darkarnium / Log4j-CVE-Detect
Detections for CVE-2021-44228 inside of nested binaries
☆34Updated 3 years ago
Alternatives and similar repositories for Log4j-CVE-Detect:
Users that are interested in Log4j-CVE-Detect are comparing it to the libraries listed below
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- ☆68Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated last year
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- ☆58Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Kerberoast Detection Script☆30Updated 4 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 4 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Updated 3 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 7 months ago
- Azure AD enumeration over MS Graph☆80Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- ☆77Updated 5 years ago
- ☆22Updated 4 years ago
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 3 months ago
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago