cisagov / log4j-scannerView external linksLinks
log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
☆1,281Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for log4j-scanner
Users that are interested in log4j-scanner are comparing it to the libraries listed below
Sorting:
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,438Nov 23, 2022Updated 3 years ago
- A community sourced list of log4j-affected software☆1,123Nov 9, 2022Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 3 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,568Jun 30, 2022Updated 3 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,891Jun 15, 2022Updated 3 years ago
- Log4Shell scanner for Burp Suite☆486Sep 24, 2023Updated 2 years ago
- A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities☆658Apr 7, 2022Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆156Dec 17, 2021Updated 4 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆937Sep 2, 2025Updated 5 months ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,849Feb 12, 2024Updated 2 years ago
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- ☆2,079Dec 13, 2021Updated 4 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Feb 25, 2023Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,138Apr 26, 2024Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆26,985Updated this week
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆861Jan 20, 2022Updated 4 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Dec 27, 2022Updated 3 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Dec 11, 2024Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆3,175May 1, 2025Updated 9 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,935Updated this week
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,040Jul 10, 2022Updated 3 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,145Jan 21, 2026Updated 3 weeks ago
- Azure Security Resources and Notes☆1,707Feb 2, 2026Updated last week
- Gather and update all available and newest CVEs with their PoC.☆7,538Updated this week
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆294Dec 21, 2021Updated 4 years ago
- A malicious LDAP server for JNDI injection attacks☆1,075Sep 28, 2023Updated 2 years ago
- An OOB interaction gathering server and client library☆4,177Feb 2, 2026Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,440Oct 12, 2025Updated 4 months ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆950Jan 15, 2022Updated 4 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,740Oct 20, 2023Updated 2 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,570Updated this week
- ☆2,663Mar 5, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,487Jan 18, 2026Updated 3 weeks ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,824Jan 7, 2026Updated last month
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Dec 21, 2021Updated 4 years ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,535Feb 6, 2026Updated last week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,464Nov 16, 2025Updated 2 months ago