cyberxml / log4j-pocLinks
A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell
☆70Updated 2 years ago
Alternatives and similar repositories for log4j-poc
Users that are interested in log4j-poc are comparing it to the libraries listed below
Sorting:
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)☆79Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- ☆66Updated 3 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- ☆82Updated 5 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- ☆119Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- Run several volatility plugins at the same time☆114Updated 2 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆18Updated 2 years ago
- ☆38Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- ☆104Updated 5 years ago
- OSCP Cheatsheets☆98Updated 5 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- ☆70Updated last year
- ☆48Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- ☆29Updated 4 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 3 months ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago