pedrohavay / exploit-CVE-2021-44228
This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).
☆20Updated 3 years ago
Alternatives and similar repositories for exploit-CVE-2021-44228
Users that are interested in exploit-CVE-2021-44228 are comparing it to the libraries listed below
Sorting:
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- A rogue DNS detector☆23Updated last year
- ☆47Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆67Updated 5 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.☆20Updated 4 years ago
- Python resource library for creating security related tooling☆79Updated 10 months ago
- Sp00fer blog post -☆26Updated 2 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- ☆10Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆92Updated 3 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 5 months ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- ☆11Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 5 months ago