 Log4J-Scanner
 Log4J-Scanner 
 Log4j scanner
 A tool to scan vulnerabilities in Log4J applications
Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.
101 stars
 7 watching
 27 forks
 
Language: Kotlin 
last commit: almost 4 years ago  Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | A Burp Suite extension that scans for vulnerabilities in Log4Shell applications. | 480 | 
|  | A tool that scans websites for Log4j2 remote code execution vulnerabilities using multiple DNS log platforms and supports various scan types | 776 | 
|  | Automated tool to identify vulnerabilities in Joomla components and generate reports | 60 | 
|  | A tool to analyze DNS vulnerabilities in web applications and identify potential security risks. | 94 | 
|  | An extensible burp suite plugin for scanning vulnerable paths in web applications | 1,175 | 
|  | An extension for Burp Suite that identifies potential security vulnerabilities in web applications by analyzing endpoints, parameters, and generating custom target wordlists. | 1,278 | 
|  | Provides an asynchronous Cassandra logging appender for Log4j | 20 | 
|  | A Burp extension that scans application traffic for signs of vulnerabilities and potential attack targets | 41 | 
|  | A tool that searches for vulnerabilities in web applications using an external API | 838 | 
|  | An extension for Burp Suite that scans for unknown classes of injection vulnerabilities using a novel approach | 643 | 
|  | A set of tools for gathering information and exploiting vulnerabilities in IBM Power Systems | 97 | 
|  | A tool that integrates with Burp and ZAP to identify vulnerable JavaScript libraries | 200 | 
|  | An extension for Burp Suite to detect and alert on potential Cypher code injection vulnerabilities in Neo4j databases | 5 | 
|  | An extension for Burp Pro that integrates Crawljax and Selenium with JUnit for web application security testing and crawling. | 33 | 
|  | Automated tool for detecting cross-site scripting (XSS) and SQL injection vulnerabilities in web applications. | 44 |