snyk-labs / awesome-log4shell
An Awesome List of Log4Shell resources to help you stay informed and secure! ๐
โ222Updated 2 years ago
Related projects: โ
- โ554Updated 3 years ago
- Awesome resources about Security in Kubernetesโ40Updated last year
- Purposely vulnerable Java application to help lead secure coding workshopsโ164Updated 2 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use โฆโ58Updated 3 months ago
- Hashes for vulnerable LOG4J versionsโ154Updated 2 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta โฆโ261Updated last year
- oauth security guidelinesโ218Updated 5 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.โ417Updated 11 months ago
- OWASP Foundation Web Respositoryโ79Updated 2 weeks ago
- Curated list of security toolsโ57Updated 8 months ago
- Damn Vulnerable Java (EE) Applicationโ129Updated 7 months ago
- Log4Shell scanner for Burp Suiteโ481Updated 11 months ago
- Damn Vulnerable Cloud Applicationโ183Updated 6 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share thโฆโ185Updated 3 years ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.โ667Updated 11 months ago
- Tools to assess DNS security.โ146Updated 6 months ago
- A utility to convert your AWS CLI credentials into AWS console access.โ212Updated 4 years ago
- A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.โ126Updated 2 years ago
- OWASP Code Review Guide Web Repositoryโ119Updated 2 years ago
- โ230Updated last week
- OWASP Foundation Threat Dragon Project Web Repositoryโ68Updated last week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently โฆโ242Updated last month
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ142Updated 3 years ago
- โ207Updated this week
- Burp Suite Extension useful to verify OAUTHv2 and OpenID securityโ183Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.โ220Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.โ132Updated 4 years ago
- A curated list of security tools for Hackers & Builders!โ98Updated last month
- โ394Updated last year
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logsโ293Updated 2 years ago