Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Dec. 14, 2021, 9:35 a.m.
On Thursday (December 9th), a 0-day exploit in the popular Java logging library log4j (version 2) was discovered that results in Remote Code Execution (RCE) by logging a certain string. Given how ubiquitous this library is, the impact of the exploit (full server control), and how easy it is to exploit, the impact of this vulnerability is quite severe. We're calling it "Log4Shell" for short.
Python
Updated: 3 years, 4 months ago0 stars 2 fork 2 watcherBorn at : Dec. 14, 2021, 9:33 a.m. This repo has been linked 1 different CVEs too. -
Nov. 4, 2024, 7:02 p.m.
Python script to tamper with pages to test for Log4J Shell vulnerability.
Python Shell
Updated: 5 months, 3 weeks ago13 stars 2 fork 2 watcherBorn at : Dec. 14, 2021, 9:26 a.m. This repo has been linked 1 different CVEs too. -
Dec. 14, 2021, 8:57 a.m.
Endpoint to test CVE-2021-44228 – Log4j 2
Java
Updated: 3 years, 4 months ago0 stars 0 fork 0 watcherBorn at : Dec. 14, 2021, 8:55 a.m. This repo has been linked 1 different CVEs too. -
Feb. 20, 2024, 7:02 a.m.
Log4j jndi injection fuzz tool
fuzz-testing log4j2 injection jndi cve-2021-44228 log4shell cve-2021-45046
Python
Updated: 1 year, 2 months ago71 stars 16 fork 16 watcherBorn at : Dec. 14, 2021, 8:41 a.m. This repo has been linked 0 different CVEs too. -
Dec. 14, 2021, 10:06 a.m.
Little recap of the log4j2 remote code execution (CVE-2021-44228)
log4j2 rce security exploit java
Java
Updated: 3 years, 4 months ago0 stars 0 fork 0 watcherBorn at : Dec. 14, 2021, 8:31 a.m. This repo has been linked 1 different CVEs too. -
Dec. 14, 2021, 9:21 a.m.
None
Updated: 3 years, 4 months ago0 stars 0 fork 0 watcherBorn at : Dec. 14, 2021, 8:26 a.m. This repo has been linked 1 different CVEs too. -
Jan. 30, 2022, 4:35 p.m.
Check CVE-2021-44228 vulnerability
Shell
Updated: 3 years, 2 months ago3 stars 1 fork 1 watcherBorn at : Dec. 14, 2021, 7:59 a.m. This repo has been linked 1 different CVEs too. -
March 17, 2025, 8:50 a.m.
None
Go Ruby
Updated: 1 month, 1 week ago138 stars 21 fork 21 watcherBorn at : Dec. 14, 2021, 7:24 a.m. This repo has been linked 10 different CVEs too. -
Dec. 14, 2021, 7:16 a.m.
None
Java
Updated: 3 years, 4 months ago0 stars 1 fork 1 watcherBorn at : Dec. 14, 2021, 7:05 a.m. This repo has been linked 1 different CVEs too. -
March 19, 2022, 3:06 p.m.
The LPE technique does not need to work with remote RPC or SMB, as it is only working with the functions of Print Spooler. * This script embeds a Base64-encoded GZIPped payload for a custom DLL, that is patched according to your arguments, to easily add a new user to the local administrators group. * This script embeds methods from PowerSploit/[PowerUp](https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1) to reflectively access the Win32 APIs. * This method does not loop through all printer drivers to find the appropriate DLL path -- it simply grabs the first driver and determines the appropriate path.
PowerShell C++ C
Updated: 3 years, 1 month ago1 stars 1 fork 1 watcherBorn at : Dec. 14, 2021, 7:03 a.m. This repo has been linked 2 different CVEs too.