Detections for CVE-2021-44228 inside of nested binaries
☆35Dec 18, 2021Updated 4 years ago
Alternatives and similar repositories for Log4j-CVE-Detect
Users that are interested in Log4j-CVE-Detect are comparing it to the libraries listed below
Sorting:
- ☆57Dec 16, 2021Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- Telegram similar channels search tool (CLI + Maltego)☆19Dec 20, 2023Updated 2 years ago
- ☆22Oct 30, 2022Updated 3 years ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 5 months ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 8 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Oracle WebLogic CVE-2022-21371☆19Aug 31, 2022Updated 3 years ago
- .Net PlugIn For x64dbg☆20Feb 27, 2018Updated 8 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated 11 months ago
- ☆44Jul 11, 2025Updated 7 months ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- Authorization-Nuclei-Templates☆39Sep 16, 2024Updated last year
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 3 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Jan 12, 2025Updated last year
- ☆23Oct 20, 2021Updated 4 years ago
- ☆22Apr 12, 2023Updated 2 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- ☆19Jul 23, 2021Updated 4 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- A "Spring4Shell" vulnerability scanner.☆48Jan 22, 2025Updated last year
- Practical Library Of Threats 4 Artificial Intelligence☆35Jun 19, 2025Updated 8 months ago
- Connect to anyconnect using a docker container☆11Feb 17, 2023Updated 3 years ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactions☆12Feb 8, 2023Updated 3 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Feb 18, 2023Updated 3 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Aug 6, 2022Updated 3 years ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 7 months ago
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆193Dec 27, 2022Updated 3 years ago
- Exploits for the TryHackMe room hackerNote☆31Feb 20, 2020Updated 6 years ago
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago