#CVE-2021
Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.
https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch
@BlueRedTeam
Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.
https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch
@BlueRedTeam
GitHub
GitHub - qingtengyun/cve-2021-44228-qingteng-online-patch: Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.
Hot-patch CVE-2021-44228 by exploiting the vulnerability itself. - GitHub - qingtengyun/cve-2021-44228-qingteng-online-patch: Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.
#CVE-2021
#log4Shell
Test case to check if the Log4Shell/CVE-2021-44228 hotfix will raise any unexpected exceptions
https://github.com/mss/log4shell-hotfix-side-effect
@BlueRedTeam
#log4Shell
Test case to check if the Log4Shell/CVE-2021-44228 hotfix will raise any unexpected exceptions
https://github.com/mss/log4shell-hotfix-side-effect
@BlueRedTeam
GitHub
GitHub - mss/log4shell-hotfix-side-effect: Test case to check if the Log4Shell/CVE-2021-44228 hotfix will raise any unexpected…
Test case to check if the Log4Shell/CVE-2021-44228 hotfix will raise any unexpected exceptions - GitHub - mss/log4shell-hotfix-side-effect: Test case to check if the Log4Shell/CVE-2021-44228 hotfix...
#CVE-2021
#log4j
demo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability
https://github.com/kossatzd/log4j-CVE-2021-44228-test
@BlueRedTeam
#log4j
demo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability
https://github.com/kossatzd/log4j-CVE-2021-44228-test
@BlueRedTeam
GitHub
GitHub - kossatzd/log4j-CVE-2021-44228-test: demo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability
demo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability - GitHub - kossatzd/log4j-CVE-2021-44228-test: demo project to highlight how to execute the log4j (CVE-2021-44228) ...
#CVE-2021
#log4j
Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228
https://github.com/kubearmor/log4j-cve
@BlueRedTeam
#log4j
Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228
https://github.com/kubearmor/log4j-cve
@BlueRedTeam
GitHub
GitHub - kubearmor/log4j-CVE-2021-44228: Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228
Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228 - GitHub - kubearmor/log4j-CVE-2021-44228: Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228
#CVE-2021
#log4j
Scans for Log4j versions effected by CVE-2021-44228
https://github.com/inettgmbh/checkmk-log4j-scanner
@BlueRedTeam
#log4j
Scans for Log4j versions effected by CVE-2021-44228
https://github.com/inettgmbh/checkmk-log4j-scanner
@BlueRedTeam
GitHub
GitHub - inettgmbh/checkmk-log4j-scanner: Scans for Log4j versions effected by CVE-2021-44228
Scans for Log4j versions effected by CVE-2021-44228 - inettgmbh/checkmk-log4j-scanner
#CVE-2021
#log4j
A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228
https://github.com/isuruwa/Log4j
@BlueRedTeam
#log4j
A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228
https://github.com/isuruwa/Log4j
@BlueRedTeam
GitHub
GitHub - isuruwa/Log4j: A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228
A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228 - GitHub - isuruwa/Log4j: A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228
#CVE-2021
#Log4j
Log4j2 CVE-2021-44228 revshell
https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell
@BlueRedTeam
#Log4j
Log4j2 CVE-2021-44228 revshell
https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell
@BlueRedTeam
GitHub
GitHub - faisalfs10x/Log4j2-CVE-2021-44228-revshell: Log4j2 CVE-2021-44228 revshell, ofc it suck!!
Log4j2 CVE-2021-44228 revshell, ofc it suck!! Contribute to faisalfs10x/Log4j2-CVE-2021-44228-revshell development by creating an account on GitHub.
#Red_Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
https://github.com/tobor88/PowerShell-Red-Team
@BlueRedTeam
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
https://github.com/tobor88/PowerShell-Red-Team
@BlueRedTeam
GitHub
GitHub - tobor88/PowerShell-Red-Team: Collection of PowerShell functions a Red Teamer may use in an engagement
Collection of PowerShell functions a Red Teamer may use in an engagement - tobor88/PowerShell-Red-Team
#CVE-2021
#Log4Shell
#honeypot
Dockerized honeypot for CVE-2021-44228.
https://github.com/michaelsanford/Log4Shell-Honeypot
@BlueRedTeam
#Log4Shell
#honeypot
Dockerized honeypot for CVE-2021-44228.
https://github.com/michaelsanford/Log4Shell-Honeypot
@BlueRedTeam
GitHub
GitHub - michaelsanford/Log4Shell-Honeypot: Dockerized honeypot for CVE-2021-44228.
Dockerized honeypot for CVE-2021-44228. Contribute to michaelsanford/Log4Shell-Honeypot development by creating an account on GitHub.
#CVE-2021
#Log4Shell
A Remote Code Execution PoC for Log4Shell (CVE-2021-44228)
https://github.com/ubitech/cve-2021-44228-rce-poc
@BlueRedTeam
#Log4Shell
A Remote Code Execution PoC for Log4Shell (CVE-2021-44228)
https://github.com/ubitech/cve-2021-44228-rce-poc
@BlueRedTeam
GitHub
GitHub - ubitech/cve-2021-44228-rce-poc: A Remote Code Execution PoC for Log4Shell (CVE-2021-44228)
A Remote Code Execution PoC for Log4Shell (CVE-2021-44228) - ubitech/cve-2021-44228-rce-poc
#CVE-2021
#Log4Shell
Data we are receiving from our honeypots about CVE-2021-44228
https://github.com/honeynet/log4shell-data
@BlueRedTeam
#Log4Shell
Data we are receiving from our honeypots about CVE-2021-44228
https://github.com/honeynet/log4shell-data
@BlueRedTeam
GitHub
GitHub - honeynet/log4shell-data: Data we are receiving from our honeypots about CVE-2021-44228
Data we are receiving from our honeypots about CVE-2021-44228 - GitHub - honeynet/log4shell-data: Data we are receiving from our honeypots about CVE-2021-44228
#CVE-2021
#Log4j
log4j (CVE-2021-44228) Spring-boot web application with vulnerabilities
https://github.com/Auddn/ITF-log4shell-vulnapp
@BlueRedTeam
#Log4j
log4j (CVE-2021-44228) Spring-boot web application with vulnerabilities
https://github.com/Auddn/ITF-log4shell-vulnapp
@BlueRedTeam
#CVE-2021
#Log4j
This noscript is used to perform a fast check if your server is possibly affected by CVE-2021-44228 (the log4j vulnerability).
https://github.com/rv4l3r3/log4v-vuln-check
@BlueRedTeam
#Log4j
This noscript is used to perform a fast check if your server is possibly affected by CVE-2021-44228 (the log4j vulnerability).
https://github.com/rv4l3r3/log4v-vuln-check
@BlueRedTeam
GitHub
GitHub - rv4l3r3/log4v-vuln-check: This noscript is used to perform a fast check if your server is possibly affected by CVE-2021…
This noscript is used to perform a fast check if your server is possibly affected by CVE-2021-44228 (the log4j vulnerability). - GitHub - rv4l3r3/log4v-vuln-check: This noscript is used to perform a fa...
#CVE-2021
#Log4j
log4j vulnerability wrapper scanner for CVE-2021-44228
https://github.com/dpomnean/log4j_scanner_wrapper
@BlueRedTeam
#Log4j
log4j vulnerability wrapper scanner for CVE-2021-44228
https://github.com/dpomnean/log4j_scanner_wrapper
@BlueRedTeam
GitHub
GitHub - dpomnean/log4j_scanner_wrapper: log4j vulnerability wrapper scanner for CVE-2021-44228
log4j vulnerability wrapper scanner for CVE-2021-44228 - GitHub - dpomnean/log4j_scanner_wrapper: log4j vulnerability wrapper scanner for CVE-2021-44228
#exploit
1. CVE-2021-23758:
AjaxPro .NET - deserialization/RCE vulnerability
https://mp.weixin.qq.com/s/7y-iyMMZAoN4B2dGvCFvXg
2. CVE-2021-25467:
Kernel LPE in the Vision DSP Kernel Driver
https://labs.taszk.io/blog/post/62_ss_dsp_oob_write
3. CVE-2021-30990:
Bypassing macOS Gatekeeper
https://ronmasas.com/posts/bypass-macos-gatekeeper
@BlueRedTeam
1. CVE-2021-23758:
AjaxPro .NET - deserialization/RCE vulnerability
https://mp.weixin.qq.com/s/7y-iyMMZAoN4B2dGvCFvXg
2. CVE-2021-25467:
Kernel LPE in the Vision DSP Kernel Driver
https://labs.taszk.io/blog/post/62_ss_dsp_oob_write
3. CVE-2021-30990:
Bypassing macOS Gatekeeper
https://ronmasas.com/posts/bypass-macos-gatekeeper
@BlueRedTeam
Full_Spectrum_Detections_for_Web_Shells.pdf
2.6 MB
#Blue_Team
Full Spectrum Detections for 5 Popular Web Shells: Alfa, SharPyShell, Krypton, ASPXSpy, TWOFACE
@BlueRedTeam
Full Spectrum Detections for 5 Popular Web Shells: Alfa, SharPyShell, Krypton, ASPXSpy, TWOFACE
@BlueRedTeam
#CVE-2021
#Log4j
This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce
https://github.com/roxas-tan/CVE-2021-44228
@BlueRedTeam
#Log4j
This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce
https://github.com/roxas-tan/CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce: Apache Log4j 远程代码执行
Apache Log4j 远程代码执行. Contribute to tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce development by creating an account on GitHub.
#CVE-2021
#Log4Shell
log4shell (CVE-2021-44228) scanning tool
https://github.com/shamo0/CVE-2021-44228
@BlueRedTeam
#Log4Shell
log4shell (CVE-2021-44228) scanning tool
https://github.com/shamo0/CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - shamo0/CVE-2021-44228: log4shell (CVE-2021-44228) scanning tool
log4shell (CVE-2021-44228) scanning tool. Contribute to shamo0/CVE-2021-44228 development by creating an account on GitHub.