Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher
☆13Dec 23, 2021Updated 4 years ago
Alternatives and similar repositories for log4jshield
Users that are interested in log4jshield are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Koth - a repository with cheat-sheet Koth in THM (Try Hack Me)☆12Aug 7, 2023Updated 2 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆43Sep 21, 2023Updated 2 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- A public api by which you can find some details of any mobile number in india.☆27Jun 6, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 7 years ago
- ☆14Mar 7, 2023Updated 3 years ago
- A Python package to download Zone Files from the Centralized Zone Data Service hosted by ICAAN.☆17Jun 24, 2025Updated 10 months ago
- Search for secrets left in git history☆14Sep 22, 2018Updated 7 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- Geolocate your files!☆16Jan 7, 2022Updated 4 years ago
- CyberArk Terminal Utility, PowerShell tool that uses REST API to allow terminal access to CyberArk PVWA☆16Oct 16, 2017Updated 8 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- #xss #xssfinder #xss-scanner #bugbounty #hacktool☆34Jan 7, 2024Updated 2 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- This program can parse C header files to extract the struct/union/enum definitions, and with these definitions to analyse the memory dump…☆22Aug 1, 2013Updated 12 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 3 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Puppet Guide☆11Jan 2, 2022Updated 4 years ago