snyk-labs / awesome-log4shell
An Awesome List of Log4Shell resources to help you stay informed and secure! ๐
โ228Updated 2 years ago
Alternatives and similar repositories for awesome-log4shell:
Users that are interested in awesome-log4shell are comparing it to the libraries listed below
- Awesome resources about Security in Kubernetesโ42Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.โ425Updated last year
- OWASP Code Review Guide Web Repositoryโ132Updated 2 years ago
- OWASP Foundation Web Respositoryโ82Updated 2 months ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Contaโฆโ268Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderโ138Updated 3 years ago
- โ124Updated 8 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.โ134Updated 4 years ago
- Hashes for vulnerable LOG4J versionsโ154Updated 3 years ago
- oauth security guidelinesโ222Updated 5 years ago
- Purposely vulnerable Java application to help lead secure coding workshopsโ179Updated 9 months ago
- Finding exposed secrets and personal data in GitLabโ197Updated 4 months ago
- This repository contain any information that can be used to hack Kubernetesโ98Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID securityโ171Updated 5 months ago
- An AWS IAM policy statement parser and query tool.โ174Updated last year
- boostsecurityio/lotpโ116Updated 2 weeks ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessionsโ104Updated last year
- โ134Updated last year
- A pre-DDoS security assessment toolโ120Updated 3 years ago
- โ559Updated 3 years ago
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ156Updated 3 years ago
- OWASP Foundation Web Respositoryโ44Updated 6 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use โฆโ66Updated 9 months ago
- Holds the public Hacking the Cloud CTFs.โ55Updated last year
- Scan DockerHub images that match a keyword to find secrets.โ55Updated 4 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityโ64Updated last year
- Tool to discover external and internal network attack surfaceโ195Updated 10 months ago
- PatrowlHears - Vulnerability Intelligence Center / Exploitsโ162Updated this week
- Static code analysis tool based on Elasticsearchโ129Updated 4 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Muโฆโ221Updated 4 years ago