A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner
☆14Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for log4shell_sentinel
Users that are interested in log4shell_sentinel are comparing it to the libraries listed below
Sorting:
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- BBT - Bug Bounty Tools☆18Apr 5, 2024Updated last year
- 一个集和多线程 批量验证 poc验证 存活测试 备份文件探测 后台探测 渗透测试框架。☆18May 8, 2022Updated 3 years ago
- 某免杀webshell☆19Oct 10, 2023Updated 2 years ago
- 一个简单的指纹识别小工具☆21Oct 23, 2023Updated 2 years ago
- CVE-2022-22965 - CVE-2010-1622 redux☆19Apr 18, 2023Updated 2 years ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- 代码垃圾的缝合怪扫描器☆20May 28, 2021Updated 4 years ago
- 海康威视iVMS 综合安防任意文件上传 漏洞使用exp☆24Jun 13, 2023Updated 2 years ago
- Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用☆23Apr 15, 2022Updated 3 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Pocsuite3 For CVE-2021-22205☆86Oct 28, 2021Updated 4 years ago
- Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSC…☆33Jan 16, 2026Updated last month
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- TEAM Mentor 3.x Released Code☆16Aug 5, 2016Updated 9 years ago
- Some scripts to support with importing large datasets into BloodHound☆82Nov 28, 2023Updated 2 years ago
- 金蝶云星空 erp反序列化命令执行漏洞批量扫描POC&EXP,带命令回显☆33Jul 20, 2023Updated 2 years ago
- 个人翻译/总结渗透测试思维导图☆29Jun 15, 2022Updated 3 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- CVE-2021-4034简单优化,以应对没有安装gcc和make的目标环境☆80Feb 9, 2022Updated 4 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Jun 28, 2022Updated 3 years ago
- Vulnerabilities, exploits, and PoCs☆37Jan 16, 2026Updated last month
- CVE-2021-44228,log4j2 burp插件 Java版本,dnslog选取了非dnslog.cn域名☆32Dec 11, 2021Updated 4 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- Packet Construction Set☆10Nov 20, 2017Updated 8 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- ☆10May 12, 2022Updated 3 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell☆11Apr 18, 2022Updated 3 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- DEScrypt CPU Collision Cracker☆51Apr 14, 2019Updated 6 years ago
- Smart contract for Pandora - A next-gen community-owned DEX☆11Aug 2, 2024Updated last year
- 子域名收集和整理脚本、配合Oneforall食用更佳☆11May 10, 2020Updated 5 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Feb 20, 2026Updated last week