ssstonebraker / log4j-scan-turboLinks
Multithreaded log4j vulnerability scanner using only bash! Tests all JNDI protocols, HTTP GET/POST, and 84 headers.
☆27Updated 3 years ago
Alternatives and similar repositories for log4j-scan-turbo
Users that are interested in log4j-scan-turbo are comparing it to the libraries listed below
Sorting:
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆256Updated last year
- ☆190Updated 3 weeks ago
- Tools and scripts by Arctic Wolf☆69Updated 3 months ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆198Updated 3 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- BlueHound - pinpoint the security issues that actually matter☆753Updated 2 years ago
- Password Hunter in Active Directory☆198Updated 2 years ago
- Course repository for PowerShell for Pentesters Course☆432Updated 3 years ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆406Updated last year
- High signal information security sources Goggle.☆67Updated 2 years ago
- SMBeagle - Fileshare auditing tool.☆730Updated 2 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆476Updated last year
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Updated 3 years ago
- ☆806Updated 3 months ago
- AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic pic…☆204Updated 9 months ago
- Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!☆888Updated last year
- Collection of tools that reflect the network dimension into Bloodhound's data☆443Updated 3 years ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆724Updated 3 months ago
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- ☆615Updated 2 years ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆408Updated 8 months ago
- Find exposed data in Azure with this public blob scanner☆343Updated last year
- CrowdStrike Archive Scan Tool☆85Updated 3 years ago
- ☆57Updated 3 years ago
- A Log4j writeup and Docker based PoC written in PowerShell☆76Updated last year
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- ☆434Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆78Updated 3 years ago