psechoPATH / log4shell-vulnerable-appView external linksLinks
Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.
☆25Dec 14, 2021Updated 4 years ago
Alternatives and similar repositories for log4shell-vulnerable-app
Users that are interested in log4shell-vulnerable-app are comparing it to the libraries listed below
Sorting:
- Home Assistant blueprint för belysning med veckoschema och failsafe☆15Sep 20, 2025Updated 4 months ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- Filter.io applies live filters on top of a webcam video stream. Built using MediaPipe Face Mesh library for facial landmark tracking.☆13May 6, 2022Updated 3 years ago
- ☆13Mar 28, 2024Updated last year
- generate facts useful for deployments☆12Jan 16, 2014Updated 12 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- SPA Route Scanner is a Chrome extension that scans Single Page Applications (SPAs) to find and list all internal routes. Instantly discov…☆13Jul 31, 2025Updated 6 months ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆10Jan 7, 2023Updated 3 years ago
- A boilerplate package for BREAD operations through REST API in Laravel☆11Apr 29, 2023Updated 2 years ago
- Aurelia pseudo hashing method is experimental method to hash a password using HMAC, PBKDF2 and Pseudo random.☆13May 3, 2018Updated 7 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Add billing to your app in 5 minutes with Paddle and Kanuu☆12Nov 29, 2020Updated 5 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- A high level IPv6 subnet planner written in go☆26Aug 1, 2025Updated 6 months ago
- This repo is dedicated to store all of programing interview test from a very simple one to a very hardest one, algorithm impmlementation …☆13Jan 25, 2019Updated 7 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Pemrograman bahasa python untuk pemula, dan untuk memahami konsep dari algoritma pemrograman. Note: Materi mata kuliah algoritma & pemrog…☆19Dec 16, 2021Updated 4 years ago
- ☆12Aug 29, 2021Updated 4 years ago
- Ansible script to setup my linux system environment☆11Oct 1, 2025Updated 4 months ago
- Python cross-platform script to upload firmware via the serial boot loader onto the CC13xx, CC2538 and CC26xx SoC.☆12May 30, 2023Updated 2 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- ☆12Jul 27, 2022Updated 3 years ago
- Collection of Utilities and Templates to extend HPE's Intelligent Management Center NMS Platform☆12Sep 19, 2018Updated 7 years ago
- NetBox plugin for documenting Cisco ACI specific objects.☆13Jan 25, 2026Updated 3 weeks ago
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,138Apr 26, 2024Updated last year
- ☆11Mar 7, 2021Updated 4 years ago
- ☆13Jan 11, 2024Updated 2 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher☆13Dec 23, 2021Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago