- https://github.com/p0dalirius/p0dalirius
- https://github.com/p0dalirius/CVE-2022-30780-lighttpd-denial-of-service
- https://github.com/kuznyJan1972/CVE-2022-30525-mass
- https://github.com/Fans0n-Fan/Awesome-IoT-exp
- https://github.com/YGoldking/CVE-2022-30525
- https://github.com/superzerosec/poc-exploit-index
- https://github.com/d-rn/vulBox
- https://github.com/savior-only/CVE-2022-30525
- https://github.com/tanjiti/sec_profile
- https://github.com/superzerosec/CVE-2022-30525
- https://github.com/ExploitPwner/CVE-2022-30525-Zyxel-Mass-Exploiter
- https://github.com/160Team/CVE-2022-30525
- https://github.com/M4fiaB0y/CVE-2022-30525
- https://github.com/luck-ying/Library-POC
- https://github.com/Henry4E36/CVE-2022-30525
- https://github.com/trhacknon/CVE-2022-30525-Reverse-Shell
- https://github.com/jbaines-r7/victorian_machinery
- https://github.com/Chocapikk/CVE-2022-30525-Reverse-Shell
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-30525.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/zyxel_ztp_rce.rb
- https://github.com/badboycxcc/script
- https://github.com/shuai06/CVE-2022-30525
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-30489.yaml
- https://github.com/trhacknon/XSS-CVE-2022-30489
- https://github.com/badboycxcc/XSS-CVE-2022-30489
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-29548.yaml
- https://github.com/cxosmo/CVE-2022-29548
- https://github.com/Inplex-sys/CVE-2022-29464-loader
- https://github.com/k4u5h41/CVE-2022-29464
- https://github.com/trhacknon/CVE-2022-29464
- https://github.com/superzerosec/poc-exploit-index
- https://github.com/Lidong-io/cve-2022-29464
- https://github.com/tufanturhan/wso2-rce-cve-2022-29464
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wso2_file_upload_rce.rb
- https://github.com/Str1am/my-nuclei-templates
- https://github.com/h3v0x/CVE-2022-29464
- https://github.com/mr-r3bot/WSO2-CVE-2022-29464
- https://github.com/UUFR/CVE-2022-29464
- https://github.com/tanjiti/sec_profile
- https://github.com/dravenww/curated-article
- https://github.com/hakivvi/CVE-2022-29464
- https://github.com/oppsec/WSOB
- https://github.com/Bryan988/shodan-wso2
- https://github.com/0xAgun/CVE-2022-29464
- https://github.com/lowkey0808/cve-2022-29464
- https://github.com/xiaoy-sec/Pentest_Note
- https://github.com/superzerosec/CVE-2022-29464
- https://github.com/LinJacck/CVE-2022-29464
- https://github.com/axin2019/CVE-2022-29464
- https://github.com/gpiechnik2/nmap-CVE-2022-29464
- https://github.com/adriyansyah-mf/mass-auto-exploit-wso2
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-29464.yaml
- https://github.com/badboycxcc/Netgear-ssl-vpn-20211222-CVE-2022-29383
- https://github.com/cxaqhq/netgear-to-CVE-2022-29383
- https://github.com/izj007/wechat
- https://github.com/notmariekondo/notmariekondo
- https://github.com/changtraixuqang97/changtraixuqang97
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/kagancapar/7-zip-malicious-code-vulnerability
- https://github.com/kagancapar/CVE-2022-29072
- https://github.com/zoroqi/my-awesome
- https://github.com/kun-g/Scraping-Github-trending
- https://github.com/sentinelblue/CVE-2022-29072
- https://github.com/tiktb8/CVE-2022-29072
- https://github.com/duytruongpham/duytruongpham
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Matrix07ksa/ALLMediaServer-1.6-Buffer-Overflow
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/cve_2022_28381_allmediaserver_bof.rb
- https://github.com/ahsentekdemir/CVE-2022-28346
- https://github.com/DeEpinGh0st/CVE-2022-28346
- https://github.com/YouGina/CVE-2022-28346
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/bigzooooz/CVE-2022-28077
- https://github.com/bigzooooz/XSScanner
- https://github.com/bigzooooz/CVE-2022-28078
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/bsauce/kernel-security-learning
- https://github.com/plummm/CVE-2022-27666
- https://github.com/Metarget/metarget
- https://github.com/j4k0m/really-good-cybersec
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/pipiscrew/timeline
- https://github.com/SuryaN03/DOS-REMOTE-POC
- https://github.com/nonamecoder/CVE-2022-27254
- https://github.com/harrygallagher4/awesome-stars
- https://github.com/tanjiti/sec_profile
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/kuznyJan1972/CVE-2022-25075-RCE
- https://github.com/pjqwudi/my_vuln
- https://github.com/kuznyJan1972/CVE-2022-25075-rce-POC
- https://github.com/GibzB/THM-Captured-Rooms
- https://github.com/r1skkam/TryHackMe-CVE-2022-26923
- https://github.com/JDArmy/GetDomainAdmin
- https://github.com/aniqfakhrul/certifried.py
- https://github.com/outflanknl/C2-Tool-Collection
- https://github.com/kas0n/RedTeam-Articles
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/LudovicPatho/CVE-2022-26923_AD-Certificate-Services
- https://github.com/f8al/CVE-2022-26809
- https://github.com/XmasSnow1/cve-2022-26809
- https://github.com/XmasSnowISBACK/CVE-2022-26809
- https://github.com/XmasSnow/CVE-2022-26809-RCE
- https://github.com/iowacountiesit/icit-sec.icymi
- https://github.com/sherlocksecurity/Microsoft-CVE-2022-26809-The-Little-Boy
- https://github.com/ExploitPwner/CVE-2022-26809-RCE-POC
- https://github.com/yuanLink/CVE-2022-26809
- https://github.com/F1uk369/CVE-2022-26809
- https://github.com/rkxxz/CVE-2022-26809
- https://github.com/seciurdt/CVE-2022-26809-POC
- https://github.com/jones199023/CVE-2022-26809
- https://github.com/seciurdt/CVE-2022-26809-MASS
- https://github.com/CberryAIRDROP/CVE-2022-26809-RCE
- https://github.com/oppongjohn/CVE-2022-26809-RCE
- https://github.com/Awrrays/Pentest-Tips
- https://github.com/corelight/cve-2022-26809
- https://github.com/gitcomit/scemer2
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Calvitz/CVE-2022-26809
- https://github.com/BugHunter010/CVE-2022-26809
- https://github.com/XmasSnowREAL/CVE-2022-26809-RCE
- https://github.com/HellKnightsCrew/CVE-2022-26809
- https://github.com/killvxk/CVE-2022-26809
- https://github.com/roger109/CVE-2022-26809-RCE-POC
- https://github.com/mr-r3b00t/cve-2022-26809
- https://github.com/hemazoher/CVE-2022-26809-RCE
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/ZyxelTeam/CVE-2022-26809-RCE
- https://github.com/auduongxuan/CVE-2022-26809
- https://github.com/XHSecurity/CVE-2022-26809
- https://github.com/websecnl/CVE-2022-26809
- https://github.com/genieyou/CVE-2022-26809-RCE
- https://github.com/nanaao/CVE-2022-26809
- https://github.com/seciurdt/CVE-2022-26809-RCE
- https://github.com/crypt0r00t/CVE-2022-26809
- https://github.com/DESC0N0C1D0/CVE-2022-26809-RCE
- https://github.com/trhacknon/CVE-2022-26717-Safari-WebGL-Exploit
- https://github.com/tanjiti/sec_profile
- https://github.com/theori-io/CVE-2022-26717-Safari-WebGL-Exploit
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/BabyTeam1024/CVE-2022-26318
- https://github.com/h3llk4t3/Watchguard-RCE-POC-CVE-2022-26318
- https://github.com/misterxid/watchguard_cve-2022-26318
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/p0dalirius/p0dalirius
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-26159.yaml
- https://github.com/p0dalirius/CVE-2022-26159-Ametys-Autocompletion-XML
- https://github.com/tanjiti/sec_profile
- https://github.com/Pear1y/CVE-2022-26133
- https://github.com/Holyshitbruh/2022-2021-RCE
- https://github.com/webraybtl/CVE-2022-25943
- https://github.com/hktalent/TOP
- https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE
- https://github.com/veritas501/pipe-primitive
- https://github.com/pipiscrew/timeline
- https://github.com/chenaotian/CVE-2022-25636
- https://github.com/hktalent/TOP
- https://github.com/veritas501/CVE-2022-25636-PipeVersion
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/carmilea/carmilea
- https://github.com/zhaoolee/garss
- https://github.com/jpacg/awesome-stars
- https://github.com/hancp2016/news
- https://github.com/boustrophedon/extrasafe
- https://github.com/B0nfee/CVE-2022-25636
- https://github.com/Metarget/metarget
- https://github.com/yaobinwen/robin_on_rails
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/Bonfee/CVE-2022-25636
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/landigv/research
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-25323.yaml
- https://github.com/awillix/research
- https://github.com/Stalrus/research
- https://github.com/landigv/research
- https://github.com/landigvt/research
- https://github.com/ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25315
- https://github.com/Nivaskumark/external_expat_v2.1.0_CVE-2022-25315
- https://github.com/akiraabe/myapp-container-jaxrs
- https://github.com/ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25314
- https://github.com/Griggorii/Ubuntu-20.04.2-desktop-amd64_By_Griggorii_linux-image-kernel-5.6.0-oem
- https://github.com/ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25313
- https://github.com/akiraabe/myapp-container-jaxrs
- https://github.com/Satheesh575555/external_expat_AOSP10_r33_CVE-2022-25236
- https://github.com/ARGOeu/secmon-probes
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/d3ltacros/d3ltacros
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/ComparedArray/printix-CVE-2022-25090
- https://github.com/d3ltacros/d3ltacros
- https://github.com/ComparedArray/printix-CVE-2022-25089
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/xr4aleyna/crossresmii
- https://github.com/aleyleiftaradogruu/aleyleiftaradogruu
- https://github.com/xr4aleyna/aleyleiftaradogruu
- https://github.com/Enes4xd/salih_.6644
- https://github.com/Enes4xd/aleyleiftaradogruu
- https://github.com/Enes4xd/kirik_kalpli_olan_sayfa
- https://github.com/crossresmii/salihalkan4466
- https://github.com/Enes4xd/ezelnur6327
- https://github.com/cayserkiller/cayserkiller
- https://github.com/crossresmii/crossresmii
- https://github.com/xr4aleyna/xr4aleyna
- https://github.com/crossresmii/cayserkiller
- https://github.com/Enes4xd/salihalkan4466
- https://github.com/xr4aleyna/Enes4xd
- https://github.com/kuznyJan1972/CVE-2022-25075-RCE
- https://github.com/ExploitPwner/Totolink-CVE-2022-Exploits
- https://github.com/kuznyJan1972/CVE-2022-25075-rce-POC
- https://github.com/exploitwritter/CVE-2022-25064
- https://github.com/Mr-xn/CVE-2022-25064
- https://github.com/Awrrays/FrameVul
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/0xf4n9x/CVE-2022-24990
- https://github.com/VVeakee/CVE-2022-24990-POC
- https://github.com/antx-code/CVE-2022-24990
- https://github.com/lishang520/CVE-2022-24990
- https://github.com/Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP-
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-24990.yaml
- https://github.com/webraybtl/CVE-2022-25943
- https://github.com/nanaao/CVE-2022-24934
- https://github.com/ASkyeye/WPS-CVE-2022-24934
- https://github.com/shakeman8/CVE-2022-24934
- https://github.com/webraybtl/CVE-2022-24934
- https://github.com/MagicPiperSec/WPS-CVE-2022-24934
- https://github.com/lavclash75/mybb-CVE-2022-24734
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Altelus1/CVE-2022-24734
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/jkroepke/jkroepke
- https://github.com/jkroepke/helm-secrets
- https://github.com/jkroepke/CVE-2022-24348-2
- https://github.com/happyhacking-k/my_cve_and_bounty_poc
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-24288.yaml
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/oxf5/CVE
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-24260.yaml
- https://github.com/Fashion-Man/ECE-9609-9069
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/d3ltacros/d3ltacros
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-24124.yaml
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/ColdFusionX/CVE-2022-24124
- https://github.com/shakeman8/CVE-2022-24112
- https://github.com/Mr-xn/CVE-2022-24112
- https://github.com/Greetdawn/Apache-APISIX-dashboard-RCE
- https://github.com/M4xSec/Apache-APISIX-CVE-2022-24112
- https://github.com/Axx8/CVE-2022-24112
- https://github.com/Udyz/CVE-2022-24112
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-24112.yaml
- https://github.com/Mah1ndra/CVE-2022-24112
- https://github.com/Mah1ndra/CVE-2022-244112
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/apache_apisix_api_default_token_rce.rb
- https://github.com/kavishkagihan/CVE-2022-24112-POC
- https://github.com/twseptian/cve-2022-24112
- https://github.com/hktalent/TOP
- https://github.com/Awrrays/FrameVul
- https://github.com/df2k2/m2-tech
- https://github.com/Neimar47574/CVE-2022-24087
- https://github.com/TomArni680/CVE-2022-24086-poc
- https://github.com/oK0mo/CVE-2022-24086-RCE-PoC
- https://github.com/Mr-xn/CVE-2022-24086
- https://github.com/TomArni680/CVE-2022-1388-POC
- https://github.com/n1sh1th/CVE-POC
- https://github.com/TomArni680/CVE-2022-24086-rce
- https://github.com/oK0mo/CVE-2022-24086-RCE-PoC
- https://github.com/nanaao/CVE-2022-24086-RCE
- https://github.com/TomArni680/CVE-2022-24086-poc
- https://github.com/k0zulzr/CVE-2022-24086-RCE
- https://github.com/TomArni680/CVE-2022-1388-RCE
- https://github.com/RoryRees/Magento_Auto_Exploiter_Priv
- https://github.com/IanSmith123/spring-core-rce
- https://github.com/shakeman8/CVE-2022-24086-RCE
- https://github.com/df2k2/m2-tech
- https://github.com/Sam00rx/CVE-2022-24087
- https://github.com/Neimar47574/CVE-2022-24087
- https://github.com/hktalent/TOP
- https://github.com/wambo-co/magento-1.9-cve-2022-24086
- https://github.com/akiraabe/myapp-container-jaxrs
- https://github.com/Nivaskumark/expat_A10_r33_2_2_6_CVE-2022-23990
- https://github.com/Satheesh575555/external_expat_AOSP10_r33_CVE-2022-23990
- https://github.com/akiraabe/myapp-container-jaxrs
- https://github.com/Satheesh575555/external_expat_AOSP10_r33_CVE-2022-23852
- https://github.com/open-source-peace/protestware-list
- https://github.com/bernardgut/find-node-dependents
- https://github.com/scriptzteam/node-ipc-malware-protestware-CVE-2022-23812
- https://github.com/nicolardi/node-ipc-protestware-post.mortem
- https://github.com/dipakpanchal456/CVE-2022-23808
- https://github.com/Gabriel-Lima232/PHPMyAdmin-5.1.1-PoC
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-23808.yaml
- https://github.com/hktalent/TOP
- https://github.com/fbusr/CVE-2022-23779
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-23779.yaml
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/buluma/buluma
- https://github.com/davejwilson/azure-spark-pools-log4j
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/buluma/ansible-role-cve_2022-23307
- https://github.com/buluma/crazy-max
- https://github.com/apache/logging-log4j1
- https://github.com/whitesource/log4j-detect-distribution
- https://github.com/cybersheepdog/Analyst-Tool
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/GavinStevensHoboken/log4j
- https://github.com/thl-cmk/CVE-log4j-check_mk-plugin
- https://github.com/scopion/ansible-role-cve_2022-23307
- https://github.com/lel99999/dev_MesosRI
- https://github.com/Schnitker/log4j-min
- https://github.com/ltslog/ltslog
- https://github.com/davejwilson/azure-spark-pools-log4j
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/AlphabugX/CVE-2022-RCE
- https://github.com/apache/logging-log4j1
- https://github.com/whitesource/log4j-detect-distribution
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/GavinStevensHoboken/log4j
- https://github.com/thl-cmk/CVE-log4j-check_mk-plugin
- https://github.com/lel99999/dev_MesosRI
- https://github.com/Schnitker/log4j-min
- https://github.com/ltslog/ltslog
- https://github.com/davejwilson/azure-spark-pools-log4j
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/whitesource/log4j-detect-distribution
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/GavinStevensHoboken/log4j
- https://github.com/thl-cmk/CVE-log4j-check_mk-plugin
- https://github.com/apache/logging-log4j1
- https://github.com/Schnitker/log4j-min
- https://github.com/ltslog/ltslog
- https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-lab
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/Threekiii/Awesome-POC
- https://github.com/AnthonyTippy/Vulnerabilities
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-23178.yaml
- https://github.com/Kazaf6s/CVE-2022-23131
- https://github.com/emadshanab/Nuclei-Templates-Collection
- https://github.com/jweny/zabbix-saml-bypass-exp
- https://github.com/L0ading-x/cve-2022-23131
- https://github.com/zwjjustdoit/cve-2022-23131
- https://github.com/kh4sh3i/CVE-2022-23131
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/qq1549176285/CVE-2022-23131
- https://github.com/1mxml/CVE-2022-23131
- https://github.com/tanjiti/sec_profile
- https://github.com/pykiller/CVE-2022-23131
- https://github.com/trhacknon/CVE-2022-23131
- https://github.com/Mr-xn/cve-2022-23131
- https://github.com/random-robbie/cve-2022-23131-exp
- https://github.com/murchie85/twitterCyberMonitor
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-23131.yaml
- https://github.com/ad-calcium/vuln_script
- https://github.com/trganda/CVE-2022-23131
- https://github.com/0tt7/CVE-2022-23131
- https://github.com/Fa1c0n35/zabbix-cve-2022-23131
- https://github.com/hktalent/TOP
- https://github.com/kuznyJan1972/CVE-2022-23121-RCE
- https://github.com/neutrinoguy/awesome-ics-writeups
- https://github.com/jcarabantes/CVE-2022-23046
- https://github.com/dnr6419/CVE-2022-23046
- https://github.com/hadrian3689/phpipam_1.4.4
- https://github.com/GoogleCloudPlatform/security-analytics
- https://github.com/cxzero/CVE-2022-22965-spring4shell
- https://github.com/LudovicPatho/CVE-2022-22965_Spring4Shell
- https://github.com/justmumu/SpringShell
- https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-
- https://github.com/queencitycyber/Spring4Shell-cURL
- https://github.com/likewhite/CVE-2022-22965
- https://github.com/GuayoyoCyber/CVE-2022-22965
- https://github.com/TheGejr/SpringShell
- https://github.com/edsonjt81/spring4shell-scan
- https://github.com/khidottrivi/CVE-2022-22965
- https://github.com/netcode/Spring4shell-CVE-2022-22965-POC
- https://github.com/jfrog/jfrog-spring-tools
- https://github.com/netsentriesdev/spring4Shell-Safe-Exploit
- https://github.com/RogerSugit/spring_onekeyshell
- https://github.com/sunnyvale-it/CVE-2022-22965-PoC
- https://github.com/Snip3R69/spring-shell-vuln
- https://github.com/t3amj3ff/Spring4ShellPoC
- https://github.com/chenzhouwen/vul-check
- https://github.com/zer0yu/CVE-2022-22965
- https://github.com/liangyueliangyue/spring-core-rce
- https://github.com/jschauma/check-springshell
- https://github.com/reznok/Spring4Shell-POC
- https://github.com/rwincey/spring4shell-CVE-2022-22965
- https://github.com/fracturelabs/spring4shell_victim
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/lamyongxian/crmmvc
- https://github.com/rajasoun/spring4shell-tomcat
- https://github.com/CalumHutton/CVE-2022-22965-PoC_Payara
- https://github.com/me2nuk/CVE-2022-22965
- https://github.com/irgoncalves/irule-cve-2022-22965
- https://github.com/sinjap/spring4shell
- https://github.com/Wrin9/CVE-2022-22965
- https://github.com/DataDog/security-labs-pocs
- https://github.com/irgoncalves/f5-waf-enforce-sig-Spring4Shell
- https://github.com/k3rwin/spring-core-rce
- https://github.com/robiul-awal/CVE-2022-22965
- https://github.com/Kirill89/CVE-2022-22965-PoC
- https://github.com/dtact/spring4shell-scanner
- https://github.com/talentsec/SpringShell
- https://github.com/FourCoreLabs/spring4shell-exploit-poc
- https://github.com/wcoreiron/Sentinel_Analtic_Rules
- https://github.com/anair-it/springshell-vuln-POC
- https://github.com/kun-g/Scraping-Github-trending
- https://github.com/colincowie/Safer_PoC_CVE-2022-22965
- https://github.com/dotnes/spring4shell
- https://github.com/mwojterski/cve-2022-22965
- https://github.com/kevin-s31/spring-bean
- https://github.com/superfish9/pt
- https://github.com/kongjiexi/reznok-Spring4Shell-POC
- https://github.com/mariomamo/CVE-2022-22965
- https://github.com/XuCcc/VulEnv
- https://github.com/zjx/Spring4Shell-RCE
- https://github.com/alt3kx/CVE-2022-22965_PoC
- https://github.com/light-Life/CVE-2022-22965-GUItools
- https://github.com/Pear1y/Vuln-Env
- https://github.com/daniel0x00/Invoke-CVE-2022-22965-SafeCheck
- https://github.com/helsecert/CVE-2022-22965
- https://github.com/getastra/hypejab
- https://github.com/OverflowMyBuffers/Spring4ShellScanner
- https://github.com/kh4sh3i/Spring-CVE
- https://github.com/luoqianlin/CVE-2022-22965
- https://github.com/GibzB/THM-Captured-Rooms
- https://github.com/datawiza-inc/spring-rec-demo
- https://github.com/itsecurityco/CVE-2022-22965
- https://github.com/lcarea/CVE-2022-22965
- https://github.com/j4k0m/spring4shell-secdojo
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/mirsaes/cyao2pdf
- https://github.com/webraybtl/springcore_detect
- https://github.com/west-wind/Threat-Hunting-With-Splunk
- https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-CachedintrospectionResults-Rce
- https://github.com/NCSC-NL/spring4shell
- https://github.com/pvnovarese/2022-04-enterprise-demo
- https://github.com/SummerSec/BlogPapers
- https://github.com/west-wind/Spring4Shell-Detection
- https://github.com/tweedge/springcore-0day-en
- https://github.com/chaosec2021/fscan-POC
- https://github.com/hab1b0x/Spring4Shell
- https://github.com/WingsSec/Meppo
- https://github.com/xnderLAN/CVE-2022-22965
- https://github.com/veo/vscan
- https://github.com/nu0l/CVE-2022-22965
- https://github.com/whitesource/spring4shell-detect
- https://github.com/test502git/awvs14-scan
- https://github.com/thomasvincent/springshell
- https://github.com/metaStor/SpringScan
- https://github.com/n11dc0la/PocSuite_POC
- https://github.com/lzbzzz/JAVAExploitStudy
- https://github.com/c4mx/CVE-2022-22965_PoC
- https://github.com/0zvxr/CVE-2022-22965
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/radiusmethod/awesome-gists
- https://github.com/wshon/spring-framework-rce
- https://github.com/shengshengli/fscan-POC
- https://github.com/fracturelabs/go-scan-spring
- https://github.com/Bl0omZ/JAVAExploitStudy
- https://github.com/thenurhabib/s4sScanner
- https://github.com/zjc9/mytools
- https://github.com/onurgule/S4S-Scanner
- https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCE
- https://github.com/dravenww/curated-article
- https://github.com/4nth0ny1130/spring4shell_behinder
- https://github.com/Pear1y/VulnEnv
- https://github.com/bollwarm/SecToolSet
- https://github.com/Enokiy/cve_learning_record
- https://github.com/redhuntlabs/Hunt4Spring
- https://github.com/coffeehb/Spring4Shell
- https://github.com/renovatebot/spring-remediations
- https://github.com/alt3kx/CVE-2022-22965
- https://github.com/Enokiy/spring-RCE-CVE-2022-22965
- https://github.com/NodyHub/fifi
- https://github.com/cybersecurityworks553/spring4shell-exploit
- https://github.com/fullhunt/spring4shell-scan
- https://github.com/XRSec/AWVS14-Update
- https://github.com/Loneyers/Spring4Shell
- https://github.com/Qualys/spring4scanwin
- https://github.com/wikiZ/springboot_CVE-2022-22965
- https://github.com/Wrin9/POC
- https://github.com/Will-Beninger/CVE-2022-22965_SpringShell
- https://github.com/Mr-xn/spring-core-rce
- https://github.com/basu1706/590JFinalProject
- https://github.com/Y4tacker/JavaSec
- https://github.com/edsonjt81/spring4shell
- https://github.com/rainboyan/grails-issue-12460-demo
- https://github.com/Axx8/SpringFramework_CVE-2022-22965_RCE
- https://github.com/mikaelkall/Spring4Shell
- https://github.com/matheuscezar/spring4shell-massive-scan
- https://github.com/snicoll-scratches/spring-boot-cve-2022-22965
- https://github.com/trhacknon/Spring4Shell-POC
- https://github.com/chaosec2021/CVE-2022-22965-POC
- https://github.com/nBp1Ng/SpringFramework-Vul
- https://github.com/avergnaud/spring4shell-intro
- https://github.com/SeanWrightSec/spring-rce-poc
- https://github.com/gpiechnik2/nmap-spring4shell
- https://github.com/XRSecAdmin/AWVS14-Update
- https://github.com/bowwowxx/spring4Shell
- https://github.com/mebibite/springhound
- https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-Core-Rce
- https://github.com/BobTheShoplifter/Spring4Shell-POC
- https://github.com/PetrusViet/Poc-Spring4Shell-Jetty
- https://github.com/Trendyol/AppSec-Presentations
- https://github.com/rtkwlf/wolf-tools
- https://github.com/vulhub/vulhub/tree/master/spring/CVE-2022-22965
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-22965.yaml
- https://github.com/hillu/local-spring-vuln-scanner
- https://github.com/HackJava/HackSpring
- https://github.com/fransvanbuul/CVE-2022-22965-susceptibility
- https://github.com/Retrospected/spring-rce-poc
- https://github.com/DDuarte/springshell-rce-poc
- https://github.com/Joe1sn/CVE-2022-22965
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spring_framework_rce_spring4shell.rb
- https://github.com/viniciuspereiras/CVE-2022-22965-poc
- https://github.com/CLincat/vulcat
- https://github.com/jrgdiaz/Spring4Shell-CVE-2022-22965.py
- https://github.com/twseptian/cve-2022-22965
- https://github.com/syalioune/spring4shell-jdk8-demo
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-22963.yaml
- https://github.com/me2nuk/CVE-2022-22963
- https://github.com/justmumu/SpringShell
- https://github.com/cyberkartik/CVE
- https://github.com/axingde/Spring-Cloud-Function-Spel
- https://github.com/hktalent/spring-spel-0day-poc
- https://github.com/XuCcc/VulEnv
- https://github.com/stevemats/Spring0DayCoreExploit
- https://github.com/GuayoyoCyber/CVE-2022-22965
- https://github.com/edsonjt81/spring4shell-scan
- https://github.com/thomasvincent/springshell
- https://github.com/metaStor/SpringScan
- https://github.com/twseptian/cve-2022-22963
- https://github.com/CognizantOneDevOps/Insights
- https://github.com/SealPaPaPa/SpringCloudFunction-Research
- https://github.com/axingde/spring-cloud-function-spel
- https://github.com/nBp1Ng/SpringFramework-Vul
- https://github.com/Pear1y/Vuln-Env
- https://github.com/jschauma/check-springshell
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/radiusmethod/awesome-gists
- https://github.com/shengshengli/fscan-POC
- https://github.com/RanDengShiFu/CVE-2022-22963
- https://github.com/vulhub/vulhub/tree/master/spring/CVE-2022-22963
- https://github.com/k3rwin/spring-cloud-function-rce
- https://github.com/Kirill89/CVE-2022-22963-PoC
- https://github.com/9xN/SpringCore-0day
- https://github.com/jorgectf/spring-cloud-function-spel
- https://github.com/kh4sh3i/Spring-CVE
- https://github.com/thenurhabib/s4sScanner
- https://github.com/onurgule/S4S-Scanner
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/dravenww/curated-article
- https://github.com/mebibite/springhound
- https://github.com/trhacknon/CVE-2022-22963
- https://github.com/Pear1y/VulnEnv
- https://github.com/Trendyol/AppSec-Presentations
- https://github.com/exploitbin/CVE-2022-22963-Spring-Core-RCE
- https://github.com/sinjap/spring4shell
- https://github.com/HackJava/HackSpring
- https://github.com/darryk10/CVE-2022-22963
- https://github.com/irgoncalves/f5-waf-enforce-sig-Spring4Shell
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/fullhunt/spring4shell-scan
- https://github.com/west-wind/Threat-Hunting-With-Splunk
- https://github.com/dtact/spring4shell-scanner
- https://github.com/Qualys/spring4scanwin
- https://github.com/puckiestyle/CVE-2022-22963
- https://github.com/wcoreiron/Sentinel_Analtic_Rules
- https://github.com/dinosn/CVE-2022-22963
- https://github.com/west-wind/Spring4Shell-Detection
- https://github.com/jojosec/SPeL-injection-study
- https://github.com/WingsSec/Meppo
- https://github.com/AayushmanThapaMagar/CVE-2022-22963
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spring_cloud_function_spel_injection.rb
- https://github.com/dotnes/spring4shell
- https://github.com/chaosec2021/fscan-POC
- https://github.com/tweedge/springcore-0day-en
- https://github.com/fatguru/dorks
- https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector
- https://github.com/Vulnmachines/VMWare_CVE-2022-22954
- https://github.com/3SsFuck/CVE-2022-22954-POC
- https://github.com/aniqfakhrul/CVE-2022-22954
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-22954.yaml
- https://github.com/sherlocksecurity/VMware-CVE-2022-22954
- https://github.com/chaosec2021/CVE-2022-22954-VMware-RCE
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/jax7sec/CVE-2022-22954
- https://github.com/shengshengli/fscan-POC
- https://github.com/tunelko/CVE-2022-22954-PoC
- https://github.com/HACK-THE-WORLD/DailyMorningReading
- https://github.com/lucksec/VMware-CVE-2022-22954
- https://github.com/3SsFuck/CVE-2021-31805-POC
- https://github.com/tanjiti/sec_profile
- https://github.com/corelight/cve-2022-22954
- https://github.com/axingde/CVE-2022-22954-POC
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/vmware_workspace_one_access_cve_2022_22954.rb
- https://github.com/MSeymenD/CVE-2022-22954-Testi
- https://github.com/MLX15/CVE-2022-22954
- https://github.com/west-wind/Threat-Hunting-With-Splunk
- https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC
- https://github.com/astraztech/vmware4shell
- https://github.com/bewhale/CVE-2022-22954
- https://github.com/kaanymz/2022-04-06-critical-vmware-fix
- https://github.com/mumu2020629/-CVE-2022-22954-scanner
- https://github.com/litt1eb0yy/One-Liner-Scripts
- https://github.com/nguyenv1nK/CVE-2022-22954
- https://github.com/Jun-5heng/CVE-2022-22954
- https://github.com/chaosec2021/fscan-POC
- https://github.com/thomasvincent/springshell
- https://github.com/irgoncalves/f5-waf-enforce-sig-Spring4Shell
- https://github.com/4ra1n/4ra1n
- https://github.com/kaanymz/researching-cve-2022-22948-vcenter
- https://github.com/PenteraIO/CVE-2022-22948
- https://github.com/kaanymz/vcenter-cve-fix
- https://github.com/kaanymz/cve-2022-22948-vcenter
- https://github.com/crowsec-edtech/CVE-2022-22947
- https://github.com/testivy/springboot-actuator-spring-cloud-function-rce
- https://github.com/mrknow001/CVE-2022-22947
- https://github.com/d-rn/vulBox
- https://github.com/march0s1as/CVE-2022-22947
- https://github.com/anansec/CVE-2022-22947_EXP
- https://github.com/nu0l/cve-2022-22947
- https://github.com/sagaryadav8742/springcloudRCE
- https://github.com/viemsr/spring_cloud_gateway_memshell
- https://github.com/BerMalBerIst/CVE-2022-22947
- https://github.com/tanjiti/sec_profile
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/carlosevieira/CVE-2022-22947
- https://github.com/whwlsfb/cve-2022-22947-godzilla-memshell
- https://github.com/bysinks/CVE-2022-22947
- https://github.com/Greetdawn/CVE-2022-22947
- https://github.com/darkb1rd/cve-2022-22947
- https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947
- https://github.com/talentsec/Spring-Cloud-Gateway-CVE-2022-22947
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-22947.yaml
- https://github.com/zan8in/afrog
- https://github.com/SummerSec/learning-codeql
- https://github.com/XuCcc/VulEnv
- https://github.com/vulhub/vulhub/tree/master/spring/CVE-2022-22947
- https://github.com/An0th3r/CVE-2022-22947-exp
- https://github.com/Axx8/CVE-2022-22947_Rce_Exp
- https://github.com/scopion/CVE-2022-22947-exp
- https://github.com/mostwantedduck/cve-poc
- https://github.com/michaelklaan/CVE-2022-22947-Spring-Cloud
- https://github.com/ba1ma0/Spring-Cloud-GateWay-CVE-2022-22947-demon-code
- https://github.com/bigbigban1/CVE-2022-22947-exp
- https://github.com/Ha0Liu/CVE-2022-22947
- https://github.com/helloexp/CVE-2022-22947
- https://github.com/0730Nophone/CVE-2022-22947-
- https://github.com/Jun-5heng/CVE-2022-22947
- https://github.com/k3rwin/spring-cloud-gateway-rce
- https://github.com/aesm1p/CVE-2022-22947-POC-Reproduce
- https://github.com/scopion/cve-2022-22947
- https://github.com/chaosec2021/fscan-POC
- https://github.com/WingsSec/Meppo
- https://github.com/hktalent/TOP
- https://github.com/dbgee/CVE-2022-22947
- https://github.com/veo/vscan
- https://github.com/YutuSec/SpEL
- https://github.com/thomasvincent/springshell
- https://github.com/metaStor/SpringScan
- https://github.com/n11dc0la/PocSuite_POC
- https://github.com/j-jasson/CVE-2022-22947-Spring-Cloud-Gateway-SpelRCE
- https://github.com/Enokiy/cve-2022-22947-spring-cloud-gateway
- https://github.com/awsassets/CVE-2022-22947-RCE
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/shengshengli/fscan-POC
- https://github.com/Vulnmachines/spring-cve-2022-22947
- https://github.com/Tas9er/SpringCloudGatewayRCE
- https://github.com/dravenww/curated-article
- https://github.com/22ke/CVE-2022-22947
- https://github.com/aodsec/CVE-2022-22947
- https://github.com/Enokiy/cve_learning_record
- https://github.com/hh-hunter/cve-2022-22947-docker
- https://github.com/wjl110/Spring_CVE_2022_22947
- https://github.com/debug4you/CVE-2022-22947
- https://github.com/york-cmd/CVE-2022-22947-goby
- https://github.com/Nathaniel1025/CVE-2022-22947
- https://github.com/PaoPaoLong-lab/Spring-CVE-2022-22947-
- https://github.com/lucksec/Spring-Cloud-Gateway-CVE-2022-22947
- https://github.com/Wrin9/POC
- https://github.com/Y4tacker/JavaSec
- https://github.com/chaosec2021/CVE-2022-22947-POC
- https://github.com/luckyfuture0177/VULOnceMore
- https://github.com/Awrrays/FrameVul
- https://github.com/nBp1Ng/SpringFramework-Vul
- https://github.com/shakeman8/CVE-2022-22947-RCE
- https://github.com/dingxiao77/-cve-2022-22947-
- https://github.com/twseptian/cve-2022-22947
- https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway
- https://github.com/ad-calcium/vuln_script
- https://github.com/Xd-tl/CVE-2022-22947-Rce_POC
- https://github.com/F6JO/Burp_VulPscan
- https://github.com/Wrin9/CVE-2022-22947
- https://github.com/Ciyfly/mullet
- https://github.com/Vancomycin-g/CVE-2022-22947
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/xr4aleyna/crossresmii
- https://github.com/aleyleiftaradogruu/aleyleiftaradogruu
- https://github.com/xr4aleyna/aleyleiftaradogruu
- https://github.com/Enes4xd/salih_.6644
- https://github.com/Enes4xd/aleyleiftaradogruu
- https://github.com/Enes4xd/kirik_kalpli_olan_sayfa
- https://github.com/crossresmii/salihalkan4466
- https://github.com/Enes4xd/ezelnur6327
- https://github.com/cayserkiller/cayserkiller
- https://github.com/crossresmii/crossresmii
- https://github.com/xr4aleyna/xr4aleyna
- https://github.com/crossresmii/cayserkiller
- https://github.com/Enes4xd/salihalkan4466
- https://github.com/xr4aleyna/Enes4xd
- https://github.com/xr4aleyna/crossresmii
- https://github.com/aleyleiftaradogruu/aleyleiftaradogruu
- https://github.com/xr4aleyna/aleyleiftaradogruu
- https://github.com/Enes4xd/salih_.6644
- https://github.com/Enes4xd/aleyleiftaradogruu
- https://github.com/Enes4xd/kirik_kalpli_olan_sayfa
- https://github.com/crossresmii/salihalkan4466
- https://github.com/Enes4xd/ezelnur6327
- https://github.com/cayserkiller/cayserkiller
- https://github.com/crossresmii/crossresmii
- https://github.com/xr4aleyna/xr4aleyna
- https://github.com/crossresmii/cayserkiller
- https://github.com/Enes4xd/salihalkan4466
- https://github.com/xr4aleyna/Enes4xd
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/xr4aleyna/crossresmii
- https://github.com/aleyleiftaradogruu/aleyleiftaradogruu
- https://github.com/xr4aleyna/aleyleiftaradogruu
- https://github.com/Enes4xd/salih_.6644
- https://github.com/Enes4xd/aleyleiftaradogruu
- https://github.com/Enes4xd/kirik_kalpli_olan_sayfa
- https://github.com/crossresmii/salihalkan4466
- https://github.com/Enes4xd/ezelnur6327
- https://github.com/cayserkiller/cayserkiller
- https://github.com/crossresmii/crossresmii
- https://github.com/xr4aleyna/xr4aleyna
- https://github.com/crossresmii/cayserkiller
- https://github.com/Enes4xd/salihalkan4466
- https://github.com/xr4aleyna/Enes4xd
- https://github.com/akiraabe/myapp-container-jaxrs
- https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827
- https://github.com/akiraabe/myapp-container-jaxrs
- https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827
- https://github.com/clearbluejar/cve-markdown-charts
- https://github.com/tzwlhack/SpoolFool
- https://github.com/ly4k/SpoolFool
- https://github.com/J0hnbX/2022-22718
- https://github.com/Al1ex/WindowsElevation
- https://github.com/insidegui/CoreFollowUpAttack
- https://github.com/houjingyi233/macOS-iOS-system-security
- https://github.com/houjingyi233/macOS-iOS-system-security
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/jhftss/CVE-2022-22639
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/osx/browser/osx_gatekeeper_bypass.rb
- https://github.com/houjingyi233/macOS-iOS-system-security
- https://github.com/d-rn/vulBox
- https://github.com/acheong08/MSF-screenrecord-on-MacOS
- https://github.com/KlinKlinKlin/MSF-screenrecord-on-MacOS
- https://github.com/SoftwareDesignLab/automated_cve_severity_analysis
- https://github.com/b1n4r1b01/n-days
- https://github.com/houjingyi233/macOS-iOS-system-security
- https://github.com/poizon-box/CVE-2022-22582
- https://github.com/pondoksiber/SAP-Pentest-Cheatsheet
- https://github.com/antx-code/CVE-2022-22536
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-22536.yaml
- https://github.com/asurti6783/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536
- https://github.com/tes5hacks/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536
- https://github.com/hktalent/TOP
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/clearbluejar/cve-markdown-charts
- https://github.com/tzwlhack/SpoolFool
- https://github.com/Awrrays/Pentest-Tips
- https://github.com/changtraixuqang97/changtraixuqang97
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/ly4k/SpoolFool
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/cve_2022_21999_spoolfool_privesc.rb
- https://github.com/hktalent/TOP
- https://github.com/duytruongpham/duytruongpham
- https://github.com/sarutobi12/sarutobi12
- https://github.com/daphne97/daphne97
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/0vercl0k/CVE-2022-21971
- https://github.com/tufanturhan/CVE-2022-21971-Windows-Runtime-RCE
- https://github.com/HACK-THE-WORLD/DailyMorningReading
- https://github.com/hktalent/TOP
- https://github.com/tanjiti/sec_profile
- https://github.com/J0hnbX/2022-21971
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/pcgeek86/aws-systemsmanager-publicdocuments
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/corelight/cve-2022-21907
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/emotest1/emo_emo
- https://github.com/bigblackhat/oFx
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/blind-intruder/Exploit-CVE
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/ZZ-SOCMAP/CVE-2022-21907
- https://github.com/tanjiti/sec_profile
- https://github.com/p0dalirius/p0dalirius
- https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC
- https://github.com/xiska62314/CVE-2022-21907
- https://github.com/gpiechnik2/nmap-CVE-2022-21907
- https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows
- https://github.com/mauricelambert/mauricelambert.github.io
- https://github.com/ziyadnz/SecurityNotes
- https://github.com/RtlCyclone/CVE_2022_21907-poc
- https://github.com/openx-org/BLEN
- https://github.com/iveresk/cve-2022-21907
- https://github.com/coconut20/CVE-2022-21907-RCE-POC
- https://github.com/iveresk/cve-2022-21907-http.sys
- https://github.com/mauricelambert/CVE-2022-21907
- https://github.com/polakow/CVE-2022-21907
- https://github.com/p0dalirius/CVE-2022-21907-http.sys
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/hktalent/TOP
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Ascotbe/Kernelhub
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/sailay1996/cve-2022-21882-poc
- https://github.com/r1l4-i3pur1l4/CVE-2021-1732
- https://github.com/KaLendsi/CVE-2022-21882
- https://github.com/r1l4-i3pur1l4/CVE-2022-21882
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/cve_2022_21882_win32k.rb
- https://github.com/David-Honisch/CVE-2022-21882
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows
- https://github.com/B0nfee/CVE-2022-21882
- https://github.com/L4ys/CVE-2022-21882
- https://github.com/hktalent/TOP
- https://github.com/Al1ex/WindowsElevation
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/bigpick/cve-reading-list
- https://github.com/jacksont432/hello_world_python
- https://github.com/sreeram281997/CVE-2022-21668-Pipenv-RCE-vulnerability
- https://github.com/TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection
- https://github.com/purple-WL/wordpress-CVE-2022-21661
- https://github.com/xxg1413/rust-security
- https://github.com/sagittarius-a/cve-2022-21658
- https://github.com/rustminded/xtask-wasm
- https://github.com/XIDY-Dex/rmall
- https://github.com/auth0/java-jwt
- https://github.com/Damok82/SignChecker
- https://github.com/adidaspaul/adidaspaul
- https://github.com/jmiettinen/CVE-2022-21449-vuln-test
- https://github.com/jamietanna/jamietanna
- https://github.com/AkashHamal0x01/learn250
- https://github.com/jfrog/jfrog-CVE-2022-21449
- https://github.com/righel/yara-rules
- https://github.com/DataDog/security-labs-pocs
- https://github.com/khalednassar/CVE-2022-21449-TLS-PoC
- https://github.com/marschall/psychic-signatures
- https://github.com/thack1/CVE-2022-21449
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/whichjdk/whichjdk.com
- https://github.com/tanjiti/sec_profile
- https://github.com/dravenww/curated-article
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-21371.yaml
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/Mr-xn/CVE-2022-21371
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-lab
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/Audiobahn/CVE-2022-20699
- https://github.com/rdomanski/Exploits_and_Advisories
- https://github.com/rohankumardubey/CVE-2022-20699
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/misc/cisco_rv340_sslvpn.rb
- https://github.com/puckiestyle/CVE-2022-20699
- https://github.com/hktalent/TOP
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-1597.yaml
- https://github.com/V35HR4J/CVE-2022-1597
- https://github.com/aodsec/CVE-2022-1388-PocExp
- https://github.com/MrCl0wnLab/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed
- https://github.com/Wrin9/CVE-2022-1388
- https://github.com/EvilLizard666/CVE-2022-1388
- https://github.com/vesperp/CVE-2022-1388-F5-BIG-IP-
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-1388.yaml
- https://github.com/jheeree/CVE-2022-1388-checker
- https://github.com/horizon3ai/CVE-2022-1388
- https://github.com/justakazh/CVE-2022-1388
- https://github.com/thatonesecguy/CVE-2022-1388-Exploit
- https://github.com/hou5/CVE-2022-1388
- https://github.com/cve-hunter/CVE-2022-1388-mass
- https://github.com/BishopFox/bigip-scanner
- https://github.com/Hudi233/CVE-2022-1388
- https://github.com/saucer-man/CVE-2022-1388
- https://github.com/TomArni680/CVE-2022-1388-RCE
- https://github.com/Holyshitbruh/2022-2021-RCE
- https://github.com/bhdresh/SnortRules
- https://github.com/blind-intruder/CVE-2022-1388-RCE-checker-and-POC-Exploit
- https://github.com/TomArni680/CVE-2022-1388-POC
- https://github.com/superfish9/pt
- https://github.com/aancw/CVE-2022-1388-rs
- https://github.com/sherlocksecurity/CVE-2022-1388-Exploit-POC
- https://github.com/alt3kx/CVE-2022-1388_PoC
- https://github.com/F5Networks/f5-azure-arm-templates-v2
- https://github.com/BushidoUK/BushidoUK
- https://github.com/blind-intruder/Exploit-CVE
- https://github.com/Al1ex/CVE-2022-1388
- https://github.com/yukar1z0e/CVE-2022-1388
- https://github.com/Str1am/my-nuclei-templates
- https://github.com/hackeyes/CVE-2022-1388-POC
- https://github.com/omnigodz/CVE-2022-1388
- https://github.com/Osyanina/westone-CVE-2022-1388-scanner
- https://github.com/Vulnmachines/F5-Big-IP-CVE-2022-1388
- https://github.com/bandit92/CVE2022-1388_TestAPI
- https://github.com/Angus-Team/F5-BIG-IP-RCE-CVE-2022-1388
- https://github.com/ExploitPwner/CVE-2022-1388-BIG-IP-Mass-Exploit
- https://github.com/pauloink/CVE-2022-1388
- https://github.com/shamo0/CVE-2022-1388
- https://github.com/Holyshitbruh/2022-2021-F5-BIG-IP-IQ-RCE
- https://github.com/bytecaps/F5-BIG-IP-RCE-Check
- https://github.com/bfengj/CTF
- https://github.com/trhacknon/CVE-2022-1388-RCE-checker
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/f5_icontrol_rce.rb
- https://github.com/getdrive/F5-BIG-IP-exploit
- https://github.com/qusaialhaddad/F5-BigIP-CVE-2022-1388
- https://github.com/superzerosec/poc-exploit-index
- https://github.com/vesperp/CVE-2022-1388-F5-BIG-IP
- https://github.com/savior-only/CVE-2022-1388
- https://github.com/ExploitPwner/CVE-2022-1388
- https://github.com/F5Networks/f5-azure-arm-templates
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/0xf4n9x/CVE-2022-1388
- https://github.com/sherlocksecurity/CVE-2022-1388_F5_BIG-IP_RCE
- https://github.com/dravenww/curated-article
- https://github.com/F5Networks/f5-aws-cloudformation-v2
- https://github.com/0xAgun/CVE-2022-1388
- https://github.com/iveresk/cve-2022-1388-iveresk-command-shell
- https://github.com/blind-intruder/CVE-2022-1388-RCE-checker
- https://github.com/luck-ying/Library-POC
- https://github.com/iveresk/cve-2022-1388-1veresk
- https://github.com/PsychoSec2/CVE-2022-1388-POC
- https://github.com/numanturle/CVE-2022-1388
- https://github.com/F5Networks/f5-aws-cloudformation
- https://github.com/F5Networks/f5-google-gdm-templates-v2
- https://github.com/Wrin9/POC
- https://github.com/Stonzyy/Exploit-F5-CVE-2022-1388
- https://github.com/superzerosec/CVE-2022-1388
- https://github.com/chesterblue/CVE-2022-1388
- https://github.com/SecTheBit/CVE-2022-1388
- https://github.com/Henry4E36/CVE-2022-1388
- https://github.com/Zeyad-Azima/CVE-2022-1388
- https://github.com/mr-vill4in/CVE-2022-1388
- https://github.com/signorrayan/RedTeam_toolkit
- https://github.com/LinJacck/CVE-2022-1388-EXP
- https://github.com/ZephrFish/F5-CVE-2022-1388-Exploit
- https://github.com/bytecaps/CVE-2022-1388-EXP
- https://github.com/kuznyJan1972/cve-2022-1388-mass
- https://github.com/AmirHoseinTangsiriNET/CVE-2022-1388-Scanner
- https://github.com/MrCl0wnLab/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter
- https://github.com/mcdulltii/CVE-2022-1329
- https://github.com/AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit
- https://github.com/Grazee/CVE-2022-1329-WordPress-Elementor-RCE
- https://github.com/Maverick-cmd/Chrome-and-Edge-Version-Dumper
- https://github.com/oxy-compsci/tech-in-the-news
- https://github.com/killvxk/CVE-2022-1040
- https://github.com/cve-hunter/CVE-2022-1040-sophos-rce
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-1040.yaml
- https://github.com/Seatwe/CVE-2022-1040-rce
- https://github.com/yaobinwen/robin_on_rails
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/zanezhub/CVE-2022-1015-1016
- https://github.com/pqlx/CVE-2022-1015
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/B0nfee/CVE-2022-0995
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/Awrrays/Pentest-Tips
- https://github.com/frankzappasmustache/starred-repos
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/bsauce/kernel-security-learning
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/cve_2022_0995_watch_queue.rb
- https://github.com/Bonfee/CVE-2022-0995
- https://github.com/Metarget/metarget
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/tanjiti/sec_profile
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/d3ltacros/d3ltacros
- https://github.com/dskmehra/CVE-2022-0848
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/Al1ex/CVE-2022-0847
- https://github.com/AyoubNajim/cve-2022-0847dirtypipe-exploit
- https://github.com/ahrixia/CVE_2022_0847
- https://github.com/antx-code/CVE-2022-0847
- https://github.com/2xYuan/CVE-2022-0847
- https://github.com/bbaranoff/CVE-2022-0847
- https://github.com/pentestblogin/pentestblog-CVE-2022-0847
- https://github.com/dadhee/CVE-2022-0847_DirtyPipeExploit
- https://github.com/bohr777/cve-2022-0847dirtypipe-exploit
- https://github.com/d-rn/vulBox
- https://github.com/puckiestyle/CVE-2022-0847
- https://github.com/boy-hack/zsxq
- https://github.com/Nekoox/dirty-pipe
- https://github.com/DylanBarbe/dirty-pipe-clone-4-root
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/xnderLAN/CVE-2022-0847
- https://github.com/isaiahsimeone/COMP3320-VAPT
- https://github.com/knqyf263/CVE-2022-0847
- https://github.com/tstromberg/ioc-bench
- https://github.com/PenTestical/linpwn
- https://github.com/breachnix/dirty-pipe-poc
- https://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-Exploit
- https://github.com/realbatuhan/dirtypipetester
- https://github.com/terabitSec/dirtyPipe-automaticRoot
- https://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit
- https://github.com/babyshen/CVE-2022-0847
- https://github.com/liamg/liamg
- https://github.com/rexpository/linux-privilege-escalation
- https://github.com/LudovicPatho/CVE-2022-0847
- https://github.com/Patocoh/Research-Dirty-Pipe
- https://github.com/kun-g/Scraping-Github-trending
- https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits
- https://github.com/tmoneypenny/CVE-2022-0847
- https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe-
- https://github.com/V0WKeep3r/CVE-2022-0847-DirtyPipe-Exploit
- https://github.com/NetKingJ/awesome-android-security
- https://github.com/nanaao/Dirtypipe-exploit
- https://github.com/si1ent-le/CVE-2022-0847
- https://github.com/Awrrays/Pentest-Tips
- https://github.com/r1is/CVE-2022-0847
- https://github.com/peterspbr/dirty-pipe-otw
- https://github.com/stfnw/Debugging_Dirty_Pipe_CVE-2022-0847
- https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847
- https://github.com/pen4uin/awesome-cloud-native-security
- https://github.com/febinrev/dirtypipez-exploit
- https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit
- https://github.com/sarutobi12/sarutobi12
- https://github.com/jamesbrunet/dirtypipe-writeup
- https://github.com/GibzB/THM-Captured-Rooms
- https://github.com/LP-H4cmilo/CVE-2022-0847_DirtyPipe_Exploits
- https://github.com/crowsec-edtech/Dirty-Pipe
- https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/logit507/logit507
- https://github.com/arttnba3/CVE-2022-0847
- https://github.com/gyaansastra/CVE-2022-0847
- https://github.com/nanaao/dirtyPipe-automaticRoot
- https://github.com/Ignitetechnologies/Linux-Privilege-Escalation
- https://github.com/tufanturhan/CVE-2022-0847-L-nux-PrivEsc
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/cve_2022_0847_dirtypipe.rb
- https://github.com/xndpxs/CVE-2022-0847
- https://github.com/pen4uin/cloud-native-security
- https://github.com/michaelklaan/CVE-2022-0847-Dirty-Pipe
- https://github.com/trhacknon/dirtypipez-exploit
- https://github.com/hktalent/TOP
- https://github.com/0xsyr0/OSCP
- https://github.com/mhanief/dirtypipe
- https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker
- https://github.com/logm1lo/CVE-2022-0847_DirtyPipe_Exploits
- https://github.com/CYB3RK1D/CVE-2022-0847-POC
- https://github.com/eremus-dev/Dirty-Pipe-sudo-poc
- https://github.com/marksowell/my-stars
- https://github.com/imfiver/CVE-2022-0847
- https://github.com/iohubos/iohubos
- https://github.com/eric-glb/dirtypipe
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe
- https://github.com/hoanbi1812000/hoanbi1812000
- https://github.com/Getshell/LinuxTQ
- https://github.com/lucksec/CVE-2022-0847
- https://github.com/VinuKalana/DirtyPipe-CVE-2022-0847
- https://github.com/4luc4rdr5290/CVE-2022-0847
- https://github.com/marksowell/stars
- https://github.com/DataDog/dirtypipe-container-breakout-poc
- https://github.com/IHenakaarachchi/debian11-dirty_pipe-patcher
- https://github.com/siberiah0h/CVE-CNVD-HUB
- https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit
- https://github.com/edsonjt81/CVE-2022-0847-Linux
- https://github.com/LudovicPatho/CVE-2022-0847_dirty-pipe
- https://github.com/notmariekondo/notmariekondo
- https://github.com/badboycxcc/script
- https://github.com/hugs42/infosec
- https://github.com/veritas501/pipe-primitive
- https://github.com/mrchucu1/CVE-2022-0847-Docker
- https://github.com/brant-ruan/poc-demo
- https://github.com/T4t4ru/CVE-2022-0847
- https://github.com/Udyz/CVE-2022-0847
- https://github.com/uhub/awesome-c
- https://github.com/chenaotian/CVE-2022-0847
- https://github.com/marksowell/starred
- https://github.com/crusoe112/DirtyPipePython
- https://github.com/DanaEpp/pwncat_dirtypipe
- https://github.com/wpressly/exploitations
- https://github.com/0xIronGoat/dirty-pipe
- https://github.com/carlosevieira/Dirty-Pipe
- https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/DylanBarbe/hj
- https://github.com/liamg/traitor
- https://github.com/polygraphene/DirtyPipe-Android
- https://github.com/bsauce/kernel-security-learning
- https://github.com/rahul1406/cve-2022-0847dirtypipe-exploit
- https://github.com/edsonjt81/Linux-Privilege-Escalation
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/teamssix/container-escape-check
- https://github.com/Shotokhan/cve_2022_0847_shellcode
- https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker
- https://github.com/kaosagnt/ansible-everyday
- https://github.com/drapl0n/dirtypipe
- https://github.com/Metarget/metarget
- https://github.com/d3ltacros/d3ltacros
- https://github.com/cryst4lliz3/CVE-2022-0824
- https://github.com/p0rkan0x/CVE-Collection
- https://github.com/honypot/CVE-2022-0824
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/faisalfs10x/Webmin-CVE-2022-0824-revshell
- https://github.com/hktalent/TOP
- https://github.com/0xUhaw/CVE-2022-0778
- https://github.com/yywing/cve-2022-0778
- https://github.com/drago-96/CVE-2022-0778
- https://github.com/jmartinezl/jmartinezl
- https://github.com/vulhub/vulhub/tree/master/openssl/CVE-2022-0778
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/fdl66/openssl-1.0.2u-fix-cve
- https://github.com/halon/changelog
- https://github.com/spaquet/docker-alpine-mailcatcher
- https://github.com/hktalent/TOP
- https://github.com/BobTheShoplifter/CVE-2022-0778-POC
- https://github.com/wllm-rbnt/asn1template
- https://github.com/jkakavas/CVE-2022-0778-POC
- https://github.com/bfengj/CTF
- https://github.com/Newbee740/REDIS-CVE-2022-0543
- https://github.com/zyylhn/zscan
- https://github.com/aodsec/CVE-2022-0543
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/zyylhn/redis_rce
- https://github.com/vulhub/vulhub/tree/master/redis/CVE-2022-0543
- https://github.com/HACK-THE-WORLD/DailyMorningReading
- https://github.com/d-rn/vulBox
- https://github.com/yuyan-sec/RedisEXP
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/redis/redis_debian_sandbox_escape.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-0543.yaml
- https://github.com/sam8k/Dynamic-and-Static-Analysis-of-SOUPs
- https://github.com/marksowell/starred
- https://github.com/teamssix/container-escape-check
- https://github.com/chenaotian/CVE-2022-0492
- https://github.com/cdk-team/CDK
- https://github.com/marksowell/stars
- https://github.com/Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2022-0492
- https://github.com/puckiestyle/CVE-2022-0492
- https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492
- https://github.com/JadenQ/Cloud-Computing-Security-ProjectPage
- https://github.com/bigpick/cve-reading-list
- https://github.com/marksowell/my-stars
- https://github.com/Metarget/metarget
- https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-0482.yaml
- https://github.com/Acceis/exploit-CVE-2022-0482
- https://github.com/biulove0x/CVE-2022-0441
- https://github.com/enesamaafkolan/enesamaafkolan
- https://github.com/ezelnur6327/enesamaafkolan
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/http/wp_masterstudy_privesc.rb
- https://github.com/dwisiswant0/awesome-oneliner-bugbounty
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2022/CVE-2022-0378.yaml
- https://github.com/litt1eb0yy/One-Liner-Scripts
- https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
- https://github.com/hktalent/TOP
- https://github.com/Puliczek/puliczek
- https://github.com/pipiscrew/timeline
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/numanturle/CVE-2022-0332
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/hac425xxx/heap-exploitation-in-real-world
- https://github.com/discordianfish/cve-2022-0185-crash-poc
- https://github.com/Metarget/metarget
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/featherL/CVE-2022-0185-exploit
- https://github.com/Crusaders-of-Rust/CVE-2022-0185
- https://github.com/arveske/Github-language-trends
- https://github.com/bigpick/cve-reading-list
- https://github.com/khaclep007/CVE-2022-0185
- https://github.com/chenaotian/CVE-2022-25636
- https://github.com/bsauce/kernel-security-learning
- https://github.com/nestybox/sysbox
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/veritas501/CVE-2022-0185-PipeVersion
- https://github.com/joydo/CVE-Writeups
- https://github.com/nestybox/sysbox-ee
- https://github.com/chenaotian/CVE-2022-0185
- https://github.com/shahparkhan/cve-2022-0185
- https://github.com/veritas501/pipe-primitive
- https://github.com/hktalent/TOP
- https://github.com/mrbungle64/ioBroker.ecovacs-deebot
- https://github.com/mrbungle64/node-red-contrib-ecovacs-deebot
- https://github.com/MaySoMusician/geidai-ikoi
- https://github.com/git-kick/ioBroker.e3dc-rscp
- https://github.com/mrbungle64/ecovacs-deebot.js
- https://github.com/mrbungle64/ioBroker.switchbot-ble
- https://github.com/Tsuki124/crawlab-sdk
- https://github.com/Tsuki124/crawlab-db
- https://github.com/dadav/scf
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Henry4E36/CVE-2021-46417
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-46417.yaml
- https://github.com/febinrev/CVE-2021-46398_Chamilo-LMS-RCE
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/akiraabe/myapp-container-jaxrs
- https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2021-46143
- https://github.com/plsanu/CVE-2021-46080
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Cross-Site-Request-Forgery-CSRF-Leads-to-XSS
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Html-Injection
- https://github.com/plsanu/CVE-2021-46079
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting
- https://github.com/plsanu/CVE-2021-46078
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Code-Execution
- https://github.com/plsanu/CVE-2021-46076
- https://github.com/plsanu/CVE-2021-46075
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Privilege-Escalation-Leads-to-CRUD-Operations
- https://github.com/plsanu/Vehicle-Service-Management-System-Settings-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46074
- https://github.com/plsanu/Vehicle-Service-Management-System-User-List-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46073
- https://github.com/plsanu/CVE-2021-46072
- https://github.com/plsanu/Vehicle-Service-Management-System-Service-List-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46071
- https://github.com/plsanu/Vehicle-Service-Management-System-Service-Requests-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46070
- https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46069
- https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46068
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover
- https://github.com/plsanu/CVE-2021-46067
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-46005.yaml
- https://github.com/nawed20002/CVE-2021-46005
- https://github.com/akiraabe/myapp-container-jaxrs
- https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2021-45960
- https://github.com/9lyph/CVE-2021-45901
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/enesamaafkolan/enesamaafkolan
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/plsanu/CVE-2021-45745
- https://github.com/plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-45744
- https://github.com/plsanu/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/GYLQ/CVE-2021-45232-RCE
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/apache-apisix-unauth-api-cve-2021-45232.yaml
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/Osyanina/westone-CVE-2021-45232-scanner
- https://github.com/yggcwhat/CVE-2021-45232
- https://github.com/bigblackhat/oFx
- https://github.com/jxpsx/CVE-2021-45232-RCE
- https://github.com/yggcwhat/Demo
- https://github.com/Ilovewomen/cve-2021-45232
- https://github.com/wuppp/cve-2021-45232-exp
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/badboycxcc/CVE-2021-45232-POC
- https://github.com/Ifory885/CVE-2021-45232
- https://github.com/Mr-xn/CVE-2022-24112
- https://github.com/0x0021h/expbox
- https://github.com/Kuibagit/CVE-2021-45232-RCE
- https://github.com/Nefcore/MatchX
- https://github.com/itxfahdi/-cve-2021-45232
- https://github.com/Greetdawn/Apache-APISIX-dashboard-RCE
- https://github.com/openx-org/BLEN
- https://github.com/LTiDi2000/CVE-2021-45232
- https://github.com/YutuSec/Apisix_Crack
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-45232.yaml
- https://github.com/Cybereason/Logout4Shell
- https://github.com/NCSC-NL/log4shell
- https://github.com/watson-developer-cloud/assistant-with-discovery
- https://github.com/NiftyBank/java-app
- https://github.com/pravin-pp/log4j2-CVE-2021-45105
- https://github.com/fox-it/log4j-finder
- https://github.com/tejas-nagchandi/CVE-2021-45105
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/dtact/divd-2021-00038--log4j-scanner
- https://github.com/dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/thl-cmk/CVE-log4j-check_mk-plugin
- https://github.com/dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v
- https://github.com/darkarnium/Log4j-CVE-Detect
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105
- https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228
- https://github.com/davejwilson/azure-spark-pools-log4j
- https://github.com/phax/phoss-directory
- https://github.com/dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105-1
- https://github.com/phax/ph-oton
- https://github.com/binkley/modern-java-practices
- https://github.com/tcoliver/IBM-SPSS-log4j-fixes
- https://github.com/Qualys/log4jscanwin
- https://github.com/1lann/log4shelldetect
- https://github.com/Cyb3rWard0g/log4jshell-lab
- https://github.com/AlvaroMartinezQ/clickandbuy
- https://github.com/mosaic-hgw/jMeter
- https://github.com/whitesource/log4j-detect-distribution
- https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
- https://github.com/CUBETIQ/cubetiq-security-advisors
- https://github.com/imTigger/webapp-hardware-bridge
- https://github.com/jfrog/log4j-tools
- https://github.com/mergebase/csv-compare
- https://github.com/srhercules/log4j_mass_scanner
- https://github.com/sakuraji-labs/log4j-remediation
- https://github.com/hupe1980/scan4log4shell
- https://github.com/jacobalberty/unifi-docker
- https://github.com/tmax-cloud/install-EFK
- https://github.com/phax/phase4
- https://github.com/iAmSOScArEd/log4j2_dos_exploit
- https://github.com/CptOfEvilMinions/ChooseYourSIEMAdventure
- https://github.com/Cosmo-Tech/azure-digital-twins-simulator-connector
- https://github.com/cckuailong/Log4j_dos_CVE-2021-45105
- https://github.com/mergebase/log4j-detector
- https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
- https://github.com/whalehub/awesome-stars
- https://github.com/hktalent/TOP
- https://github.com/hillu/local-log4j-vuln-scanner
- https://github.com/HackJava/HackLog4j2
- https://github.com/HackJava/Log4j2
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-45092.yaml
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/enesamaafkolan/enesamaafkolan
- https://github.com/fox-it/log4j-finder
- https://github.com/CaptanMoss/Log4Shell-Sandbox-Signature
- https://github.com/Diverto/nse-log4shell
- https://github.com/back2root/log4shell-rex
- https://github.com/Diablo5G/Certification-Prep
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/davejwilson/azure-spark-pools-log4j
- https://github.com/alexbakker/log4shell-tools
- https://github.com/BobTheShoplifter/CVE-2021-45046-Info
- https://github.com/whitesource-ps/ws-bulk-report-generator
- https://github.com/integralads/dependency-deep-scan-utilities
- https://github.com/apache/solr-docker
- https://github.com/Qualys/log4jscanwin
- https://github.com/dileepdkumar/https-github.com-cisagov-log4j-affected-dbv2
- https://github.com/nlmaca/Wowza_Installers
- https://github.com/Cyb3rWard0g/log4jshell-lab
- https://github.com/lijiejie/log4j2_vul_local_scanner
- https://github.com/X1pe0/Log4J-Scan-Win
- https://github.com/jfrog/log4j-tools
- https://github.com/srhercules/log4j_mass_scanner
- https://github.com/phax/phase4
- https://github.com/mergebase/log4j-detector
- https://github.com/NUMde/compass-num-conformance-checker
- https://github.com/whalehub/awesome-stars
- https://github.com/cckuailong/Log4j_CVE-2021-45046
- https://github.com/HackJava/Log4j2
- https://github.com/Cybereason/Logout4Shell
- https://github.com/mergebase/log4j-samples
- https://github.com/newrelic-experimental/nr-find-log4j
- https://github.com/census-instrumentation/opencensus-java
- https://github.com/jfrog/jfrog-cli-plugins-reg
- https://github.com/phax/ph-oton
- https://github.com/binkley/modern-java-practices
- https://github.com/tcoliver/IBM-SPSS-log4j-fixes
- https://github.com/justb4/docker-jmeter
- https://github.com/triw0lf/Security-Matters-22
- https://github.com/mergebase/csv-compare
- https://github.com/taise-hub/log4j-poc
- https://github.com/hupe1980/scan4log4shell
- https://github.com/jacobalberty/unifi-docker
- https://github.com/cowbe0x004/cowbe0x004
- https://github.com/0xsyr0/Log4Shell
- https://github.com/tmax-cloud/install-EFK
- https://github.com/hypertrace/hypertrace
- https://github.com/hktalent/TOP
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-45046.yaml
- https://github.com/dtact/divd-2021-00038--log4j-scanner
- https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation
- https://github.com/thl-cmk/CVE-log4j-check_mk-plugin
- https://github.com/darkarnium/Log4j-CVE-Detect
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/radiusmethod/awesome-gists
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/log4shell_scanner.rb
- https://github.com/Vr00mm/log4j-article
- https://github.com/zhzyker/logmap
- https://github.com/1lann/log4shelldetect
- https://github.com/allegroai/clearml-server
- https://github.com/pravin-pp/log4j2-CVE-2021-45046
- https://github.com/whitesource/log4j-detect-distribution
- https://github.com/CUBETIQ/cubetiq-security-advisors
- https://github.com/imTigger/webapp-hardware-bridge
- https://github.com/yahoo/check-log4j
- https://github.com/infiniroot/nginx-mitigate-log4shell
- https://github.com/Awisefew/Lof4j
- https://github.com/Staubgeborener/stars
- https://github.com/xsultan/log4jshield
- https://github.com/4ra1n/4ra1n
- https://github.com/CptOfEvilMinions/ChooseYourSIEMAdventure
- https://github.com/forcedotcom/Analytics-Cloud-Dataset-Utils
- https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
- https://github.com/adelarsq/awesome-bugs
- https://github.com/hillu/local-log4j-vuln-scanner
- https://github.com/HackJava/HackLog4j2
- https://github.com/NCSC-NL/log4shell
- https://github.com/lukepasek/log4jjndilookupremove
- https://github.com/NiftyBank/java-app
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/insignit/cve-informatie
- https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent
- https://github.com/LoliKingdom/NukeJndiLookupFromLog4j
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/CERTCC/CVE-2021-44228_scanner
- https://github.com/sourcegraph/log4j-cve-code-search-resources
- https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228
- https://github.com/corretto/hotpatch-for-apache-log4j2
- https://github.com/phax/phoss-directory
- https://github.com/tejas-nagchandi/CVE-2021-45046
- https://github.com/docker-solr/docker-solr
- https://github.com/rtkwlf/wolf-tools
- https://github.com/kdpuvvadi/Omada-Ansible
- https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
- https://github.com/lhotari/Log4Shell-mitigation-Dockerfile-overlay
- https://github.com/ludy-dev/cve-2021-45046
- https://github.com/eventsentry/scripts
- https://github.com/Whoaa512/starred
- https://github.com/mitiga/log4shell-everything
- https://github.com/fullhunt/log4j-scan
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-45043.yaml
- https://github.com/g30rgyth3d4rk/cve-2021-45043
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/NiftyBank/java-app
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/dtact/divd-2021-00038--log4j-scanner
- https://github.com/cckuailong/log4j_RCE_CVE-2021-44832
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/thl-cmk/CVE-log4j-check_mk-plugin
- https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228
- https://github.com/phax/ph-oton
- https://github.com/aws/aws-msk-iam-auth
- https://github.com/tcoliver/IBM-SPSS-log4j-fixes
- https://github.com/Qualys/log4jscanwin
- https://github.com/nlmaca/Wowza_Installers
- https://github.com/mosaic-hgw/jMeter
- https://github.com/salesforce-marketingcloud/FuelSDK-Java
- https://github.com/whitesource/log4j-detect-distribution
- https://github.com/mergebase/csv-compare
- https://github.com/domwood/kiwi-kafka
- https://github.com/srhercules/log4j_mass_scanner
- https://github.com/marklogic/marklogic-contentpump
- https://github.com/YunDingLab/fix_log4j2
- https://github.com/tmax-cloud/install-EFK
- https://github.com/name/log4j
- https://github.com/tachtler/browscap4jFileReader
- https://github.com/mergebase/log4j-detector
- https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
- https://github.com/hillu/local-log4j-vuln-scanner
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/Mister-Joe/CVE-2021-44593
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/jax7sec/CVE-2021-44529
- https://github.com/jkana/CVE-2021-44529
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-44529.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-44521.yaml
- https://github.com/QHpix/CVE-2021-44521
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/jonathanscheibel/PyNmap
- https://github.com/helloexp/0day
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/gauthamg/log4j2021_vul_test
- https://github.com/kanitan/log4j2-web-vulnerable
- https://github.com/emadshanab/Nuclei-Templates-Collection
- https://github.com/eclipse-scout/scout.rt
- https://github.com/qingtengyun/cve-2021-44228-qingteng-patch
- https://github.com/git-bom/bomsh
- https://github.com/archongum/cve-2021-44228-log4j
- https://github.com/asyzdykov/cve-2021-44228-fix-jars
- https://github.com/0xThiebaut/CVE-2021-44228
- https://github.com/Diablo5G/Certification-Prep
- https://github.com/atnetws/fail2ban-log4j
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/111coding/log4j_temp_CVE-2021-44228
- https://github.com/getsentry/sentry-java
- https://github.com/mark-5-9/mark59-wip
- https://github.com/tasooshi/horrors-log4shell
- https://github.com/vdenotaris/spring-boot-security-saml-sample
- https://github.com/vorburger/Log4j_CVE-2021-44228
- https://github.com/integralads/dependency-deep-scan-utilities
- https://github.com/AnYi-Sec/Log4j-CVE-2021-44228-EXP
- https://github.com/s-retlaw/l4srs
- https://github.com/Qualys/log4jscanwin
- https://github.com/lamyongxian/crmmvc
- https://github.com/pmontesd/log4j-cve-2021-44228
- https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab
- https://github.com/Occamsec/log4j-checker
- https://github.com/KeysAU/Get-log4j-Windows.ps1
- https://github.com/metodidavidovic/log4j-quick-scan
- https://github.com/srhercules/log4j_mass_scanner
- https://github.com/r00thunter/Log4Shell
- https://github.com/gyaansastra/CVE-2021-44228
- https://github.com/stefmolin/Holiday-Hack-Challenge-2021
- https://github.com/f0ng/log4j2burpscanner
- https://github.com/AndriyKalashnykov/spring-on-k8s
- https://github.com/cryptoforcecommand/log4j-cve-2021-44228
- https://github.com/s-ribeiro/Modsecurity-Rules
- https://github.com/NUMde/compass-num-conformance-checker
- https://github.com/zlepper/CVE-2021-44228-Test-Server
- https://github.com/JOG-NTMK/log4shell-exploit
- https://github.com/BachoSeven/stellestelline
- https://github.com/zan8in/afrog
- https://github.com/DragonSurvivalEU/RCE
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/jrocia/Search-log4Jvuln-AppScanSTD
- https://github.com/crypt0jan/log4j-powershell-checker
- https://github.com/jfrog/jfrog-cli-plugins-reg
- https://github.com/HaveFun83/awesome-stars
- https://github.com/halibobor/log4j2
- https://github.com/Nanitor/log4fix
- https://github.com/tica506/Siem-queries-for-CVE-2021-44228
- https://github.com/felipe8398/ModSec-log4j2
- https://github.com/myyxl/cve-2021-44228-minecraft-poc
- https://github.com/promregator/promregator
- https://github.com/uint0/cve-2021-44228--spring-hibernate
- https://github.com/alastria/alastria-node-besu-legacy
- https://github.com/binkley/modern-java-practices
- https://github.com/hotpotcookie/log4shell-white-box
- https://github.com/tcoliver/IBM-SPSS-log4j-fixes
- https://github.com/Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228
- https://github.com/goofball222/unifi
- https://github.com/ExploitPwner/CVE-2022-1388-BIG-IP-Mass-Exploit
- https://github.com/openx-org/BLEN
- https://github.com/wanetty/wanetty.github.io
- https://github.com/strawhatasif/log4j-test
- https://github.com/hotpotcookie/lol4j-white-box
- https://github.com/jacobalberty/unifi-docker
- https://github.com/Labout/log4shell-rmi-poc
- https://github.com/sudo6/l4shunter
- https://github.com/Glease/Healer
- https://github.com/jaspervanderhoek/MicroflowScheduledEventManager
- https://github.com/JagarYousef/log4j-dork-scanner
- https://github.com/FraunhoferIOSB/FROST-Server
- https://github.com/suniastar/scan-log4shell
- https://github.com/veo/vscan
- https://github.com/dotPY-hax/log4py
- https://github.com/0xDexter0us/Log4J-Scanner
- https://github.com/corelight/cve-2021-44228
- https://github.com/snyk-labs/awesome-log4shell
- https://github.com/DANSI/PowerShell-Log4J-Scanner
- https://github.com/cyberxml/log4j-poc
- https://github.com/uli-heller/spring-boot-logback
- https://github.com/darkarnium/Log4j-CVE-Detect
- https://github.com/kward/log4sh
- https://github.com/typelevel/log4cats
- https://github.com/ben-smash/l4j-info
- https://github.com/KeysAU/Get-log4j-Windows-local
- https://github.com/chilliwebs/CVE-2021-44228_Example
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/log4shell_header_injection.rb
- https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228
- https://github.com/cloudera/cloudera-scripts-for-log4j
- https://github.com/paulvkitor/log4shellwithlog4j2_13_3
- https://github.com/J0B10/Minzomat
- https://github.com/shivakumarjayaraman/log4jvulnerability-CVE-2021-44228
- https://github.com/p3dr16k/log4j-1.2.15-mod
- https://github.com/byteboycn/CVE-2021-44228-Apache-Log4j-Rce
- https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator
- https://github.com/dbzoo/log4j_scanner
- https://github.com/obscuritylabs/log4shell-poc-lab
- https://github.com/yahoo/check-log4j
- https://github.com/wheez-y/CVE-2021-44228-kusto
- https://github.com/nroduit/Weasis
- https://github.com/markuman/aws-log4j-mitigations
- https://github.com/roticagas/CVE-2021-44228-Demo
- https://github.com/Awisefew/Lof4j
- https://github.com/Gyrfalc0n/scanlist-log4j
- https://github.com/kossatzd/log4j-CVE-2021-44228-test
- https://github.com/Goqi/ELong
- https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs
- https://github.com/Szczurowsky/Log4j-0Day-Fix
- https://github.com/Aschen/log4j-patched
- https://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228
- https://github.com/honypot/CVE-2021-44228
- https://github.com/hillu/local-log4j-vuln-scanner
- https://github.com/Hydragyrum/evil-rmi-server
- https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent
- https://github.com/chatpal/chatpal-search-standalone
- https://github.com/mr-r3b00t/CVE-2021-44228
- https://github.com/LoliKingdom/NukeJndiLookupFromLog4j
- https://github.com/Camphul/log4shell-spring-framework-research
- https://github.com/ToxicEnvelope/XSYS-Log4J2Shell-Ex
- https://github.com/standb/CVE-2021-44228-poc
- https://github.com/mss/log4shell-hotfix-side-effect
- https://github.com/Awrrays/FrameVul
- https://github.com/sinakeshmiri/log4jScan
- https://github.com/StandB/CVE-2021-44228-poc
- https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228
- https://github.com/mguessan/davmail
- https://github.com/lhotari/log4shell-mitigation-tester
- https://github.com/rakutentech/jndi-ldap-test-server
- https://github.com/timkanbur/Log4j_Exploit_Paper
- https://github.com/corretto/hotpatch-for-apache-log4j2
- https://github.com/mazhar-hassan/log4j-vulnerability
- https://github.com/OlafHaalstra/log4jcheck
- https://github.com/localstack/localstack-java-utils
- https://github.com/0xInfection/LogMePwn
- https://github.com/razz0r/CVE-2021-44228-Mass-RCE
- https://github.com/FeryaelJustice/Log4Shell
- https://github.com/cisagov/Malcolm
- https://github.com/corneacristian/Log4J-CVE-2021-44228-RCE
- https://github.com/UltraVanilla/LogJackFix
- https://github.com/cbuschka/log4j2-rce-recap
- https://github.com/zzzz0317/log4j2-vulnerable-spring-app
- https://github.com/m0rath/detect-log4j-exploitable
- https://github.com/ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228
- https://github.com/OsiriX-Foundation/karnak
- https://github.com/JiuBanSec/Log4j-CVE-2021-44228
- https://github.com/Vulnmachines/log4j-cve-2021-44228
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/ubiquiti_unifi_log4shell.rb
- https://github.com/mn-io/log4j-spring-vuln-poc
- https://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228
- https://github.com/nedenwalker/spring-boot-app-using-gradle
- https://github.com/vorburger/Learning-Log4j2
- https://github.com/ArkAngeL43/f-for-java
- https://github.com/racoon-rac/CVE-2021-44228
- https://github.com/mklinkj/log4j2-test
- https://github.com/vendia/blog
- https://github.com/kek-Sec/log4j-scanner-CVE-2021-44228
- https://github.com/fox-it/log4j-finder
- https://github.com/Diverto/nse-log4shell
- https://github.com/isuruwa/Log4j
- https://github.com/lucab85/log4j-cve-2021-44228
- https://github.com/snow0715/log4j-Scan-Burpsuite
- https://github.com/BabooPan/Log4Shell-CVE-2021-44228-Demo
- https://github.com/davejwilson/azure-spark-pools-log4j
- https://github.com/datadavev/test-44228
- https://github.com/WatchGuard-Threat-Lab/log4shell-iocs
- https://github.com/M1ngGod/CVE-2021-44228-Log4j-lookup-Rce
- https://github.com/4jfinder/4jfinder.github.io
- https://github.com/Neo23x0/log4shell-detector
- https://github.com/atlassion/RS4LOGJ-CVE-2021-44228
- https://github.com/nccgroup/log4j-jndi-be-gone
- https://github.com/aajuvonen/log4stdin
- https://github.com/jan-muhammad-zaidi/Log4j-CVE-2021-44228
- https://github.com/Astrogeorgeonethree/Starred
- https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads
- https://github.com/jfrog/log4j-tools
- https://github.com/y35uishere/Log4j2-CVE-2021-44228
- https://github.com/unlimitedsola/log4j2-rce-poc
- https://github.com/angristan/awesome-stars
- https://github.com/s-retlaw/l4s_poc
- https://github.com/MiguelM001/vulescanjndilookup
- https://github.com/kdgregory/log4j-aws-appenders
- https://github.com/helsecert/CVE-2021-44228
- https://github.com/momos1337/Log4j-RCE
- https://github.com/mergebase/log4j-detector
- https://github.com/R0Wi/elasticsearch-nextcloud-docker
- https://github.com/claranet/ansible-role-log4shell
- https://github.com/cckuailong/Log4j_CVE-2021-45046
- https://github.com/jas502n/Log4j2-CVE-2021-44228
- https://github.com/zane00/CVE-2021-44228
- https://github.com/HackJava/Log4j2
- https://github.com/taurusxin/CVE-2021-44228
- https://github.com/Cybereason/Logout4Shell
- https://github.com/alenazi90/log4j
- https://github.com/trickyearlobe/inspec-log4j
- https://github.com/semelnyk/CVE-2021-44228-ScannersListFromRF
- https://github.com/honypot/CVE-2021-44228-vuln-app
- https://github.com/zlatinb/mucats
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/cyr-riv/rpi4-squid-elk
- https://github.com/NatteeSetobol/Log4JPOC
- https://github.com/mr-vill4in/log4j-fuzzer
- https://github.com/alexzeitgeist/starred
- https://github.com/NorthwaveSecurity/log4jcheck
- https://github.com/schnatterer/smeagol-galore
- https://github.com/zjx/CVE-2021-44228
- https://github.com/Dmitriy-area51/Exploit
- https://github.com/petebuffon/launcher-ot-minecraft
- https://github.com/MkTech-0-8YT3/CVE-2021-44228
- https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local
- https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector
- https://github.com/ochrance-cz/web
- https://github.com/quoll/mulgara
- https://github.com/justb4/docker-jmeter
- https://github.com/KainsRache/anti-jndi
- https://github.com/bumheehan/cve-2021-44228-log4j-test
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/vmware_vcenter_log4shell.rb
- https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes
- https://github.com/mergebase/csv-compare
- https://github.com/safe6Sec/CodeqlNote
- https://github.com/hupe1980/scan4log4shell
- https://github.com/tmax-cloud/install-EFK
- https://github.com/gredler/aegis4j
- https://github.com/kubearmor/log4j-CVE-2021-44228
- https://github.com/Aviral18/log4j2-exploit-detect
- https://github.com/dbgee/CVE-2021-44228
- https://github.com/racke/ansible-role-solr
- https://github.com/andalik/log4j-filescan
- https://github.com/Kr0ff/CVE-2021-44228
- https://github.com/0-x-2-2/CVE-2021-44228
- https://github.com/hktalent/TOP
- https://github.com/0xsyr0/OSCP
- https://github.com/watson-developer-cloud/assistant-with-discovery
- https://github.com/Ravid-CheckMarx/CVE-2021-44228-Apache-Log4j-Rce-main
- https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228
- https://github.com/ReynerGonzalez/Security-Log4J-Tester
- https://github.com/GreenDelta/search-wrapper-es-rest
- https://github.com/sud0x00/log4j-CVE-2021-44228
- https://github.com/b1n4ryj4n/awesome-stars
- https://github.com/threatmonit/Log4j-IOCs
- https://github.com/solitarysp/Log4j-CVE-2021-44228
- https://github.com/kuznyJan1972/CVE-2021-44228-mass
- https://github.com/kannthu/CVE-2021-44228-Apache-Log4j-Rce
- https://github.com/dmitsuo/log4shell-war-fixer
- https://github.com/awake1t/Awesome-hacking-tools
- https://github.com/RADIUS-as-a-Service/radiusaas-docs
- https://github.com/cybersecurityworks553/log4j-shell-csw
- https://github.com/cisagov/log4j-affected-db
- https://github.com/Vulnmachines/log4jshell_CVE-2021-44228
- https://github.com/marksowell/stars
- https://github.com/manishkanyal/log4j-scanner
- https://github.com/twseptian/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab
- https://github.com/OopsieWoopsie/mc-log4j-patcher
- https://github.com/irrer/DICOMClient
- https://github.com/Adikso/minecraft-log4j-honeypot
- https://github.com/xsultan/log4jshield
- https://github.com/intel-xeon/CVE-2021-44228---detection-with-PowerShell
- https://github.com/spasam/log4j2-exploit
- https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept
- https://github.com/lohanichaten/log4j-cve-2021-44228
- https://github.com/0xalwayslucky/log4j-polkit-poc
- https://github.com/CptOfEvilMinions/ChooseYourSIEMAdventure
- https://github.com/forcedotcom/Analytics-Cloud-Dataset-Utils
- https://github.com/Cosmo-Tech/azure-digital-twins-simulator-connector
- https://github.com/avirahul007/CVE-2021-44228
- https://github.com/CrashOverflow/Log4Shell_PoC
- https://github.com/b-abderrahmane/CVE-2021-44228-playground
- https://github.com/tivuhh/log4noshell
- https://github.com/LemonCraftRu/JndiRemover
- https://github.com/xx-zhang/apache-log4j2-CVE-2021-44228
- https://github.com/mbechler/marshalsec
- https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
- https://github.com/lov3r/cve-2021-44228-log4j-exploits
- https://github.com/micha3lcve/LOG4J-mass-rce-CVE-2021-44228
- https://github.com/bmoussaud/kpack-awesome-demo
- https://github.com/leetxyz/CVE-2021-44228-Advisories
- https://github.com/NCSC-NL/log4shell
- https://github.com/sysadmin0815/Fix-Log4j-PowershellScript
- https://github.com/axelcurmi/log4shell-docker-lab
- https://github.com/guardicode/CVE-2021-44228_IoCs
- https://github.com/li0122/li0122
- https://github.com/Y0-kan/Log4jShell-Scan
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/TheInterception/Log4J-Simulation-Tool
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-44228.yaml
- https://github.com/bsigouin/log4shell-vulnerable-app
- https://github.com/binganao/Log4j2-RCE
- https://github.com/phoswald/sample-ldap-exploit
- https://github.com/rod4n4m1/hashi-vault-js
- https://github.com/geerlingguy/ansible-role-solr
- https://github.com/marksowell/starred
- https://github.com/pedrohavay/exploit-CVE-2021-44228
- https://github.com/mark-5-9/mark59-zz-temp
- https://github.com/Koupah/MC-Log4j-Patcher
- https://github.com/didoatanasov/cve-2021-44228
- https://github.com/factoidforrest/homepage
- https://github.com/roxas-tan/CVE-2021-44228
- https://github.com/cado-security/log4shell
- https://github.com/nu11secur1ty/CVE-2021-44228-VULN-APP
- https://github.com/djungeldan/Log4Me
- https://github.com/ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j
- https://github.com/creamIcec/CVE-2021-44228-Apache-Log4j-Rce__review
- https://github.com/deepfence/ThreatMapper
- https://github.com/fireeye/CVE-2021-44228
- https://github.com/Fazmin/vCenter-Server-Workaround-Script-CVE-2021-44228
- https://github.com/redhuntlabs/Log4JHunt
- https://github.com/MalwareTech/Log4jTools
- https://github.com/Apipia/log4j-pcap-activity
- https://github.com/vulhub/vulhub/tree/master/log4j/CVE-2021-44228
- https://github.com/mzlogin/CVE-2021-44228-Demo
- https://github.com/julian911015/Log4j-Scanner-Exploit
- https://github.com/Ghost-chu/CVE-2021-44228-quickfix-script
- https://github.com/kyoshiaki/docker-compose-wordpress
- https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228
- https://github.com/34zY/JNDI-Exploit-1.2-log4shell
- https://github.com/rubo77/log4j_checker_beta
- https://github.com/municipalparkingservices/CVE-2021-44228-Scanner
- https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes
- https://github.com/back2root/log4shell-rex
- https://github.com/VinniMarcon/Log4j-Updater
- https://github.com/suuhm/log4shell4shell
- https://github.com/linuxserver/docker-unifi-controller
- https://github.com/erickrr-bd/TekiumLog4jApp
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/OtherDevOpsGene/kubernetes-security-tools
- https://github.com/LiveOverflow/log4shell
- https://github.com/inettgmbh/checkmk-log4j-scanner
- https://github.com/izzyacademy/log4shell-mitigation
- https://github.com/alexbakker/log4shell-tools
- https://github.com/jyotisahu98/logpresso-CVE-2021-44228-Scanner
- https://github.com/whitesource-ps/ws-bulk-report-generator
- https://github.com/apache/solr-docker
- https://github.com/dileepdkumar/https-github.com-cisagov-log4j-affected-dbv2
- https://github.com/andrii-kovalenko-celonis/log4j-vulnerability-demo
- https://github.com/rv4l3r3/log4v-vuln-check
- https://github.com/TheArqsz/CVE-2021-44228-PoC
- https://github.com/honeynet/log4shell-data
- https://github.com/chandru-gunasekaran/log4j-fix-CVE-2021-44228
- https://github.com/NO-MONKEY/log4j_use_in_sap
- https://github.com/mitiga/log4shell-cloud-scanner
- https://github.com/pvnovarese/2022-04-suse-demo
- https://github.com/CypherpunkSamurai/here-be-stars
- https://github.com/HelifeWasTaken/log4j
- https://github.com/y-security/yLog4j
- https://github.com/tuyenee/Log4shell
- https://github.com/sassoftware/loguccino
- https://github.com/Jun-5heng/CVE-2021-44228
- https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell
- https://github.com/hex0wn/learn-java-bug
- https://github.com/takito1812/log4j-detect
- https://github.com/Fantantonio/UNIVR-FSP-2022-Project
- https://github.com/fireflyingup/log4j-poc
- https://github.com/justakazh/Log4j-CVE-2021-44228
- https://github.com/madCdan/JndiLookup
- https://github.com/FunnyWolf/Viper
- https://github.com/superfish9/pt
- https://github.com/CreeperHost/Log4jPatcher
- https://github.com/Jeromeyoung/log4j2burpscanner
- https://github.com/ChoiSG/log4shell-dockerlab
- https://github.com/CobbleSword/NachoSpigot
- https://github.com/mgreau/log4shell-cpatch
- https://github.com/newrelic-experimental/nr-find-log4j
- https://github.com/adilsoybali/Log4j-RCE-Scanner
- https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln
- https://github.com/pravin-pp/log4j2-CVE-2021-44228
- https://github.com/gitlab-de/log4j-resources
- https://github.com/alpacamybags118/log4j-cve-2021-44228-sample
- https://github.com/ssstonebraker/log4j-scan-turbo
- https://github.com/f-this/f-apache
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/BinaryDefense/log4j-honeypot-flask
- https://github.com/sdogancesur/log4j_github_repository
- https://github.com/greymd/CVE-2021-44228
- https://github.com/phax/ph-oton
- https://github.com/thomaspatzke/Log4Pot
- https://github.com/toramanemre/log4j-rce-detect-waf-bypass
- https://github.com/KONNEKTIO/konnekt-docs
- https://github.com/Contrast-Security-OSS/CVE-2021-44228
- https://github.com/marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV
- https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows
- https://github.com/guerzon/guerzon
- https://github.com/korteke/log4shell-demo
- https://github.com/0xsyr0/Log4Shell
- https://github.com/litt1eb0yy/One-Liner-Scripts
- https://github.com/hypertrace/hypertrace
- https://github.com/wajda/log4shell-test-exploit
- https://github.com/mute1997/CVE-2021-44228-research
- https://github.com/ChandanShastri/Log4j_Vulnerability_Demo
- https://github.com/morphuslabs/get-log4j-exploit-payload
- https://github.com/Toolsec/log4j-scan
- https://github.com/dtact/divd-2021-00038--log4j-scanner
- https://github.com/Hololm/MCMetasploit
- https://github.com/sandarenu/log4j2-issue-check
- https://github.com/lfama/log4j_checker
- https://github.com/GroupePSA/log4shell-honeypot
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/wavefrontHQ/wavefront-proxy
- https://github.com/LinkMJB/log4shell_scanner
- https://github.com/lukibahr/unifi-controller-helm-chart
- https://github.com/DouShaoxun/spring-boot-log
- https://github.com/newrelic/java-log-extensions
- https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV
- https://github.com/lucab85/ansible-role-log4shell
- https://github.com/urholaukkarinen/docker-log4shell
- https://github.com/Ananya-0306/Log-4j-scanner
- https://github.com/cyware-labs/ukraine-russia-cyber-intelligence
- https://github.com/baobaovt/CodeReviewLab
- https://github.com/shamo0/CVE-2021-44228
- https://github.com/allegroai/clearml-server
- https://github.com/bollwarm/SecToolSet
- https://github.com/bradfitz/jndi
- https://github.com/jeremyrsellars/CVE-2021-44228_scanner
- https://github.com/VNYui/CVE-2021-44228
- https://github.com/whitesource/log4j-detect-distribution
- https://github.com/MedKH1684/Log4j-Vulnerability-Exploitation
- https://github.com/bigsizeme/Log4j-check
- https://github.com/idmengineering/handy_stuff
- https://github.com/alexandreroman/cve-2021-44228-workaround-buildpack
- https://github.com/Doenerstyle/1.7.10-modded-bukkit-servers
- https://github.com/trevalkov/log4j2-prosecutor
- https://github.com/bi-zone/Log4j_Detector
- https://github.com/jxerome/log4shell
- https://github.com/ceskaexpedice/kramerius
- https://github.com/alexandre-lavoie/python-log4rce
- https://github.com/stripe/log4j-remediation-tools
- https://github.com/zsolt-halo/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service
- https://github.com/numanturle/Log4jNuclei
- https://github.com/yesspider-hacker/log4j-payload-generator
- https://github.com/nix-xin/vuln4japi
- https://github.com/adelarsq/awesome-bugs
- https://github.com/Nikolas-Charalambidis/cve-2021-44228
- https://github.com/NiftyBank/java-app
- https://github.com/christophetd/log4shell-vulnerable-app
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/maximofernandezriera/CVE-2021-44228
- https://github.com/tobiasoed/log4j-CVE-2021-44228
- https://github.com/authomize/log4j-log4shell-affected
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/luckyfuture0177/VULOnceMore
- https://github.com/cybersecurityworks553/log4j-Detection
- https://github.com/rohankumardubey/CVE-2021-44228_scanner
- https://github.com/kvbutler/solr8-rehl8.5-fips-sip
- https://github.com/eromang/researches
- https://github.com/saharNooby/log4j-vulnerability-patcher-agent
- https://github.com/Log4s/log4s
- https://github.com/nkoneko/VictimApp
- https://github.com/ankur-katiyar/log4j-docker
- https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs
- https://github.com/giterlizzi/nmap-log4shell
- https://github.com/rtkwlf/wolf-tools
- https://github.com/mufeedvh/log4jail
- https://github.com/scholzj/scholzj
- https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
- https://github.com/microsoft/ApplicationInsights-Java
- https://github.com/puzzlepeaches/Log4jHorizon
- https://github.com/kali-dass/CVE-2021-44228-log4Shell
- https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit
- https://github.com/jbautistamartin/Log4ShellEjemplo
- https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228
- https://github.com/immunityinc/Log4j-JNDIServer
- https://github.com/MeterianHQ/log4j-vuln-coverage-check
- https://github.com/Whoaa512/starred
- https://github.com/netarchivesuite/solrwayback
- https://github.com/metabrainz/mb-solr
- https://github.com/lemon-mint/stars
- https://github.com/gcmurphy/chk_log4j
- https://github.com/curated-intel/Log4Shell-IOCs
- https://github.com/fullhunt/log4j-scan
- https://github.com/RK800-DEV/apache-log4j-poc
- https://github.com/ossie-git/log4shell_sentinel
- https://github.com/NS-Sp4ce/Vm4J
- https://github.com/uint0/cve-2021-44228-helpers
- https://github.com/michaelsanford/Log4Shell-Honeypot
- https://github.com/Mormoroth/log4j-vulnerable-app-cve-2021-44228-terraform
- https://github.com/perryflynn/find-log4j
- https://github.com/kal1gh0st/MyLog4Shell
- https://github.com/ubitech/cve-2021-44228-rce-poc
- https://github.com/LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228
- https://github.com/yanghaoi/CVE-2021-44228_Log4Shell
- https://github.com/axelmorningstar/log4j
- https://github.com/ssl/scan4log4j
- https://github.com/ceyhuncamli/Log4j_Attacker_IPList
- https://github.com/VerveIndustrialProtection/CVE-2021-44228-Log4j
- https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.
