takito1812 / log4j-detect
Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading
☆194Updated 2 years ago
Related projects: ⓘ
- Full Nuclei automation script with logic explanation.☆230Updated 2 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆382Updated 4 months ago
- Text4Shell scanner for Burp Suite☆190Updated last year
- Build your own reconnaissance system with Osmedeus Next Generation☆177Updated 3 months ago
- ☆312Updated last week
- Http request smuggling vulnerability scanner☆223Updated 2 years ago
- Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965☆357Updated last year
- Log4Shell scanner for Burp Suite☆481Updated 11 months ago
- Web dashboard for Interactsh client☆188Updated this week
- ☆162Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆333Updated last year
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆121Updated 4 months ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆287Updated last year
- Automated learning of regexes for DNS discovery☆350Updated last year
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆169Updated 3 years ago
- Nuclei templates written by us.☆264Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆258Updated last year
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- RCE exploit for dompdf☆175Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆175Updated 2 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆445Updated 2 years ago
- Make URL path combinations using a wordlist☆170Updated 11 months ago
- Hidden parameters discovery suite☆220Updated last year
- ☆282Updated 2 years ago
- Local File Inclusion discovery and exploitation tool☆210Updated last month
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆287Updated last year
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆98Updated 4 months ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆256Updated 2 years ago
- Burpsuite plugin for Interact.sh☆197Updated 2 months ago
- Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.☆140Updated 8 months ago