Hashes for vulnerable LOG4J versions
☆155Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-44228-Log4Shell-Hashes
Users that are interested in CVE-2021-44228-Log4Shell-Hashes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detections for CVE-2021-44228 inside of nested binaries☆35Dec 18, 2021Updated 4 years ago
- ☆57Dec 16, 2021Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Dec 12, 2021Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- ☆2,077Dec 13, 2021Updated 4 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,142Apr 26, 2024Updated last year
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Dec 21, 2021Updated 4 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,434Nov 23, 2022Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆23Jul 26, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Standardizing Security Titles☆23Apr 9, 2026Updated last week
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- ☆54Jun 1, 2024Updated last year
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- A Cribl API wrapper written for Python. Import it into your application to do Cribl things!☆12Mar 20, 2024Updated 2 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 2 months ago
- Documentation on the Cyber Defense Matrix☆25Apr 19, 2023Updated 2 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆2,397Oct 14, 2023Updated 2 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Dec 9, 2022Updated 3 years ago
- Trying to tame the three-headed dog.☆4,960Nov 14, 2025Updated 5 months ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,399Dec 16, 2021Updated 4 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- A malicious LDAP server for JNDI injection attacks☆1,079Sep 28, 2023Updated 2 years ago