Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
-
Updated
Jun 5, 2024 - C#
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
A simple and fast Maven dependency vulnerability scanner. Check existence of vuln JARs (transitive)
Scanner that scans local files for log4shell vulnerability. Does bytecode analysis so it does not rely on metadata. Will find vulnerable log4j even it has been self-compiled/repackaged/shaded/nested (e.g. uberjar, fatjar) and even obfuscated.
Simple proof of concept of Log4Shell vulnerability in a spring boot vulnerable application environment.
A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.
A tool that scans archives to check for vulnerable log4j versions
Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046
A Log4j writeup and Docker based PoC written in PowerShell
Log4j Vulnerability RCE - CVE-2021-44228
This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.
A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
Dockerized honeypot for CVE-2021-44228.
Add a description, image, and links to the cve-2021-44228 topic page so that developers can more easily learn about it.
To associate your repository with the cve-2021-44228 topic, visit your repo's landing page and select "manage topics."