- https://github.com/PoneyClairDeLune/LogJackFix
- https://github.com/1in9e/Apache-Log4j2-RCE
- https://github.com/claranet-cybersecurity/Log4Shell-Everywhere
- https://github.com/n1g3ld0uglas/EuroAKSWorkshopCC
- https://github.com/MarceloLeite2604/log4j-vulnerability
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/HxDDD/CVE-PoC
- https://github.com/nlmaca/Wowza_Installers
- https://github.com/boundaryx/cloudrasp-log4j2
- https://github.com/mandiant/heyserial
- https://github.com/grimch/log4j-CVE-2021-44228-workaround
- https://github.com/Cyb3rWard0g/log4jshell-lab
- https://github.com/scheibling/py-log4shellscanner
- https://github.com/romeolibm/DBWorkloadProcessor
- https://github.com/chilit-nl/log4shell-example
- https://github.com/Phineas09/CVE-2021-44228
- https://github.com/linuxserver/davos
- https://github.com/phax/phase4
- https://github.com/wcoreiron/Sentinel_Analtic_Rules
- https://github.com/Panyaprach/Proof-CVE-2021-44228
- https://github.com/jaygooby/jaygooby
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/whalehub/awesome-stars
- https://github.com/leonjza/log4jpwn
- https://github.com/J0B10/Voteban
- https://github.com/snoopysecurity/awesome-burp-extensions
- https://github.com/druminik/log4shell-poc
- https://github.com/RrUZi/Awesome-CVE-2021-44228
- https://github.com/webraybtl/log4j-snort
- https://github.com/Joefreedy/Log4j-Windows-Scanner
- https://github.com/linuxserver/docker-fleet
- https://github.com/bhprin/log4j-vul
- https://github.com/jeffbryner/log4j-docker-vaccine
- https://github.com/witblack/G3nius-Tools-Sploit
- https://github.com/census-instrumentation/opencensus-java
- https://github.com/robrankin/cve-2021-44228-waf-tests
- https://github.com/many-fac3d-g0d/apache-tomcat-log4j
- https://github.com/a5tra/log4j-exploit-builder
- https://github.com/pg0123/writeups
- https://github.com/palominoinc/cve-2021-44228-log4j-mitigation
- https://github.com/PwnC00re/Log4J_0day_RCE
- https://github.com/thecyberneh/Log4j-RCE-Exploiter
- https://github.com/mschmnet/Log4Shell-demo
- https://github.com/awslabs/jndi-deobfuscate-python
- https://github.com/cenote/jasperstarter
- https://github.com/murchie85/twitterCyberMonitor
- https://github.com/hozyx/log4shell
- https://github.com/rejupillai/log4j2-hack-springboot
- https://github.com/arnaudluti/PS-CVE-2021-44228
- https://github.com/kimobu/cve-2021-44228
- https://github.com/flxhaas/Scan-CVE-2021-44228
- https://github.com/pvnovarese/2022-04-enterprise-demo
- https://github.com/recanavar/vuln_spring_log4j2
- https://github.com/kkyehit/log4j_CVE-2021-44228
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation
- https://github.com/Woahd/log4j-urlscanner
- https://github.com/marksowell/my-stars
- https://github.com/thl-cmk/CVE-log4j-check_mk-plugin
- https://github.com/bigblackhat/oFx
- https://github.com/palantir/log4j-sniffer
- https://github.com/cungts/VTI-IOCs-CVE-2021-44228
- https://github.com/ExploitPwner/CVE-2022-1388
- https://github.com/sunnyvale-it/CVE-2021-44228-PoC
- https://github.com/r00thunter/Log4Shell-Scanner
- https://github.com/ckan/ckan-solr
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/radiusmethod/awesome-gists
- https://github.com/KosmX/CVE-2021-44228-example
- https://github.com/roswellit/CVE-2021-44228
- https://github.com/kozmer/log4j-shell-poc
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/log4shell_scanner.rb
- https://github.com/ColdFusionX/CVE-2021-44228-Log4Shell-POC
- https://github.com/maxant/log4j2-CVE-2021-44228
- https://github.com/eelyvy/log4jshell-pdf
- https://github.com/ab0x90/CVE-2021-44228_PoC
- https://github.com/lonecloud/CVE-2021-44228-Apache-Log4j
- https://github.com/Vr00mm/log4j-article
- https://github.com/zhzyker/logmap
- https://github.com/1lann/log4shelldetect
- https://github.com/maxgfr/awesome-stars
- https://github.com/fardeen-ahmed/Bug-bounty-Writeups
- https://github.com/puzzlepeaches/Log4jCenter
- https://github.com/zhangyoufu/log4j2-without-jndi
- https://github.com/gbizconnect/gbizconnect-node
- https://github.com/CUBETIQ/cubetiq-security-advisors
- https://github.com/imTigger/webapp-hardware-bridge
- https://github.com/MarkusBordihn/BOs-Critical-Version-Forcer
- https://github.com/XRSec/AWVS14-Update
- https://github.com/infiniroot/nginx-mitigate-log4shell
- https://github.com/Staubgeborener/stars
- https://github.com/simonis/Log4jPatch
- https://github.com/guerzon/log4shellpoc
- https://github.com/snapattack/damn-vulnerable-log4j-app
- https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228
- https://github.com/rgl/log4j-log4shell-playground
- https://github.com/otaviokr/log4j-2021-vulnerability-study
- https://github.com/RenYuH/log4j-lookups-vulnerability
- https://github.com/JustinDPerkins/C1-WS-LOG4SHELL
- https://github.com/blake-fm/vcenter-log4j
- https://github.com/HackJava/HackLog4j2
- https://github.com/micha3lcve/CVE-2021-44228-Mass-RCE
- https://github.com/axisops/CVE-2021-44228
- https://github.com/j3kz/CVE-2021-44228-PoC
- https://github.com/hackinghippo/log4shell_ioc_ips
- https://github.com/tslenter/RSX-RSC
- https://github.com/insignit/cve-informatie
- https://github.com/jeffli1024/log4j-rce-test
- https://github.com/Crane-Mocker/log4j-poc
- https://github.com/dpomnean/log4j_scanner_wrapper
- https://github.com/CERTCC/CVE-2021-44228_scanner
- https://github.com/ZacharyHampton/MCMetasploit
- https://github.com/DXC-StrikeForce/Burp-Log4j-HammerTime
- https://github.com/PAXSTORE/paxstore-openapi-java-sdk
- https://github.com/sourcegraph/log4j-cve-code-search-resources
- https://github.com/AlexandreHeroux/Fix-CVE-2021-44228
- https://github.com/puzzlepeaches/Log4jUnifi
- https://github.com/ClaudeStabile/PadeOpenfireDockerMode
- https://github.com/pvnovarese/2022-02-enterprise-demo
- https://github.com/syslog-ng/syslog-ng
- https://github.com/wortell/log4j
- https://github.com/bmoers/docker-mid-server
- https://github.com/phax/phoss-directory
- https://github.com/ahmad4fifz/CVE-2021-44228
- https://github.com/Grupo-Kapa-7/CVE-2021-44228-Log4j-PoC-RCE
- https://github.com/docker-solr/docker-solr
- https://github.com/Taipo/pareto_security
- https://github.com/jacobtread/L4J-Vuln-Patch
- https://github.com/eclipse-archived/kuksa.integration
- https://github.com/DiCanio/CVE-2021-44228-docker-example
- https://github.com/codiobert/log4j-scanner
- https://github.com/0x3SC4L4T3/Apache-Log4j-POC
- https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-
- https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch
- https://github.com/psychose-club/Saturn
- https://github.com/mark-5-9/mark59
- https://github.com/Jean-Francois-C/Windows-Penetration-Testing
- https://github.com/BJLIYANLIANG/log4j-scanner
- https://github.com/eventsentry/scripts
- https://github.com/js-on/jndiRep
- https://github.com/mitiga/log4shell-everything
- https://github.com/0xRyan/log4j-nullroute
- https://github.com/adriacabeza/personal-stars
- https://github.com/asterinwl/elastic_search
- https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce
- https://github.com/snyk/vscode-extension
- https://github.com/Rk-000/Log4j_scan_Advance
- https://github.com/alastria/alastria-node-besu
- https://github.com/hrsman/Samba-CVE-2021-44142
- https://github.com/backloop-biz/CVE_checks
- https://github.com/horizon3ai/CVE-2021-44142
- https://github.com/gudyrmik/CVE-2021-44142
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-lab
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/horizon3ai/CVE-2021-44077
- https://github.com/Panopticon-Project/panopticon-unattributed
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-44077.yaml
- https://github.com/Ascotbe/Kernelhub
- https://github.com/klinix5/InstallerFileTakeOver
- https://github.com/Octoberfest7/Tools
- https://github.com/Octoberfest7/OSEP-Tools
- https://github.com/0x727/usefull-elevation-of-privilege
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/jbaines-r7/shakeitoff
- https://github.com/0xsyr0/OSCP
- https://github.com/gps1949/CVE-2021-43798
- https://github.com/culprits/Grafana_POC-CVE-2021-43798
- https://github.com/j-jasson/CVE-2021-43798-grafana_fileread
- https://github.com/vulhub/vulhub/tree/master/grafana/CVE-2021-43798
- https://github.com/lfz97/CVE-2021-43798-Grafana-File-Read
- https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp
- https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read
- https://github.com/tianhai66/Shell_POC
- https://github.com/d-rn/vulBox
- https://github.com/gixxyboy/CVE-2021-43798
- https://github.com/bigblackhat/oFx
- https://github.com/yasin-cs-ko-ak/grafana-cve-2021-43798
- https://github.com/julesbozouklian/CVE-2021-43798
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798
- https://github.com/rnsss/CVE-2021-43798-poc
- https://github.com/k3rwin/CVE-2021-43798-Grafana
- https://github.com/light-Life/CVE-2021-43798
- https://github.com/fanygit/Grafana-CVE-2021-43798Exp
- https://github.com/woods-sega/woodswiki
- https://github.com/Ryze-T/CVE-2021-43798
- https://github.com/halencarjunior/grafana-CVE-2021-43798
- https://github.com/Ilovewomen/Grafana_CVE
- https://github.com/tanjiti/sec_profile
- https://github.com/Jroo1053/GrafanaDirInclusion
- https://github.com/salvador-arreola/prometheus-grafana-telegram-k8s
- https://github.com/xiecat/fofax
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/grafana_plugin_traversal.rb
- https://github.com/harsh-bothra/learn365
- https://github.com/allblue147/Grafana
- https://github.com/rodpwn/CVE-2021-43798-mass_scanner
- https://github.com/kenuosec/grafanaExp
- https://github.com/Tom-Cooper11/Grafana-File-Read
- https://github.com/LongWayHomie/CVE-2021-43798
- https://github.com/A-D-Team/grafanaExp
- https://github.com/Mr-xn/CVE-2021-43798
- https://github.com/taythebot/CVE-2021-43798
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-43798.yaml
- https://github.com/openx-org/BLEN
- https://github.com/XRSec/AWVS14-Update
- https://github.com/z3n70/CVE-2021-43798
- https://github.com/scopion/CVE-2021-43799
- https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC
- https://github.com/cokeBeer/go-cves
- https://github.com/n1sh1th/CVE-POC
- https://github.com/aymenbouferroum/CVE-2021-43798_exploit
- https://github.com/jas502n/Grafana-CVE-2021-43798
- https://github.com/Awrrays/Grafana-CVE-2021-43798
- https://github.com/JiuBanSec/Grafana-CVE-2021-43798
- https://github.com/s1gh/CVE-2021-43798
- https://github.com/MzzdToT/Grafana_fileread
- https://github.com/Vulnmachines/grafana-unauth-file-read
- https://github.com/zer0yu/CVE-2021-43798
- https://github.com/AK-blank/CVE-2021-43778
- https://github.com/d-rn/vulBox
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-43778.yaml
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-lab
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/0x0021h/expbox
- https://github.com/xvnpw/k8s-CVE-2021-43557-poc
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/dn0m1n8tor/dn0m1n8tor
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/longofo/Apache-Dubbo-Hessian2-CVE-2021-43297
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/bitterzzZZ/CVE-2021-43297-POC
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-43287.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/gocd-cve-2021-43287.yml
- https://github.com/Wrin9/POC
- https://github.com/Wrin9/CVE-2021-43287
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/bcoles/kasld
- https://github.com/DarkSprings/CVE-2021-43267-POC
- https://github.com/0x0021h/expbox
- https://github.com/bsauce/kernel-security-learning
- https://github.com/ohnonoyesyes/CVE-2021-43267
- https://github.com/Ascotbe/Kernelhub
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/KaLendsi/CVE-2021-43224-POC
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/Dir0x/CVE-2021-43141
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/Dir0x/CVE-2021-43140
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/pierDipi/unicode-control-characters-action
- https://github.com/hffaust/CVE-2021-42574_and_CVE-2021-42694
- https://github.com/kaosagnt/ansible-everyday
- https://github.com/js-on/CVE-2021-42694
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/TheHackingRabbi/CVE-2021-42671
- https://github.com/0xDeku/CVE-2021-42671
- https://github.com/0xDeku/CVE-2021-42670
- https://github.com/TheHackingRabbi/CVE-2021-42670
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/TheHackingRabbi/CVE-2021-42669
- https://github.com/0xDeku/CVE-2021-42669
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/TheHackingRabbi/CVE-2021-42668
- https://github.com/0xDeku/CVE-2021-42668
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/0xDeku/CVE-2021-42667
- https://github.com/TheHackingRabbi/CVE-2021-42667
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/0xDeku/CVE-2021-42666
- https://github.com/TheHackingRabbi/CVE-2021-42666
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/TheHackingRabbi/CVE-2021-42665
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/0xDeku/CVE-2021-42665
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/TheHackingRabbi/CVE-2021-42662
- https://github.com/0xDeku/CVE-2021-42663
- https://github.com/0xDeku/CVE-2021-42662
- https://github.com/TheHackingRabbi/CVE-2021-42663
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/js-on/CVE-2021-42574
- https://github.com/m1dsummer/AD-2021
- https://github.com/burberius/trojan-source-maven-plugin
- https://github.com/pierDipi/unicode-control-characters-action
- https://github.com/kaosagnt/ansible-everyday
- https://github.com/waseeld/CVE-2021-42574
- https://github.com/shiomiyan/CVE-2021-42574
- https://github.com/buckley-w-david/trojan-source
- https://github.com/hffaust/CVE-2021-42574_and_CVE-2021-42694
- https://github.com/maweil/bidi_char_detector
- https://github.com/compr00t/nuclei-templates/blob/main/CVE-2021-42551.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-42551.yaml
- https://github.com/Dokyeongyun/SW_Knowledge
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/arstulke/CardBoard
- https://github.com/GGongnanE/TodayILearned
- https://github.com/OsiriX-Foundation/karnak
- https://github.com/CUBETIQ/cubetiq-security-advisors
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/thl-cmk/CVE-log4j-check_mk-plugin
- https://github.com/cuspycode/jpa-crypt
- https://github.com/cuspycode/jpa-ddl
- https://github.com/akiraabe/myapp-container-jaxrs
- https://github.com/cybersecurityworks553/CVE-2021-42392-Detect
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/pen4uin/awesome-vulnerability-research
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_popular_posts_rce.rb
- https://github.com/simonecris/CVE-2021-42362-PoC
- https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-
- https://github.com/vulhub/vulhub/tree/master/goahead/CVE-2021-42342
- https://github.com/n1sh1th/CVE-POC
- https://github.com/Mr-xn/CVE-2021-42342
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/exchange_chainedserializationbinder_denylist_typo_rce.rb
- https://github.com/mandiant/heyserial
- https://github.com/0x0021h/expbox
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/Y4er/dotnet-deserialization
- https://github.com/timb-machine-mirrors/CVE-2021-42321_poc
- https://github.com/DarkSprings/CVE-2021-42321
- https://github.com/FDlucifer/Proxy-Attackchain
- https://github.com/retr0-13/AD-Attack-Defense
- https://github.com/GhostPack/Rubeus
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/knightswd/NoPacScan
- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/infosecn1nja/AD-Attack-Defense
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/yovelo98/OSCP-Cheatsheet
- https://github.com/ly4k/Pachine
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/Awrrays/Pentest-Tips
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Qazeer/OffensivePythonPipeline
- https://github.com/cube0x0/noPac
- https://github.com/Ridter/noPac
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/ricardojba/Invoke-noPac
- https://github.com/XiaoliChan/Invoke-sAMSpoofing
- https://github.com/vanhohen/ADNinja
- https://github.com/YossiSassi/hAcKtive-Directory-Forensics
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Jean-Francois-C/Windows-Penetration-Testing
- https://github.com/WazeHell/sam-the-admin
- https://github.com/ihebski/A-Red-Teamer-diaries
- https://github.com/JDArmy/GetDomainAdmin
- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense
- https://github.com/lyshark/Windows-exploits
- https://github.com/hktalent/TOP
- https://github.com/0xsyr0/OSCP
- https://github.com/retr0-13/AD-Attack-Defense
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/mdecrevoisier/SIGMA-detection-rules
- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/Ignitetechnologies/Windows-Privilege-Escalation
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/infosecn1nja/AD-Attack-Defense
- https://github.com/yovelo98/OSCP-Cheatsheet
- https://github.com/ly4k/Pachine
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/waterrr/noPac
- https://github.com/Awrrays/Pentest-Tips
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Qazeer/OffensivePythonPipeline
- https://github.com/cube0x0/noPac
- https://github.com/Ridter/noPac
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/ricardojba/Invoke-noPac
- https://github.com/cybersecurityworks553/noPac-detection
- https://github.com/vanhohen/ADNinja
- https://github.com/YossiSassi/hAcKtive-Directory-Forensics
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Jean-Francois-C/Windows-Penetration-Testing
- https://github.com/WazeHell/sam-the-admin
- https://github.com/ihebski/A-Red-Teamer-diaries
- https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack
- https://github.com/JDArmy/GetDomainAdmin
- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense
- https://github.com/lyshark/Windows-exploits
- https://github.com/hktalent/TOP
- https://github.com/0xsyr0/OSCP