tothi / log4shell-vulnerable-appLinks
A Basic Java Application Vulnerable to the Log4Shell RCE
☆41Updated 2 years ago
Alternatives and similar repositories for log4shell-vulnerable-app
Users that are interested in log4shell-vulnerable-app are comparing it to the libraries listed below
Sorting:
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆72Updated 4 months ago
- Right-To-Left Override POC☆35Updated 3 years ago
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- ☆23Updated 3 years ago
- ☆36Updated 5 years ago
- ☆42Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- ☆52Updated last year
- A Visual Studio Code Extension agent for Mythic C2☆71Updated 9 months ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆26Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 3 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- RDP Checker☆63Updated last year
- ☆33Updated 5 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Updated 2 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆24Updated 3 years ago