yahoo / check-log4jLinks
To determine if a host is vulnerable to log4j CVE‐2021‐44228
☆172Updated 2 years ago
Alternatives and similar repositories for check-log4j
Users that are interested in check-log4j are comparing it to the libraries listed below
Sorting:
- ☆363Updated 2 years ago
- Simple local scanner for applications containing vulnerable Spring libraries☆127Updated 3 years ago
- ☆170Updated 7 months ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x "JNDI LDAP" vulnerability.☆71Updated 3 years ago
- An Awesome List of Log4Shell resources to help you stay informed and secure! 🔒☆232Updated 3 years ago
- A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.☆127Updated 3 years ago
- ☆207Updated last year
- Static security checker for Dockerfiles☆95Updated last year
- Tools for investigating Log4j CVE-2021-44228☆94Updated 3 years ago
- ☆41Updated 3 years ago
- A tool that scans archives to check for vulnerable log4j versions☆197Updated this week
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆301Updated last week
- OWASP Application Gateway is an HTTP proxy that handles Oauth2 authentication and session management☆84Updated 4 months ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆353Updated 3 years ago
- CLI component of OWASP PurpleTeam☆131Updated last year
- CVSS (Common Vulnerability Scoring System) v3.1 Javascript calculator toolkit☆66Updated last year
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆120Updated last year
- ☆37Updated 3 months ago
- Curated list of security tools☆67Updated last year
- Finding exposed secrets and personal data in GitLab☆200Updated 10 months ago
- ☆570Updated 2 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆157Updated last year
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆70Updated 2 years ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆84Updated 2 years ago
- Simple local scanner for vulnerable log4j instances☆375Updated 3 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- ☆58Updated 3 years ago