kozmer / log4j-shell-pocLinks
A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
☆1,833Updated last year
Alternatives and similar repositories for log4j-shell-poc
Users that are interested in log4j-shell-poc are comparing it to the libraries listed below
Sorting:
- Codebase to generate an msdt-follina payload☆1,623Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,419Updated 2 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆924Updated 3 years ago
- ☆2,080Updated 3 years ago
- A malicious LDAP server for JNDI injection attacks☆1,040Updated last year
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆945Updated 3 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,118Updated last year
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Updated 2 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Updated 3 years ago
- Fancy reverse and bind shell handler☆2,757Updated 9 months ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,104Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,042Updated last month
- log4j rce test environment and poc☆311Updated 3 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆685Updated 3 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,897Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,774Updated 2 years ago
- An OOB interaction gathering server and client library☆3,790Updated last week
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,616Updated 2 weeks ago
- Monitor linux processes without root permissions☆5,460Updated 2 years ago
- Linux privilege escalation auditing tool☆5,972Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,401Updated 7 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,942Updated last year
- PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)☆1,084Updated 2 years ago
- ☆978Updated 4 years ago
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,711Updated 2 years ago
- ☆3,528Updated 4 months ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆807Updated last year
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,219Updated 2 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆5,906Updated last month
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,379Updated last year