mubix / CVE-2021-44228-Log4Shell-Hashes
Hashes for vulnerable LOG4J versions
☆153Updated 3 years ago
Alternatives and similar repositories for CVE-2021-44228-Log4Shell-Hashes:
Users that are interested in CVE-2021-44228-Log4Shell-Hashes are comparing it to the libraries listed below
- ☆159Updated last year
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆144Updated 4 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆149Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆149Updated 10 months ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- ☆149Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆225Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 2 years ago
- Find exposed data in Azure with this public blob scanner☆325Updated 7 months ago
- A curated list of awesome BloodhoundAD resources☆232Updated 2 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- Statically Compiled Tools that could be used in engagements☆17Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆189Updated 3 years ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 6 months ago
- NessusV2 File Parser☆66Updated 2 years ago
- Microsoft External Attack Tool☆178Updated 2 years ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆164Updated 3 months ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 3 years ago
- A Docker container for remote penetration testing.☆134Updated 3 years ago
- Collection of created MindMaps☆150Updated last year
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆173Updated 3 years ago
- User enumeration with Microsoft Teams API☆168Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- ☆149Updated last year
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆137Updated 2 years ago