A Burp Pro extension that adds log4shell checks to Burp Scanner.
☆26Dec 12, 2021Updated 4 years ago
Alternatives and similar repositories for scan4log4shell
Users that are interested in scan4log4shell are comparing it to the libraries listed below
Sorting:
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- This project will provide DevOps automation in the form of snippets, sample apps, and plugins in support of integrating with IBM Applicat…☆12Sep 17, 2025Updated 6 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 5 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- ☆27Apr 22, 2025Updated 10 months ago
- CybOX Tools and Scripts☆44Nov 25, 2013Updated 12 years ago
- ☆18Apr 20, 2022Updated 3 years ago
- Managed code hooking template.☆108Feb 15, 2021Updated 5 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 9 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- A more functional and versatile way to search and filter SEC 4 form filing details (insider trading). Find trades of interest by ticker,…☆10Jan 19, 2022Updated 4 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- OWASP Foundation web repository☆17Oct 11, 2025Updated 5 months ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- SSH Server☆12Nov 20, 2025Updated 4 months ago
- AWS CloudFormation template to set up AWS Config to record only what’s needed for Security Hub.☆13Jul 12, 2023Updated 2 years ago
- Simple web app that can be deployed with Jenkins and AWS code services☆18Mar 20, 2016Updated 10 years ago
- Get a company's financials and stock information using a simple and intuitive API☆12Dec 9, 2022Updated 3 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- ☆16Mar 27, 2024Updated last year
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- ☆12Sep 17, 2020Updated 5 years ago
- A malicious BGP daemon that forces a TCP zero window edge case☆20Apr 21, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- for Windows Malware Analysis☆16May 14, 2020Updated 5 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago