☆57Dec 26, 2021Updated 4 years ago
Alternatives and similar repositories for log4jscan
Users that are interested in log4jscan are comparing it to the libraries listed below
Sorting:
- ☆10Jul 8, 2024Updated last year
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆13Jun 14, 2024Updated last year
- Make your terminal string output even more beautiful 💖☆11Jul 27, 2025Updated 7 months ago
- (Unofficial) Python API for http://netcraft.com☆15Jul 6, 2016Updated 9 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 4 months ago
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- This GitHub repository contains lessons for developing Microsoft Security CoPilot plugins☆20May 15, 2024Updated last year
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Mar 7, 2024Updated 2 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- ☆21Jan 13, 2022Updated 4 years ago
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Aug 28, 2020Updated 5 years ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- ☆120Oct 5, 2022Updated 3 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆36Feb 28, 2026Updated last week
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Jul 18, 2017Updated 8 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 6 months ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 11 months ago
- From Dork to Download: Automating Google Dorks with Playwright☆41Mar 1, 2026Updated last week
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Jan 8, 2023Updated 3 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Nov 21, 2021Updated 4 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Oct 13, 2022Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago