xforcered / scan4log4shellLinks
A Burp Pro extension that adds log4shell checks to Burp Scanner.
☆27Updated 4 years ago
Alternatives and similar repositories for scan4log4shell
Users that are interested in scan4log4shell are comparing it to the libraries listed below
Sorting:
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 5 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- ☆71Updated last week
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- ☆28Updated 4 years ago
- ☆54Updated 4 years ago
- ☆49Updated 4 months ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- ☆15Updated 4 years ago
- Files to automatically deploy red team Active Directory test lab☆48Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Extract credentials from lsass remotely☆16Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Various scripts and codes☆84Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Updated 4 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated last year
- This script is a multi-threaded Okta password sprayer.☆71Updated 2 years ago