☆171Feb 14, 2025Updated last year
Alternatives and similar repositories for log4j-tools
Users that are interested in log4j-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Dec 27, 2022Updated 3 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆487Feb 25, 2023Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 4 years ago
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- ☆15Nov 2, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆18Jan 27, 2022Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated 2 weeks ago
- A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-syst…☆640Mar 10, 2022Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,435Nov 23, 2022Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆939Sep 2, 2025Updated 6 months ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Dec 16, 2021Updated 4 years ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Dec 21, 2021Updated 4 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,139Apr 26, 2024Updated last year
- ☆79Apr 6, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆37Apr 24, 2022Updated 3 years ago
- CVE-2021-40865☆14Nov 26, 2021Updated 4 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,850Feb 12, 2024Updated 2 years ago
- 用来存放平时写的一些net内存马,仅用于练手,需要可以自行修改☆90May 3, 2022Updated 3 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆67Oct 1, 2022Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆725Feb 12, 2022Updated 4 years ago
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Dec 22, 2021Updated 4 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- A tool to run a command when the target of a symlink changes☆16Apr 28, 2016Updated 9 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- A malicious LDAP server for JNDI injection attacks☆1,076Sep 28, 2023Updated 2 years ago
- Log4j jndi injects the Payload generator☆486Dec 13, 2021Updated 4 years ago
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Memory Webshell for Spring Web - 适用于 Spring Web 的内存马☆26Jan 18, 2024Updated 2 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- Public testing data. Samples of log4j library versions to help log4j scanners / detectors improve their accuracy for detecting CVE-2021-…☆14Dec 30, 2021Updated 4 years ago
- Burp Bounty profiles☆80Jan 2, 2022Updated 4 years ago
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago