A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
☆1,852Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for log4j-shell-poc
Users that are interested in log4j-shell-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,430Nov 23, 2022Updated 3 years ago
- log4j rce test environment and poc☆311Dec 15, 2021Updated 4 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Dec 20, 2021Updated 4 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,144Apr 26, 2024Updated 2 years ago
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆72Dec 21, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆952Jan 15, 2022Updated 4 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,886Jun 15, 2022Updated 3 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Dec 27, 2022Updated 3 years ago
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,800Mar 22, 2023Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆939Sep 2, 2025Updated 8 months ago
- Apache Log4j 远程代码执行☆90May 14, 2023Updated 2 years ago
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆496Oct 24, 2022Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,817Updated this week
- ☆3,682Jan 9, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Impacket is a collection of Python classes for working with network protocols.☆15,691Updated this week
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,318Aug 20, 2024Updated last year
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Dec 16, 2021Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆727Feb 12, 2022Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,055Jul 10, 2022Updated 3 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,199Apr 29, 2026Updated last week
- A malicious LDAP server for JNDI injection attacks☆1,080Sep 28, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,455Jan 19, 2025Updated last year
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆831Aug 4, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,871Dec 4, 2025Updated 5 months ago
- Adversary Emulation Framework☆11,160Updated this week
- The ultimate WinRM shell for hacking/pentesting☆5,370Mar 10, 2026Updated last month
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,999Jul 12, 2024Updated last year
- Remote Code Injection In Log4j☆471Jan 18, 2022Updated 4 years ago
- Trying to tame the three-headed dog.☆4,988Nov 14, 2025Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,442Apr 22, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Deserialization payload generator for a variety of .NET formatters☆3,726Dec 23, 2024Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆2,240Sep 10, 2020Updated 5 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆490Feb 25, 2023Updated 3 years ago
- Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information☆182Dec 16, 2021Updated 4 years ago
- The Havoc Framework☆8,328Dec 18, 2025Updated 4 months ago
- An OOB interaction gathering server and client library☆4,306Updated this week
- Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CV…☆85Apr 7, 2024Updated 2 years ago