log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services
☆488Feb 25, 2023Updated 3 years ago
Alternatives and similar repositories for log4jScanner
Users that are interested in log4jScanner are comparing it to the libraries listed below
Sorting:
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆350Mar 23, 2022Updated 3 years ago
- ☆171Feb 14, 2025Updated last year
- ☆71Jan 23, 2026Updated last month
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Dec 27, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,437Nov 23, 2022Updated 3 years ago
- Log4j Vulnerability Scanner for Windows☆159Dec 10, 2025Updated 2 months ago
- A community sourced list of log4j-affected software☆1,125Nov 9, 2022Updated 3 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,849Feb 12, 2024Updated 2 years ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Dec 21, 2021Updated 4 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,281Dec 6, 2022Updated 3 years ago
- A tool that scans archives to check for vulnerable log4j versions☆204Feb 24, 2026Updated last week
- Simple local scanner for vulnerable log4j instances☆374Aug 1, 2022Updated 3 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆950Jan 15, 2022Updated 4 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Dec 11, 2024Updated last year
- ☆18Aug 15, 2021Updated 4 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,568Jun 30, 2022Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,041Jul 10, 2022Updated 3 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,889Jun 15, 2022Updated 3 years ago
- To determine if a host is vulnerable to log4j CVE‐2021‐44228☆171Mar 21, 2023Updated 2 years ago
- ☆110Apr 14, 2023Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Sep 4, 2021Updated 4 years ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆830Aug 4, 2023Updated 2 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 5 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- CVE-2021-36798: CobaltStrike < 4.4 Dos☆103Sep 26, 2021Updated 4 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆351Dec 20, 2021Updated 4 years ago
- A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-syst…☆641Mar 10, 2022Updated 3 years ago
- Log4j jndi injects the Payload generator☆486Dec 13, 2021Updated 4 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,698Dec 22, 2021Updated 4 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated 11 months ago
- CVE-2022-24990信息泄露+RCE 一条龙☆39Mar 29, 2022Updated 3 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,128Mar 8, 2022Updated 3 years ago
- Password Hunter in Active Directory☆198Jan 6, 2023Updated 3 years ago
- By write list bypassuac☆172Oct 22, 2021Updated 4 years ago
- A Passive SSH back-end and scanner.☆104Jun 18, 2025Updated 8 months ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year