tothi / log4shell-vulnerable-app
A Basic Java Application Vulnerable to the Log4Shell RCE
☆38Updated last year
Related projects ⓘ
Alternatives and complementary repositories for log4shell-vulnerable-app
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆11Updated 4 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆25Updated 2 years ago
- Cisco Unfied Call Manager enumeration☆23Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆19Updated 7 months ago
- ☆29Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- ☆23Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆51Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆16Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆50Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆30Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆28Updated 7 months ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated last year