julian911015 / Log4j-Scanner-ExploitLinks
Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.
☆29Updated 9 months ago
Alternatives and similar repositories for Log4j-Scanner-Exploit
Users that are interested in Log4j-Scanner-Exploit are comparing it to the libraries listed below
Sorting:
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- ☆93Updated last year
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆36Updated last year
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆51Updated 3 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated 2 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆43Updated 2 years ago
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25Updated 3 years ago
- ☆55Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 6 months ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 4 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆86Updated 11 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- ☆44Updated last year
- 「🐞」Bug Bounty Tricks☆38Updated last year
- ☆25Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆50Updated last year
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- an exploit of Server-side request forgery (SSRF)☆49Updated 10 months ago
- Classic Web shell upload techniques & Web RCE techniques☆32Updated 7 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆21Updated 2 months ago