#CVE-2021
Detections for CVE-2021-44228 inside of nested binaries
https://github.com/darkarnium/CVE-2021-44228
@BlueRedTeam
Detections for CVE-2021-44228 inside of nested binaries
https://github.com/darkarnium/CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - darkarnium/Log4j-CVE-Detect: Detections for CVE-2021-44228 inside of nested binaries
Detections for CVE-2021-44228 inside of nested binaries - darkarnium/Log4j-CVE-Detect
#CVE-2021
#Log4j
Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information
https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept
@BlueRedTeam
#Log4j
Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information
https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept
@BlueRedTeam
GitHub
GitHub - HyCraftHD/Log4J-RCE-Proof-Of-Concept: Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information
Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information - HyCraftHD/Log4J-RCE-Proof-Of-Concept
#CVE-2021
This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).
https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798
@BlueRedTeam
This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).
https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798
@BlueRedTeam
GitHub
GitHub - pedrohavay/exploit-grafana-CVE-2021-43798: This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File…
This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798). - pedrohavay/exploit-grafana-CVE-2021-43798
#CVE-2021
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
https://github.com/cube0x0/noPac
@BlueRedTeam
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
https://github.com/cube0x0/noPac
@BlueRedTeam
GitHub
GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. - cube0x0/noPac
#CVE-2021
#Log4Shell
Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.
https://github.com/christophetd/log4shell-vulnerable-app
@BlueRedTeam
#Log4Shell
Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.
https://github.com/christophetd/log4shell-vulnerable-app
@BlueRedTeam
GitHub
GitHub - christophetd/log4shell-vulnerable-app: Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).
Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228). - christophetd/log4shell-vulnerable-app
#CVE-2021
This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device
https://github.com/irgoncalves/f5-waf-enforce-sigs-CVE-2021-44228
@BlueRedTeam
This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device
https://github.com/irgoncalves/f5-waf-enforce-sigs-CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - irgoncalves/f5-waf-enforce-sig-CVE-2021-44228: This enforces signatures for CVE-2021-44228 across all policies on a BIG…
This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device - GitHub - irgoncalves/f5-waf-enforce-sig-CVE-2021-44228: This enforces signatures for CVE-2021-44228 across a...
#CVE-2021
This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device
https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228
@BlueRedTeam
This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device
https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - irgoncalves/f5-waf-enforce-sig-CVE-2021-44228: This enforces signatures for CVE-2021-44228 across all policies on a BIG…
This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device - irgoncalves/f5-waf-enforce-sig-CVE-2021-44228
#CVE-2021
docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228
https://github.com/jeffbryner/log4j-docker-vaccine
@BlueRedTeam
docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228
https://github.com/jeffbryner/log4j-docker-vaccine
@BlueRedTeam
GitHub
GitHub - jeffbryner/log4j-docker-vaccine: docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE…
docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228 - GitHub - jeffbryner/log4j-docker-vaccine: docker compose solution to run a vaccine environment for...
#CVE-2021
#Log4j2
Apache Log4j2 CVE-2021-44228 RCE
https://github.com/mzlogin/CVE-2021-44228-Demo
@BlueRedTeam
#Log4j2
Apache Log4j2 CVE-2021-44228 RCE
https://github.com/mzlogin/CVE-2021-44228-Demo
@BlueRedTeam
GitHub
GitHub - mzlogin/CVE-2021-44228-Demo: Apache Log4j2 CVE-2021-44228 RCE Demo with RMI and LDAP
Apache Log4j2 CVE-2021-44228 RCE Demo with RMI and LDAP - GitHub - mzlogin/CVE-2021-44228-Demo: Apache Log4j2 CVE-2021-44228 RCE Demo with RMI and LDAP
#CVE-2021
#Log4j
Script to patch VMware vCenter log4j vulnerability CVE-2021-44228
https://github.com/blake-fm/vcenter-log4j
@BlueRedTeam
#Log4j
Script to patch VMware vCenter log4j vulnerability CVE-2021-44228
https://github.com/blake-fm/vcenter-log4j
@BlueRedTeam
GitHub
GitHub - blake-fm/vcenter-log4j: Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228
Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228 - blake-fm/vcenter-log4j
#CVE-2021
An All-In-One Pure Python PoC for CVE-2021-44228
https://github.com/alexandre-lavoie/python-log4rce
@BlueRedTeam
An All-In-One Pure Python PoC for CVE-2021-44228
https://github.com/alexandre-lavoie/python-log4rce
@BlueRedTeam
GitHub
GitHub - alexandre-lavoie/python-log4rce: An All-In-One Pure Python PoC for CVE-2021-44228
An All-In-One Pure Python PoC for CVE-2021-44228. Contribute to alexandre-lavoie/python-log4rce development by creating an account on GitHub.
