Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.
☆13Dec 14, 2021Updated 4 years ago
Alternatives and similar repositories for log4shell-vulnerable-app
Users that are interested in log4shell-vulnerable-app are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- ☆15Sep 10, 2025Updated 6 months ago
- ☆17Feb 23, 2026Updated last month
- Ghidra Loader for ESP32 Flash Dumps☆22Feb 7, 2025Updated last year
- Python SSDeep wrapper☆14Aug 27, 2018Updated 7 years ago
- Notion CLI tool and operation with interactive mode.☆26Updated this week
- ☆16Aug 17, 2023Updated 2 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- Redis embedded server for Java integration testing☆15May 23, 2018Updated 7 years ago
- This project is a lightweight wrapper for interacting with WMI using python/ctypes☆38Apr 6, 2019Updated 6 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- Android监控器(Activity异常destroy , 隐私政策合规)☆11Nov 18, 2021Updated 4 years ago
- ☆15Dec 16, 2021Updated 4 years ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- Javascript Decorators + Angular 1.x☆20Apr 8, 2015Updated 10 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- ☆11Jul 2, 2016Updated 9 years ago
- networkx graphs to ascii☆11Feb 8, 2026Updated last month
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- THE Fastest and most Accurate device detection for Java - professionally maintained device data☆25Nov 9, 2018Updated 7 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆28Feb 4, 2022Updated 4 years ago
- 收集的一些XSS学习资料☆27Dec 21, 2018Updated 7 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- IPv6 analysis tool: the other side☆36Jan 5, 2014Updated 12 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- The disclosure website for httpoxy☆10Jan 20, 2023Updated 3 years ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- JOhm is a Object-hash mapping library for Java for storing objects in Redis☆22Dec 13, 2018Updated 7 years ago
- Writing CUDA code in Python with the help of Numba. Some example code.☆11Jan 15, 2024Updated 2 years ago
- Elasticsearch Interactive Shell in Python☆27Oct 15, 2022Updated 3 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Examples of security scenarios in IMUNES☆15Sep 26, 2018Updated 7 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Workers-Framework: A simpler way to MultiTask in MicroPython☆12Jan 11, 2023Updated 3 years ago
- A project for building Linux && IoT Malware for fun and no-profit☆17Jan 24, 2025Updated last year