Detections for CVE-2021-44228 inside of nested binaries
☆35Dec 18, 2021Updated 4 years ago
Alternatives and similar repositories for Log4j-CVE-Detect
Users that are interested in Log4j-CVE-Detect are comparing it to the libraries listed below
Sorting:
- ☆57Dec 16, 2021Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 9 months ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Telegram similar channels search tool (CLI + Maltego)☆19Dec 20, 2023Updated 2 years ago
- Authorization-Nuclei-Templates☆39Sep 16, 2024Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Jan 12, 2025Updated last year
- Oracle WebLogic CVE-2022-21371☆19Aug 31, 2022Updated 3 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Aug 6, 2022Updated 3 years ago
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Nov 14, 2022Updated 3 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- ☆23Oct 20, 2021Updated 4 years ago
- A CTF challenge generator.☆11Nov 29, 2023Updated 2 years ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- The Poc for CVE-2024-20931☆75Feb 2, 2024Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 3 months ago
- Windows process injection methods☆18Jul 18, 2021Updated 4 years ago
- Official repository of "Efficient and Effective Query Expansion for Web Search", Short Paper @ CIKM 2018☆15Nov 17, 2019Updated 6 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- Active Directory Wordlists☆112May 28, 2020Updated 5 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆19Aug 10, 2019Updated 6 years ago
- Default new blog project template for Middleman☆12Oct 28, 2020Updated 5 years ago
- A host monitoring proof of concept that uses python and ebpf to watch for bad behavior and optionally take action on it.☆12Jul 14, 2019Updated 6 years ago
- DO NOT RUN THIS.☆47Oct 20, 2021Updated 4 years ago
- Check AWS S3 instances for read/write/delete access☆121Feb 8, 2022Updated 4 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆19Updated this week
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆22Updated this week