xforcered / scan4log4shellLinks
A Burp Pro extension that adds log4shell checks to Burp Scanner.
☆27Updated 3 years ago
Alternatives and similar repositories for scan4log4shell
Users that are interested in scan4log4shell are comparing it to the libraries listed below
Sorting:
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last week
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆48Updated 8 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated last year
- Dynamic Labs is an open source tool aimed at red teamers and pentesters for the quick deployment of flexible, transient and cloud-hosted …☆61Updated last year
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- ☆54Updated 4 years ago
- ☆70Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Commands used in Windows penetration tests☆54Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Various scripts and codes☆84Updated 4 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- Python Script for SAML2 Authentication Passwordspray☆41Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- ☆16Updated 4 years ago