A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell
☆72Dec 21, 2022Updated 3 years ago
Alternatives and similar repositories for log4j-poc
Users that are interested in log4j-poc are comparing it to the libraries listed below
Sorting:
- ☆71Jan 23, 2026Updated last month
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- Pwning Sudo Rules☆29Mar 3, 2022Updated 4 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,849Feb 12, 2024Updated 2 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Nov 14, 2022Updated 3 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,139Apr 26, 2024Updated last year
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 8 months ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- urlyzer is a URL parsing analysis tool.☆24Jul 27, 2024Updated last year
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- ☆52Jun 29, 2021Updated 4 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated last month
- ☆35Aug 23, 2022Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Nov 9, 2022Updated 3 years ago
- ☆124Nov 16, 2022Updated 3 years ago
- ☆39Mar 25, 2021Updated 4 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- An insecure example application (Java)☆33Aug 19, 2025Updated 6 months ago
- ☆33Feb 26, 2022Updated 4 years ago
- crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names fro…☆41Jun 22, 2024Updated last year
- eLearnSecurity Mobile Application Penetration Tester (eMAPT)☆33Feb 6, 2024Updated 2 years ago
- CVE-2022-21660☆28Jan 10, 2022Updated 4 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Dec 11, 2024Updated last year
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Jun 16, 2023Updated 2 years ago
- ☆10Jan 9, 2026Updated last month
- A curated list of different pentesting resources☆30Feb 26, 2022Updated 4 years ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 11 months ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- A way to visualize nginx config files☆10Nov 21, 2022Updated 3 years ago
- Программа для домашнего тестирования по системе Platonus во имя подготовки к сессии☆22May 15, 2023Updated 2 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Feb 22, 2022Updated 4 years ago
- ☆42Dec 26, 2022Updated 3 years ago