#CVE-2021
#log4j
Demonstration of CVE-2021-44228 with a possible strategic fix.
https://github.com/strawhatasif/log4j-test
@BlueRedTeam
#log4j
Demonstration of CVE-2021-44228 with a possible strategic fix.
https://github.com/strawhatasif/log4j-test
@BlueRedTeam
GitHub
GitHub - strawhatasif/log4j-test: Demonstration of CVE-2021-44228 with a possible strategic fix.
Demonstration of CVE-2021-44228 with a possible strategic fix. - GitHub - strawhatasif/log4j-test: Demonstration of CVE-2021-44228 with a possible strategic fix.
#CVE-2021
#Log4Shell
Nmap Log4Shell NSE noscript for discovery Apache Log4j RCE (CVE-2021-44228)
https://github.com/giterlizzi/nmap-log4shell
@BlueRedTeam
#Log4Shell
Nmap Log4Shell NSE noscript for discovery Apache Log4j RCE (CVE-2021-44228)
https://github.com/giterlizzi/nmap-log4shell
@BlueRedTeam
GitHub
GitHub - giterlizzi/nmap-log4shell: Nmap Log4Shell NSE noscript for discovery Apache Log4j RCE (CVE-2021-44228)
Nmap Log4Shell NSE noscript for discovery Apache Log4j RCE (CVE-2021-44228) - giterlizzi/nmap-log4shell
#CVE-2021
#log4j
#log4Shell
A micro lab for CVE-2021-44228 (log4j)
https://github.com/tasooshi/horrors-log4shell
@BlueRedTeam
#log4j
#log4Shell
A micro lab for CVE-2021-44228 (log4j)
https://github.com/tasooshi/horrors-log4shell
@BlueRedTeam
GitHub
GitHub - tasooshi/horrors-log4shell: A micro lab for CVE-2021-44228 (log4j)
A micro lab for CVE-2021-44228 (log4j). Contribute to tasooshi/horrors-log4shell development by creating an account on GitHub.
#CVE-2021
#log4j
CVE-2021-44228 - Apache log4j RCE quick test
https://github.com/jeffli1024/log4j-rce-test
@BlueRedTeam
#log4j
CVE-2021-44228 - Apache log4j RCE quick test
https://github.com/jeffli1024/log4j-rce-test
@BlueRedTeam
GitHub
GitHub - jeffli1024/log4j-rce-test: CVE-2021-44228 - Apache log4j RCE quick test
CVE-2021-44228 - Apache log4j RCE quick test. Contribute to jeffli1024/log4j-rce-test development by creating an account on GitHub.
#CVE-2021
GitHub CodeQL Action to scan for CVE-2021–44228
https://github.com/benarculus/cve-2021-44228-code-scan
@BlueRedTeam
GitHub CodeQL Action to scan for CVE-2021–44228
https://github.com/benarculus/cve-2021-44228-code-scan
@BlueRedTeam
#CVE-2021
#log4j
Log4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS
https://github.com/name/log4j-scanner
@BlueRedTeam
#log4j
Log4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS
https://github.com/name/log4j-scanner
@BlueRedTeam
#CVE-2021
#Log4
Log4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS
https://github.com/name/log4j-scanner
@BlueRedTeam
#Log4
Log4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS
https://github.com/name/log4j-scanner
@BlueRedTeam
#CVE-2021
#Log4j
Tool to check whether one of your applications is affected by a vulnerability in log4j: CVE-2021-44228
https://github.com/alexbakker/log4shell-tools
@BlueRedTeam
#Log4j
Tool to check whether one of your applications is affected by a vulnerability in log4j: CVE-2021-44228
https://github.com/alexbakker/log4shell-tools
@BlueRedTeam
GitHub
GitHub - alexbakker/log4shell-tools: Tool that runs a test to check whether one of your applications is affected by the recent…
Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046 - alexbakker/log4shell-tools
#CVE-2021
#log4Shell
Find log4j for CVE-2021-44228 on some places * Log4Shell
https://github.com/perryflynn/find-log4j
@BlueRedTeam
#log4Shell
Find log4j for CVE-2021-44228 on some places * Log4Shell
https://github.com/perryflynn/find-log4j
@BlueRedTeam
GitHub
GitHub - perryflynn/find-log4j: Find log4j for CVE-2021-44228 on some places * Log4Shell
Find log4j for CVE-2021-44228 on some places * Log4Shell - GitHub - perryflynn/find-log4j: Find log4j for CVE-2021-44228 on some places * Log4Shell
#CVE-2021
#Log4j
A singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228).
https://github.com/Koupah/MC-Log4j-Patcher
@BlueRedTeam
#Log4j
A singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228).
https://github.com/Koupah/MC-Log4j-Patcher
@BlueRedTeam
GitHub
GitHub - Koupah/MC-Log4j-Patcher: A singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit…
A singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228). - GitHub - Koupah/MC-Log4j-Patcher: A singular file to protect as many Minecraf...
