leonjza / log4jpwnLinks
log4j rce test environment and poc
☆311Updated 3 years ago
Alternatives and similar repositories for log4jpwn
Users that are interested in log4jpwn are comparing it to the libraries listed below
Sorting:
- A malicious LDAP server for JNDI injection attacks☆1,040Updated last year
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆924Updated 3 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Updated 3 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆945Updated 3 years ago
- Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965☆368Updated 2 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆177Updated 3 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,118Updated last year
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- Log4Shell scanner for Burp Suite☆485Updated last year
- Remote command execution vulnerability scanner for Log4j.☆254Updated last year
- WSO2 RCE (CVE-2022-29464) exploit and writeup.☆373Updated 3 years ago
- ☆61Updated 3 years ago
- Generate obfuscated meterpreter shells☆229Updated 3 years ago
- Burpsuite extension for log4j2rce☆28Updated 3 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆384Updated 4 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆399Updated 5 months ago
- Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading☆196Updated 3 years ago
- Log4j jndi injects the Payload generator☆487Updated 3 years ago
- Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit☆312Updated 2 years ago
- Nginx 18.1 04/09/22 zero-day repo☆373Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,019Updated 2 years ago
- ActiveScan++ Burp Suite Plugin☆224Updated 2 weeks ago
- ☆363Updated 2 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆824Updated 3 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆253Updated 2 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- win32k LPE☆460Updated 3 years ago
- ☆281Updated 3 years ago
- ☆217Updated 4 years ago
- Root shell PoC for CVE-2021-3156☆151Updated 3 years ago