pedrohavay / exploit-CVE-2021-44228Links
This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).
☆20Updated 3 years ago
Alternatives and similar repositories for exploit-CVE-2021-44228
Users that are interested in exploit-CVE-2021-44228 are comparing it to the libraries listed below
Sorting:
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 7 months ago
- Pentest stuff☆49Updated last year
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- ☆47Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆88Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Various scripts and codes☆84Updated 4 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- CVE-2021-40444 Sample☆12Updated 3 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 4 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆17Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆129Updated 4 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- windows tiny reverse shell☆26Updated 3 years ago
- ☆11Updated last year
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆53Updated last month
- ☆101Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago