log4j PowerShell Checker
☆18Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for log4j-powershell-checker
Users that are interested in log4j-powershell-checker are comparing it to the libraries listed below
Sorting:
- ☆11May 8, 2022Updated 3 years ago
- Getting started with OpenTelemetry☆16Nov 9, 2022Updated 3 years ago
- PowerShell Module for Infoblox☆12Jun 28, 2015Updated 10 years ago
- ☆10Jan 13, 2021Updated 5 years ago
- The purpose of this learning collection is to provide links to get you started on the journey of AI security.☆10Oct 24, 2025Updated 4 months ago
- ocpjbod is an enclosure management tool that controls some OCP storage enclosure, like Open Vault (Knox).☆12Oct 15, 2018Updated 7 years ago
- A collection of tools for the Janus exploit [CVE-2017-13156].☆10Oct 22, 2019Updated 6 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- ☆11Dec 31, 2018Updated 7 years ago
- Powershell statsd client☆21Oct 17, 2013Updated 12 years ago
- Lists a public S3 bucket☆13Oct 17, 2015Updated 10 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- ☆14Feb 8, 2020Updated 6 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 7 months ago
- ☆11Apr 22, 2022Updated 3 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- The repository contains Criminal IP Asset Search data in STIX 2.1 JSON format, enabling a quick understanding of threat information for s…☆11Jan 29, 2024Updated 2 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Log4j Vulnerability Scanner for Windows☆159Dec 10, 2025Updated 2 months ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- study material used for the 2018 CISSP exam☆12Jun 11, 2018Updated 7 years ago
- A simple client for the NetMRI RESTful API.☆13Feb 9, 2024Updated 2 years ago
- Pegasus System has been designed by an experienced team of software developers (terkoding) and exploit writers to automate processes so p…☆16Jan 2, 2019Updated 7 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- The project brings the power of the Linux kernel tracing to Kubernetes. It leverages existing kernel tracing frameworks such as ftrace, p…☆11Jan 8, 2024Updated 2 years ago
- The Accurics GitHub Action scans Infrastructure as Code files checked into the respository to help ensure that cloud resources are secure…☆15Sep 27, 2023Updated 2 years ago
- Werkzeug password cracker☆18Nov 14, 2024Updated last year
- nse script to inject jndi payloads☆46Dec 13, 2021Updated 4 years ago
- PYMI team CTF write-up☆10Mar 26, 2023Updated 2 years ago
- ☆24Sep 29, 2011Updated 14 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Mobster is a tool that can help you get deeper understanding into the performance of mobile web applications on real mobile devices☆38Mar 27, 2013Updated 12 years ago