pedrohavay / exploit-CVE-2021-44228Links
This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).
☆20Updated 3 years ago
Alternatives and similar repositories for exploit-CVE-2021-44228
Users that are interested in exploit-CVE-2021-44228 are comparing it to the libraries listed below
Sorting:
- ☆11Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆74Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 8 months ago
- ☆101Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated this week
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Updated 3 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆151Updated 3 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆81Updated 2 months ago
- Windows offline filesystem hacking tool for Linux☆97Updated 3 years ago
- Transform your batch (bat) script into one binary.exe☆52Updated last year
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆53Updated 2 months ago
- A productivity burp extension which reminds to take break while you are at work!☆17Updated 5 years ago
- ☆80Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Some random tools I use for penetration testing☆91Updated 4 months ago