A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
☆1,850Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for log4j-shell-poc
Users that are interested in log4j-shell-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,434Nov 23, 2022Updated 3 years ago
- log4j rce test environment and poc☆311Dec 15, 2021Updated 4 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Dec 20, 2021Updated 4 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,142Apr 26, 2024Updated last year
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆72Dec 21, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆951Jan 15, 2022Updated 4 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,886Jun 15, 2022Updated 3 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆440Dec 27, 2022Updated 3 years ago
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,797Mar 22, 2023Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆936Sep 2, 2025Updated 7 months ago
- Apache Log4j 远程代码执行☆90May 14, 2023Updated 2 years ago
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆496Oct 24, 2022Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,649Apr 9, 2026Updated last week
- ☆3,670Jan 9, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Impacket is a collection of Python classes for working with network protocols.☆15,631Apr 9, 2026Updated last week
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,296Aug 20, 2024Updated last year
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Dec 16, 2021Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,049Jul 10, 2022Updated 3 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,896Updated this week
- A malicious LDAP server for JNDI injection attacks☆1,079Sep 28, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,443Jan 19, 2025Updated last year
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆832Aug 4, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,837Dec 4, 2025Updated 4 months ago
- Adversary Emulation Framework☆10,986Updated this week
- The ultimate WinRM shell for hacking/pentesting☆5,339Mar 10, 2026Updated last month
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,988Jul 12, 2024Updated last year
- Remote Code Injection In Log4j☆471Jan 18, 2022Updated 4 years ago
- Trying to tame the three-headed dog.☆4,960Nov 14, 2025Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,854Apr 8, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Deserialization payload generator for a variety of .NET formatters☆3,706Dec 23, 2024Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆2,219Sep 10, 2020Updated 5 years ago
- The Havoc Framework☆8,274Dec 18, 2025Updated 3 months ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Feb 25, 2023Updated 3 years ago
- An OOB interaction gathering server and client library☆4,272Apr 6, 2026Updated last week
- Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CV…☆85Apr 7, 2024Updated 2 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,126Mar 8, 2022Updated 4 years ago