thecyberneh / Log4j-RCE-Exploiter
Scanner for Log4j RCE CVE-2021-44228
☆11Updated 2 years ago
Alternatives and similar repositories for Log4j-RCE-Exploiter:
Users that are interested in Log4j-RCE-Exploiter are comparing it to the libraries listed below
- ☆12Updated 3 years ago
- Generating Sub-Sub-Subdomain + validating all of them☆10Updated 2 years ago
- Simple recon tool automates your recon process☆16Updated last year
- Automate bug bounty recon using bash alias☆14Updated 7 months ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆19Updated 2 years ago
- ☆21Updated 2 years ago
- ☆14Updated last year
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Updated last year
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆13Updated 11 months ago
- XSS Finder Via SSTI☆54Updated last year
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 2 years ago
- Enhanced 403 bypass header☆21Updated 2 years ago
- List of custom Nuclei templates☆15Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year
- A Burp Extension that makes it easier to view all script code on a Response.☆15Updated last year
- This tool allows you to find ssti vulnerability with ease!☆19Updated 2 years ago
- Automated Recon Tool Installer☆16Updated 2 years ago
- [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner☆14Updated 6 months ago
- offy is a tool for bugbounty hunters to save money in their EC2 instances☆13Updated last year
- ☆43Updated last year
- script python to check url list via cookies and Authorization☆19Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆16Updated 4 years ago
- Burp Suite Extensions☆12Updated 3 years ago
- Passively check for XSS character encodings☆18Updated last year
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 4 months ago
- A solid recon tool I use personally.☆30Updated last year
- A BurpSuite extension for vulnerability Scanning☆26Updated last year
- Find CVEs that don't have a Detectify modules.☆21Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 9 months ago