redhuntlabs / Log4JHuntLinks
An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.
☆43Updated 6 months ago
Alternatives and similar repositories for Log4JHunt
Users that are interested in Log4JHunt are comparing it to the libraries listed below
Sorting:
- A "Spring4Shell" vulnerability scanner.☆49Updated 6 months ago
- ☆38Updated 4 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- ☆48Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- ☆19Updated 4 years ago
- ☆38Updated 4 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Updated 3 years ago
- A BurpSuite plugin for BBRF☆25Updated 8 months ago
- Python script to launch burp scans automatically☆32Updated 4 years ago
- security.txt collection of most popular world-wide domains☆54Updated last year
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Updated 3 years ago
- Return domains in CSP headers in http response☆15Updated 3 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Updated 4 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆29Updated 3 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆45Updated last year
- A simple tool which makes creating nuclei templates even easier.☆37Updated last year
- Related subdomains finder☆29Updated 3 years ago
- ☆26Updated 3 years ago
- ☆23Updated 3 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 3 months ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 4 years ago
- ☆52Updated 9 months ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago