julian911015 / Log4j-Scanner-ExploitLinks
Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.
☆29Updated 9 months ago
Alternatives and similar repositories for Log4j-Scanner-Exploit
Users that are interested in Log4j-Scanner-Exploit are comparing it to the libraries listed below
Sorting:
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- Web Hacking and Red Teaming MindMap☆73Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Updated 3 months ago
- ☆93Updated last year
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆43Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆81Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆36Updated last year
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- Azure Service Subdomain Enumeration☆60Updated 9 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 7 months ago
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆51Updated 3 years ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆21Updated last month
- ☆24Updated 6 months ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆14Updated last year
- ☆55Updated 2 years ago