kozmer / log4j-shell-poc
A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
☆1,825Updated last year
Alternatives and similar repositories for log4j-shell-poc:
Users that are interested in log4j-shell-poc are comparing it to the libraries listed below
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,415Updated 2 years ago
- A malicious LDAP server for JNDI injection attacks☆1,029Updated last year
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,281Updated 2 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,116Updated last year
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆938Updated 3 years ago
- Apache Log4j 远程代码执行☆82Updated last year
- log4j rce test environment and poc☆311Updated 3 years ago
- ☆2,081Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆920Updated 3 years ago
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,682Updated 2 years ago
- ☆2,504Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,440Updated 2 years ago
- Fancy reverse and bind shell handler☆2,733Updated 8 months ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆801Updated last year
- An OOB interaction gathering server and client library☆3,714Updated this week
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes☆1,144Updated 2 years ago
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,194Updated this week
- Burpsuite Extension to bypass 403 restricted directory☆1,613Updated last year
- Log4Shell scanner for Burp Suite☆484Updated last year
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,099Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,884Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,002Updated last month
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆436Updated 2 years ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆5,769Updated 8 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,302Updated 2 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,310Updated 5 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,763Updated 2 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,879Updated 3 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆351Updated 3 years ago
- Rockyou for web fuzzing☆2,779Updated last month