mubix / CVE-2021-44228-Log4Shell-Hashes
Hashes for vulnerable LOG4J versions
☆154Updated 3 years ago
Alternatives and similar repositories for CVE-2021-44228-Log4Shell-Hashes:
Users that are interested in CVE-2021-44228-Log4Shell-Hashes are comparing it to the libraries listed below
- ☆160Updated last year
- ☆134Updated last year
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- A Docker container for remote penetration testing.☆135Updated 4 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆39Updated 2 weeks ago
- ☆151Updated 3 years ago
- ☆172Updated last year
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆138Updated 2 years ago
- ☆68Updated last year
- Red Team C2 Infrastructure built in AWS using Ansible!☆226Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 7 months ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆65Updated 4 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Tools and scripts by Arctic Wolf☆67Updated 11 months ago
- Find exposed data in Azure with this public blob scanner☆329Updated 8 months ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆165Updated 5 months ago
- Build a attack range in your local machine☆130Updated last year
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆149Updated 3 years ago
- Parse .nessus file(s) and shows output in interactive UI☆150Updated 11 months ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- Pwnspoof repository☆258Updated last year
- Atomic Purple Team Framework and Lifecycle☆292Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated last year