A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
☆1,850Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for log4j-shell-poc
Users that are interested in log4j-shell-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,435Nov 23, 2022Updated 3 years ago
- log4j rce test environment and poc☆311Dec 15, 2021Updated 4 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆351Dec 20, 2021Updated 4 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,139Apr 26, 2024Updated last year
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆72Dec 21, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆950Jan 15, 2022Updated 4 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,889Jun 15, 2022Updated 3 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Dec 27, 2022Updated 3 years ago
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,795Mar 22, 2023Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆939Sep 2, 2025Updated 6 months ago
- Apache Log4j 远程代码执行☆90May 14, 2023Updated 2 years ago
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆496Oct 24, 2022Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Mar 20, 2026Updated last week
- ☆3,664Jan 9, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Impacket is a collection of Python classes for working with network protocols.☆15,576Mar 20, 2026Updated last week
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,279Aug 20, 2024Updated last year
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Dec 16, 2021Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆725Feb 12, 2022Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,045Jul 10, 2022Updated 3 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,587Updated this week
- A malicious LDAP server for JNDI injection attacks☆1,076Sep 28, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,434Jan 19, 2025Updated last year
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆829Aug 4, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,812Dec 4, 2025Updated 3 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,306Mar 10, 2026Updated 2 weeks ago
- Adversary Emulation Framework☆10,877Updated this week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,973Jul 12, 2024Updated last year
- Remote Code Injection In Log4j☆469Jan 18, 2022Updated 4 years ago
- Trying to tame the three-headed dog.☆4,935Nov 14, 2025Updated 4 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,293Mar 16, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Deserialization payload generator for a variety of .NET formatters☆3,691Dec 23, 2024Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆2,206Sep 10, 2020Updated 5 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆487Feb 25, 2023Updated 3 years ago
- An OOB interaction gathering server and client library☆4,236Mar 10, 2026Updated 2 weeks ago
- Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CV…☆85Apr 7, 2024Updated last year
- The Havoc Framework☆8,256Dec 18, 2025Updated 3 months ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,127Mar 8, 2022Updated 4 years ago