Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher
☆13Dec 23, 2021Updated 4 years ago
Alternatives and similar repositories for log4jshield
Users that are interested in log4jshield are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jan 11, 2024Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- AWS CLI Aliases☆13Updated this week
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆43Sep 21, 2023Updated 2 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated this week
- A Docker image for caddyserver/caddy with the dns.providers.route53 module included☆17Mar 14, 2026Updated last week
- A public api by which you can find some details of any mobile number in india.☆25Jun 6, 2018Updated 7 years ago
- Simple DNS logging server☆20Dec 22, 2021Updated 4 years ago
- A script to install Alfresco Community 6.x and 7.0☆10Aug 3, 2022Updated 3 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- An intermediary between Cloudflare's Argo tunneling service and your local containers/network.☆23Nov 26, 2021Updated 4 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- ☆19Dec 13, 2021Updated 4 years ago
- ❄️ generate a static website from a dynamic one☆12Aug 22, 2018Updated 7 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated last month
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 7 years ago
- Setup https with nginx on docker + certbot in aws ec2☆18Jan 24, 2022Updated 4 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- A Python package to download Zone Files from the Centralized Zone Data Service hosted by ICAAN.☆17Jun 24, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Search for secrets left in git history☆14Sep 22, 2018Updated 7 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- CyberArk Terminal Utility, PowerShell tool that uses REST API to allow terminal access to CyberArk PVWA☆16Oct 16, 2017Updated 8 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- This program can parse C header files to extract the struct/union/enum definitions, and with these definitions to analyse the memory dump…☆22Aug 1, 2013Updated 12 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago