julian911015 / Log4j-Scanner-Exploit
Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.
☆29Updated 6 months ago
Alternatives and similar repositories for Log4j-Scanner-Exploit:
Users that are interested in Log4j-Scanner-Exploit are comparing it to the libraries listed below
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆41Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆42Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 10 months ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Web Hacking and Red Teaming MindMap☆70Updated 2 years ago
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆50Updated 3 years ago
- an exploit of Server-side request forgery (SSRF)☆50Updated 7 months ago
- Active Directory Penetration Testing for Red Teams☆58Updated 5 months ago
- ☆76Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Red Teaming tools and techniques☆50Updated 2 years ago
- Gmail/GSuite account enumeration tool☆50Updated last year
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 2 years ago
- Azure Service Subdomain Enumeration☆56Updated 6 months ago
- ☆53Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆24Updated last week
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year
- ☆17Updated 2 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆45Updated 2 years ago