A Basic Java Application Vulnerable to the Log4Shell RCE
☆42Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for log4shell-vulnerable-app
Users that are interested in log4shell-vulnerable-app are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- .NET project for installing Persistence☆63Feb 14, 2022Updated 4 years ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 2 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- EmailSecCheck is a lightweight Python utility used to check for common SPF/DMARC misconfigurations that may allow for email spoofing.☆19May 9, 2025Updated 10 months ago
- JAVA Vul Code JAVA常见漏洞与防御代码示例☆10Sep 18, 2018Updated 7 years ago
- CVE-2020-13933 靶场: shiro 认证绕过漏洞☆14Apr 9, 2023Updated 2 years ago
- ☆14Aug 28, 2016Updated 9 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- 收集了java XXE漏洞的demo及修复方式☆19Mar 11, 2024Updated 2 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- Java反序列化漏洞学习☆14Jul 1, 2021Updated 4 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Aug 4, 2021Updated 4 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Jul 5, 2023Updated 2 years ago
- A "no frills" 1 class-only, C# .NET command line parser with support for - and / args, switches only, and Name : Values☆34Jan 20, 2026Updated 2 months ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- ☆39May 20, 2023Updated 2 years ago
- All things specific to LLM Red Teaming Generative AI☆30Oct 22, 2024Updated last year
- cve-2018-2894 不同别人的利用方法。☆15Dec 1, 2025Updated 3 months ago
- ☆12Sep 13, 2023Updated 2 years ago
- Java反序列化漏洞学习笔记☆16Nov 17, 2019Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago