cyberxml / log4j-pocLinks
A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell
☆70Updated 2 years ago
Alternatives and similar repositories for log4j-poc
Users that are interested in log4j-poc are comparing it to the libraries listed below
Sorting:
- Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)☆79Updated 3 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- Posts about different topics☆40Updated last month
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- A little utility to convert nmap xml results to markdown tables☆72Updated 3 years ago
- ☆80Updated 5 years ago
- ☆70Updated 2 years ago
- ☆82Updated 5 years ago
- ☆67Updated 3 years ago
- MayorSec DNS Enumeration Tool☆88Updated 10 months ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- ☆31Updated 4 years ago
- Automate the build of a vulnerable AD environment.☆37Updated 3 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- ☆31Updated 5 years ago
- Windows Kernel Exploits☆67Updated 8 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆21Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆46Updated last year
- For my Try Hack Me room: Intro To Pwntools☆28Updated 4 years ago
- Showcase of DNS Exfiltration and Infiltration☆50Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago