mubix / CVE-2021-44228-Log4Shell-HashesLinks
Hashes for vulnerable LOG4J versions
☆156Updated 4 years ago
Alternatives and similar repositories for CVE-2021-44228-Log4Shell-Hashes
Users that are interested in CVE-2021-44228-Log4Shell-Hashes are comparing it to the libraries listed below
Sorting:
- ☆192Updated 2 months ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 4 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆163Updated 4 years ago
- Active Directory Lab for Penetration Testing☆54Updated 6 months ago
- nse script to inject jndi payloads☆46Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆259Updated 3 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 9 months ago
- Parse .nessus file(s) and shows output in interactive UI☆163Updated last month
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Tools for investigating Log4j CVE-2021-44228☆94Updated 4 years ago
- Find exposed data in Azure with this public blob scanner☆349Updated last year
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆152Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- ☆71Updated 3 weeks ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆140Updated 3 years ago
- Collection of created MindMaps☆151Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Tenable Nessus and Tenable Security Center, and exports results to a spreadshe…☆110Updated 3 weeks ago
- ATTPwn☆216Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- Detections for CVE-2021-44228 inside of nested binaries☆35Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Updated 5 years ago
- Linux Incident Response☆90Updated 6 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- ☆150Updated 4 years ago