Forwarded from CyberSecurityResearch
TryHackMe
Solar, exploiting log4j
Explore CVE-2021-44228, a vulnerability in log4j affecting almost all software under the sun.
#CVE-2021
#Log4j
Prova de conceito da vulnerabulidade CVE-2021-44228.
https://github.com/igoritos22/log4jpoc
@BlueRedTeam
#Log4j
Prova de conceito da vulnerabulidade CVE-2021-44228.
https://github.com/igoritos22/log4jpoc
@BlueRedTeam
#CVE-2021
#Log4Shell
PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
https://github.com/back2root/log4shell-rex
@BlueRedTeam
#Log4Shell
PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
https://github.com/back2root/log4shell-rex
@BlueRedTeam
GitHub
GitHub - back2root/log4shell-rex: PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs - back2root/log4shell-rex
#CVE-2021
#log4j2
Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228
https://github.com/sandarenu/log4j2-issue-check
@BlueRedTeam
#log4j2
Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228
https://github.com/sandarenu/log4j2-issue-check
@BlueRedTeam
GitHub
GitHub - sandarenu/log4j2-issue-check: Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228
Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228 - GitHub - sandarenu/log4j2-issue-check: Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228
#CVE-2021
#log4j
log4j (CVE-2021-44228) Spring web application with vulnerabilities
https://github.com/Auddn/ITF-log4shell-Vulnapp
@BlueRedTeam
#log4j
log4j (CVE-2021-44228) Spring web application with vulnerabilities
https://github.com/Auddn/ITF-log4shell-Vulnapp
@BlueRedTeam
#CVE-2021
#Log4j
Simple Python 3 noscript to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading
https://github.com/Woahd/log4j-urlscanner
@BlueRedTeam
#Log4j
Simple Python 3 noscript to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading
https://github.com/Woahd/log4j-urlscanner
@BlueRedTeam
GitHub
GitHub - Woahd/log4j-urlscanner: Simple Python 3 noscript to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a…
Simple Python 3 noscript to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading - Woahd/log4j-urlscanner
#CVE-2021
#log4j
Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228
https://github.com/gcmurphy/chk_log4j
@BlueRedTeam
#log4j
Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228
https://github.com/gcmurphy/chk_log4j
@BlueRedTeam
GitHub
GitHub - gcmurphy/chk_log4j: Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228
Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228 - GitHub - gcmurphy/chk_log4j: Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228
#CVE-2021
#Log4j
A Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228
https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228
@BlueRedTeam
#Log4j
A Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228
https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - toramanemre/apache-solr-log4j-CVE-2021-44228: A Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228
A Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228 - toramanemre/apache-solr-log4j-CVE-2021-44228
Cobalt Strike
Load and execute COFF files and Cobalt Strike BOFs in-memory
https://github.com/Yaxser/COFF_Loader
@BlueRedTeam
Load and execute COFF files and Cobalt Strike BOFs in-memory
https://github.com/Yaxser/COFF_Loader
@BlueRedTeam
GitHub
GitHub - Yaxser/COFFLoader2: Load and execute COFF files and Cobalt Strike BOFs in-memory
Load and execute COFF files and Cobalt Strike BOFs in-memory - GitHub - Yaxser/COFFLoader2: Load and execute COFF files and Cobalt Strike BOFs in-memory
#CVE-2021
#log4j
Check CVE-2021-44228 vulnerability
https://github.com/codiobert/log4j-scanner
@BlueRedTeam
#log4j
Check CVE-2021-44228 vulnerability
https://github.com/codiobert/log4j-scanner
@BlueRedTeam
GitHub
GitHub - codiobert/log4j-scanner: Check CVE-2021-44228 vulnerability
Check CVE-2021-44228 vulnerability. Contribute to codiobert/log4j-scanner development by creating an account on GitHub.
Cobalt Strike
Load and execute COFF files and Cobalt Strike BOFs in-memory
https://github.com/Yaxser/COFFLoader2
@BlueRedTeam
Load and execute COFF files and Cobalt Strike BOFs in-memory
https://github.com/Yaxser/COFFLoader2
@BlueRedTeam
GitHub
GitHub - Yaxser/COFFLoader2: Load and execute COFF files and Cobalt Strike BOFs in-memory
Load and execute COFF files and Cobalt Strike BOFs in-memory - Yaxser/COFFLoader2