Hashes for vulnerable LOG4J versions
☆155Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-44228-Log4Shell-Hashes
Users that are interested in CVE-2021-44228-Log4Shell-Hashes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detections for CVE-2021-44228 inside of nested binaries☆35Dec 18, 2021Updated 4 years ago
- ☆57Dec 16, 2021Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Dec 12, 2021Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆727Feb 12, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- ☆2,078Dec 13, 2021Updated 4 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,144Apr 26, 2024Updated 2 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Dec 21, 2021Updated 4 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,430Nov 23, 2022Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆23Jul 26, 2022Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Standardizing Security Titles☆25Apr 19, 2026Updated 3 weeks ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- ☆54Jun 1, 2024Updated last year
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 3 months ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆2,403Oct 14, 2023Updated 2 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Dec 9, 2022Updated 3 years ago
- Trying to tame the three-headed dog.☆4,988Nov 14, 2025Updated 5 months ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,403Dec 16, 2021Updated 4 years ago
- A malicious LDAP server for JNDI injection attacks☆1,080Sep 28, 2023Updated 2 years ago