Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.
☆25Dec 14, 2021Updated 4 years ago
Alternatives and similar repositories for log4shell-vulnerable-app
Users that are interested in log4shell-vulnerable-app are comparing it to the libraries listed below
Sorting:
- CVE-2022-26809 PoC☆24Apr 13, 2022Updated 3 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- ☆13Mar 28, 2024Updated last year
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆10Jan 7, 2023Updated 3 years ago
- SPA Route Scanner is a Chrome extension that scans Single Page Applications (SPAs) to find and list all internal routes. Instantly discov…☆13Jul 31, 2025Updated 7 months ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- A repository showcasing Computer Engineering courses at Shahid Chamran University of Ahvaz, featuring organized information related to ea…☆11Apr 11, 2025Updated 10 months ago
- Check if your server satisfies all the requirements to run the specific Laravel version.☆13Jun 20, 2019Updated 6 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- ☆11Oct 27, 2021Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- Interactive setup wizard for dnstm — automated DNS-based network configuration☆97Updated this week
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- ☆12Aug 29, 2021Updated 4 years ago
- ☆12Jul 27, 2022Updated 3 years ago
- Pemrograman bahasa python untuk pemula, dan untuk memahami konsep dari algoritma pemrograman. Note: Materi mata kuliah algoritma & pemrog…☆19Dec 16, 2021Updated 4 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- ☆11Mar 7, 2021Updated 5 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- ☆13Jan 11, 2024Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- Scanner for CVE-2022-22948 an Information Disclosure in VMWare vCenter☆12May 9, 2023Updated 2 years ago
- Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher☆13Dec 23, 2021Updated 4 years ago
- ☆15Jan 2, 2019Updated 7 years ago
- Windows process injection methods☆18Jul 18, 2021Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- نمونه سوالات و پاسخ های مصاحبه تیم قرمز☆18Aug 29, 2023Updated 2 years ago
- ☆14Oct 12, 2021Updated 4 years ago
- Simple Telegram Bot without using library !☆11Jul 23, 2024Updated last year
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆38Feb 27, 2026Updated last week