A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner
☆14Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for log4shell_sentinel
Users that are interested in log4shell_sentinel are comparing it to the libraries listed below
Sorting:
- yaa - yaml search for humans☆12Dec 8, 2025Updated 3 months ago
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- BBT - Bug Bounty Tools☆18Apr 5, 2024Updated last year
- A fast, folding Markdown outliner for Vim☆34Aug 1, 2024Updated last year
- 一个集和多线程 批量验证 poc验证 存活测试 备份文件探测 后台探测 渗透测试框架。☆18May 8, 2022Updated 3 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- ☆41Mar 13, 2026Updated last week
- ☆15Dec 7, 2022Updated 3 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated this week
- 代码垃圾的缝合怪扫描器☆20May 28, 2021Updated 4 years ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- 一个简单的指纹识别小工具☆21Oct 23, 2023Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- 海康威视iVMS 综合安防任意文件上传 漏洞使用exp☆24Jun 13, 2023Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Nov 28, 2023Updated 2 years ago
- CVE-2022-22965 - CVE-2010-1622 redux☆19Apr 18, 2023Updated 2 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Jun 28, 2022Updated 3 years ago
- Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用☆23Apr 15, 2022Updated 3 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- Pocsuite3 For CVE-2021-22205☆86Oct 28, 2021Updated 4 years ago
- ☆14Jun 1, 2023Updated 2 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Smart contract for Pandora - A next-gen community-owned DEX☆11Aug 2, 2024Updated last year
- Clone of the original project https://sourceforge.net/projects/sqsh/☆14Dec 8, 2023Updated 2 years ago
- Manage the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.☆13Jul 16, 2025Updated 8 months ago
- Packet Construction Set☆10Nov 20, 2017Updated 8 years ago
- Get your latitude/longitude via wifi access points☆15Sep 25, 2012Updated 13 years ago
- SCADA Simulator encompassing things from PLCs to devices such as valves, pumps, tanks, etc. and environmental properties such as water pH…☆16Jun 6, 2018Updated 7 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 3 years ago
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 5 years ago