Log4j2Scan

Vulnerability scanner

A tool that scans websites for Log4j2 remote code execution vulnerabilities using multiple DNS log platforms and supports various scan types

Log4j2 RCE Passive Scanner plugin for BurpSuite

GitHub

773 stars
13 watching
91 forks
Language: Java
last commit: over 1 year ago

Related projects:

Repository Description Stars
0xdexter0us/log4j-scanner A tool to scan vulnerabilities in Log4J applications 101
r0075h3ll/oralyzer A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. 753
sectooladdict/wavsep An open-source tool for evaluating web application vulnerabilities by analyzing the separation of concerns in web applications. 228
delvelabs/vane2 Identifies vulnerabilities in WordPress websites by scanning plugins and themes 28
them4hd1/jcs Automated tool to identify vulnerabilities in Joomla components and generate reports 60
kathanp19/gaussrf A tool for identifying potential vulnerabilities in websites by fetching known URLs and filtering out ones with open redirects or SSRF parameters. 165
the-login/dns-analyzer A tool to analyze DNS vulnerabilities in web applications and identify potential security risks. 94
1n3/blackwidow A Python-based web application scanner that gathers OSINT and fuzz data to identify OWASP vulnerabilities on target websites. 1,531
menkrep1337/xsscon A tool designed to scan websites for Cross-Site Scripting (XSS) vulnerabilities 210
portswigger/backslash-powered-scanner An extension for Burp Suite that scans for unknown classes of injection vulnerabilities using a novel approach 637
portswigger/httpoxy-scanner Tools to help identify vulnerabilities in web applications using HTTPoxy scanning. 88
hahwul/xspear Automated testing tool for identifying vulnerabilities in web applications via cross-site scripting (XSS) attacks 1,201
portswigger/additional-scanner-checks A collection of passive scanner checks to identify security vulnerabilities in web applications 27
hackthelegacy/hack400tool A set of tools for gathering information and exploiting vulnerabilities in IBM Power Systems 96