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,460Updated this week
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆805May 19, 2024Updated last year
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆950Jan 15, 2022Updated 4 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,740Oct 20, 2023Updated 2 years ago
- ☆2,665Mar 5, 2024Updated 2 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,632Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,511Jan 18, 2026Updated last month
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,827Feb 25, 2026Updated last week
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆256Dec 21, 2021Updated 4 years ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,550Feb 19, 2026Updated 2 weeks ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,497Nov 16, 2025Updated 3 months ago