☆19Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for get-log4j-exploit-payload
Users that are interested in get-log4j-exploit-payload are comparing it to the libraries listed below
Sorting:
- ☆14Mar 30, 2022Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- A native DNS MX query tool for DNS mail record resolver written in C# without package dependencies☆12May 31, 2022Updated 3 years ago
- PoC's and Slides from 'Gophers, whales and.. clouds? Oh my!' BSides Wellington presentation by Glenn 'devalias' Grant☆17Mar 3, 2018Updated 7 years ago
- Scans the typos of candidate election pages for typosquatters☆18Oct 25, 2018Updated 7 years ago
- ☆18Nov 6, 2016Updated 9 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- DShield Sensor Log Collection with ELK☆45Feb 16, 2026Updated last week
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- ☆11Feb 21, 2016Updated 10 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 6 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- Download domain data from the Centralized Zone Database Service☆18May 17, 2025Updated 9 months ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 6 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- Valley of Concordia video game, based upon the Flare Engine☆15Dec 2, 2014Updated 11 years ago
- A Dependently Typed Esolang☆10Aug 4, 2017Updated 8 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆12Feb 6, 2023Updated 3 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- you idiots☆11Oct 30, 2024Updated last year
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Windows CIFS/SMB packet generation and SMB networking library☆12Aug 25, 2020Updated 5 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Jupyter client☆15Jul 12, 2025Updated 7 months ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- A web app for your finances☆12May 24, 2020Updated 5 years ago
- ☆10Nov 24, 2018Updated 7 years ago