☆62Dec 10, 2021Updated 4 years ago
Alternatives and similar repositories for apache-log4j-rce-poc
Users that are interested in apache-log4j-rce-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- log4j rce test environment and poc☆311Dec 15, 2021Updated 4 years ago
- ☆14Oct 1, 2021Updated 4 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- ☆3,664Jan 9, 2025Updated last year
- EyesOfNetwork 5.1 to 5.3 exploits☆13Mar 5, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆11Jun 26, 2024Updated last year
- A Magento package containing a quick-and-dirty PHP shell.☆20Nov 12, 2014Updated 11 years ago
- AppleScript☆18Jan 9, 2025Updated last year
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆72Dec 21, 2022Updated 3 years ago
- A automate link building tool perfect for front-end development☆13Oct 2, 2017Updated 8 years ago
- A repo to make our changes more transparent to bug bounty researchers in our program (so they can see commits, etc).☆29Mar 18, 2020Updated 6 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- A simple Python 3 script to perform Common Modulus attacks on RSA☆39Dec 17, 2019Updated 6 years ago
- ☆16Mar 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Apache Spark Shell Command Injection Vulnerability☆89Sep 7, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- scrapy website Article and link ...☆15Dec 13, 2020Updated 5 years ago
- ☆245May 19, 2025Updated 10 months ago
- Standalone Yubico validation server☆12Feb 20, 2012Updated 14 years ago
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Nov 17, 2022Updated 3 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆71Aug 14, 2017Updated 8 years ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- Assortment of AWS Lambda functions and CLI based tools for working with AWS.☆20Mar 10, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆31Mar 7, 2026Updated 2 weeks ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 5 months ago
- ☆13Feb 26, 2021Updated 5 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Check passwords and hashes against the haveibeenpwned.com Pwned Passwords API using PowerShell☆19Feb 15, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆57Oct 2, 2022Updated 3 years ago
- Code and notes for books I've read☆19Apr 11, 2023Updated 2 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago