A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell
☆72Dec 21, 2022Updated 3 years ago
Alternatives and similar repositories for log4j-poc
Users that are interested in log4j-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆71Jan 23, 2026Updated 2 months ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- Pwning Sudo Rules☆29Mar 3, 2022Updated 4 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Nov 14, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,139Apr 26, 2024Updated last year
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆44Mar 23, 2022Updated 4 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Dec 10, 2022Updated 3 years ago
- ☆65Dec 28, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Mar 15, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Nov 9, 2022Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Nov 3, 2020Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- ☆10Jan 9, 2026Updated 2 months ago
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- Standalone Yubico validation server☆12Feb 20, 2012Updated 14 years ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated last month
- A "Spring4Shell" vulnerability scanner.☆48Jan 22, 2025Updated last year
- OWASP Top 10 Implemented in ASP.NET MVC☆15Mar 15, 2015Updated 11 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- Fuzz 403/401ing endpoints for bypasses☆10Aug 14, 2020Updated 5 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- commands☆27Nov 5, 2020Updated 5 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago