cyberstruggle / L4shLinks
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
☆258Updated 4 years ago
Alternatives and similar repositories for L4sh
Users that are interested in L4sh are comparing it to the libraries listed below
Sorting:
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 4 years ago
- Generate obfuscated meterpreter shells☆234Updated 4 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆448Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading☆194Updated 4 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Updated 4 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Updated last year
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆603Updated 3 years ago
- ☆296Updated 4 years ago
- ☆166Updated 5 years ago
- Hide your payload in DNS☆615Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆329Updated last year
- Subdomain finder☆372Updated last year
- A polyglot payload generator☆242Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆501Updated 3 months ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆313Updated 3 years ago
- Remote command execution vulnerability scanner for Log4j.☆253Updated 2 years ago
- ☆205Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 5 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆199Updated 4 years ago
- A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM syste…☆281Updated 3 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆199Updated 4 years ago
- Proof of Concept for CVE-2019-18634☆231Updated 4 years ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆399Updated 3 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆311Updated 2 years ago
- log4j rce test environment and poc☆311Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆369Updated 5 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆284Updated 2 years ago
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered fo…☆204Updated 2 years ago
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆229Updated 3 years ago