☆172Feb 14, 2025Updated last year
Alternatives and similar repositories for log4j-tools
Users that are interested in log4j-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆440Dec 27, 2022Updated 3 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Feb 25, 2023Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 4 years ago
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Nov 2, 2022Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-syst…☆640Mar 10, 2022Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,434Nov 23, 2022Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆936Sep 2, 2025Updated 7 months ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Dec 21, 2021Updated 4 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,142Apr 26, 2024Updated last year
- ☆79Apr 6, 2022Updated 4 years ago
- ☆37Apr 24, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2021-40865☆14Nov 26, 2021Updated 4 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,850Feb 12, 2024Updated 2 years ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆68Oct 1, 2022Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 4 years ago
- A tool to run a command when the target of a symlink changes☆16Apr 28, 2016Updated 9 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- A malicious LDAP server for JNDI injection attacks☆1,078Sep 28, 2023Updated 2 years ago
- Log4j jndi injects the Payload generator☆487Dec 13, 2021Updated 4 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- 010Editor Templates☆13May 29, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Memory Webshell for Spring Web - 适用于 Spring Web 的内存马☆26Jan 18, 2024Updated 2 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,281Dec 6, 2022Updated 3 years ago
- Burp Bounty profiles☆80Jan 2, 2022Updated 4 years ago
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆25Oct 12, 2021Updated 4 years ago
- log4j rce test environment and poc☆311Dec 15, 2021Updated 4 years ago