👍1
#CVE-2021
h2-jdbc(https://github.com/h2database/h2database/issues/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.
https://github.com/SecCoder-Security-Lab/jdbc-sqlxml-xxe
@BlueRedTeam
h2-jdbc(https://github.com/h2database/h2database/issues/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.
https://github.com/SecCoder-Security-Lab/jdbc-sqlxml-xxe
@BlueRedTeam
GitHub
Report a H2-Database-Engine SQLXML XXE vulnerability · Issue #3195 · h2database/h2database
Hello, I am threedr3am of SecCoder Security Lab (contact@seccoder.club). We found a security vulnerability(SCSL-2021-1001) in the H2-Database-Engine jar when using this component to connect to the ...
#RedTeam
#Splunk
Splunk Forwarder Setup for Red Team Infrastructure Logging
https://github.com/OS-talalbalouch/red_forward
@BlueRedTeam
#Splunk
Splunk Forwarder Setup for Red Team Infrastructure Logging
https://github.com/OS-talalbalouch/red_forward
@BlueRedTeam
cph_1.4.pdf
4.7 MB
#RedTeam
The Cyber Plumber's Handbook (2018) -
The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic
]-> https://github.com/opsdisk/the_cyber_plumbers_handbook
@BlueRedTeam
The Cyber Plumber's Handbook (2018) -
The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic
]-> https://github.com/opsdisk/the_cyber_plumbers_handbook
@BlueRedTeam
#BlueTeam
#Blue_Team
ActiveScan++ extends Burp Suite's active and passive scanning capabilities
https://github.com/PortSwigger/active-scan-plus-plus
]-> Log4Shell (CVE-2021-44228) detection to ActiveScan++:
https://github.com/PortSwigger/active-scan-plus-plus/blob/master/activeScan++.py
]-> Log4j Analysis:
https://y4y.space/2021/12/10/log4j-analysis-more-jndi-injection
@BlueRedTeam
#Blue_Team
ActiveScan++ extends Burp Suite's active and passive scanning capabilities
https://github.com/PortSwigger/active-scan-plus-plus
]-> Log4Shell (CVE-2021-44228) detection to ActiveScan++:
https://github.com/PortSwigger/active-scan-plus-plus/blob/master/activeScan++.py
]-> Log4j Analysis:
https://y4y.space/2021/12/10/log4j-analysis-more-jndi-injection
@BlueRedTeam
GitHub
GitHub - PortSwigger/active-scan-plus-plus: ActiveScan++ Burp Suite Plugin
ActiveScan++ Burp Suite Plugin. Contribute to PortSwigger/active-scan-plus-plus development by creating an account on GitHub.
👍1
Hello friends, from now on, the hashtags Red Team and Blue Team will be like this: #Red_Team and #Blue_Team, and you can follow the previous hashtags by searching #RedTeam and #BlueTeam.
@BlueRedTeam
@BlueRedTeam
#CVE-2021
#Log4j2
A bare minimum proof-of-concept of Log4j2 JNDI Remote-Code-Execution vulnerability (CVE-2021-44228).
https://github.com/unlimitedsola/log4j2-rce-poc
@BlueRedTeam
#Log4j2
A bare minimum proof-of-concept of Log4j2 JNDI Remote-Code-Execution vulnerability (CVE-2021-44228).
https://github.com/unlimitedsola/log4j2-rce-poc
@BlueRedTeam
GitHub
GitHub - unlimitedsola/log4j2-rce-poc: A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228/Log4Shell).
A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228/Log4Shell). - GitHub - unlimitedsola/log4j2-rce-poc: A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerabil...
👍1
#CVE-2021
#Log4j
CVE-2021-44228(Apache Log4j Remote Code Execution)
https://github.com/RK800-DEV/apache-log4j-exploit
@BlueRedTeam
#Log4j
CVE-2021-44228(Apache Log4j Remote Code Execution)
https://github.com/RK800-DEV/apache-log4j-exploit
@BlueRedTeam
#CVE-2021
#Log4j
Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process
https://github.com/simonis/Log4jPatch
@BlueRedTeam
#Log4j
Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process
https://github.com/simonis/Log4jPatch
@BlueRedTeam
GitHub
GitHub - simonis/Log4jPatch: Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process
Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process - GitHub - simonis/Log4jPatch: Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a runn...