mwarnerblu / Log4ShellScannerLinks
Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.
☆59Updated 3 years ago
Alternatives and similar repositories for Log4ShellScanner
Users that are interested in Log4ShellScanner are comparing it to the libraries listed below
Sorting:
- A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.☆127Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Updated 3 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆353Updated 3 years ago
- CVE-2021-1675 Detection Info☆215Updated 2 years ago
- Simple local scanner for applications containing vulnerable Spring libraries☆127Updated 3 years ago
- ☆79Updated 3 years ago
- Log4j Vulnerability Scanner for Windows☆159Updated 3 months ago
- A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.☆160Updated 2 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated last week
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 4 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆157Updated last year
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 7 months ago
- automated password spraying tool☆148Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- Audit Windows Security with best Practice☆185Updated 11 months ago
- Simple local scanner for vulnerable log4j instances☆375Updated 3 years ago
- Password Hunter in Active Directory☆199Updated 2 years ago
- Basic C2 Server☆191Updated 4 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆224Updated 4 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆437Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Updated 2 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆176Updated 3 years ago
- Gophish with Malicious Attachment and HTTP redirect support☆13Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week