☆366Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for log4shell-tester
Users that are interested in log4shell-tester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detector for Log4Shell exploitation attempts☆727Feb 12, 2022Updated 4 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,886Jun 15, 2022Updated 3 years ago
- log4j rce test environment and poc☆311Dec 15, 2021Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,430Nov 23, 2022Updated 3 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,695Dec 22, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Burpsuite extension for log4j2rce☆29Dec 13, 2021Updated 4 years ago
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆496Oct 24, 2022Updated 3 years ago
- [Moved to Codeberg] Simple local scanner for vulnerable log4j instances☆374Aug 1, 2022Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- ☆2,078Dec 13, 2021Updated 4 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,852Feb 12, 2024Updated 2 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 11 months ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆831Aug 4, 2023Updated 2 years ago
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,403Dec 16, 2021Updated 4 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- Apache Log4j 远程代码执行☆90May 14, 2023Updated 2 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-2…☆39Jun 21, 2023Updated 2 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Dec 20, 2021Updated 4 years ago
- Log4Shell scanner for Burp Suite☆486Sep 24, 2023Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- A malicious LDAP server for JNDI injection attacks☆1,080Sep 28, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.☆126Dec 14, 2021Updated 4 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Jul 16, 2020Updated 5 years ago
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆490Feb 25, 2023Updated 3 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- Remote command execution vulnerability scanner for Log4j.☆251Aug 1, 2023Updated 2 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆939Sep 2, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sample CloudFormation templates and architecture for AWS Control Tower☆29Aug 8, 2023Updated 2 years ago
- ☆71Jan 23, 2026Updated 3 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆607Mar 2, 2021Updated 5 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- Architecture - design and implementation of the D4 project architecture☆16Jul 3, 2025Updated 10 months ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆28Nov 11, 2020Updated 5 years ago