Log4j2 CVE-2021-44228 revshell, ofc it suck!!
☆18Dec 21, 2021Updated 4 years ago
Alternatives and similar repositories for Log4j2-CVE-2021-44228-revshell
Users that are interested in Log4j2-CVE-2021-44228-revshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search-Scan-Save-Notify☆11May 12, 2025Updated 11 months ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- CVE-2021-40444☆66Dec 19, 2021Updated 4 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- A sample POC for CVE-2021-30657 affecting MacOS☆30Nov 8, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆28Jan 24, 2024Updated 2 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- ☆16Feb 12, 2022Updated 4 years ago
- vusialization of geo points from photos from vk profile☆47Feb 16, 2022Updated 4 years ago
- 🕵️♂️ Investigate Google emails and documents.☆19Dec 6, 2021Updated 4 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Sep 7, 2024Updated last year
- Defalyzer is a cross-platform software that focuses on defacement analyzing and mirror tracking.☆14Mar 10, 2022Updated 4 years ago
- Framework for Telegram users and chats investigating☆74Jun 5, 2025Updated 11 months ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆51Feb 5, 2025Updated last year
- Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC☆111Mar 6, 2022Updated 4 years ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.☆51Feb 21, 2022Updated 4 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆326Mar 9, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆391Apr 29, 2024Updated 2 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆25Oct 12, 2021Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Dec 16, 2021Updated 4 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- Find the remote website version based on a git repository☆125Jun 1, 2021Updated 4 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆53Feb 2, 2026Updated 3 months ago
- This repository provides a dockerized infrastructure and a python implementation of the CVE-2019-11043 exploit.☆14May 25, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- poc or exp of some famous vulnerability☆14Mar 5, 2014Updated 12 years ago
- Daily alert when a new domain name is registered and contains your keywords☆120Oct 23, 2023Updated 2 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- CVE-2022-30190 Follina POC☆105May 31, 2022Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆31Sep 18, 2024Updated last year
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago