Empire VS log4shelldetect

Compare Empire vs log4shelldetect and see what are their differences.

Empire

Empire is a PowerShell and Python post-exploitation agent. (by EmpireProject)

log4shelldetect

Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files (by 1lann)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
Empire log4shelldetect
7 3
5,966 44
- -
0.0 0.0
over 4 years ago over 2 years ago
PowerShell Go
BSD 3-clause "New" or "Revised" License The Unlicense
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

Empire

Posts with mentions or reviews of Empire. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-07.
  • i tried downloading a photoshop plugin and malwarebytes now started blocking these constantly
    2 projects | /r/Malware | 7 Apr 2023
    IAB stands for Initial Access Broker. these are hackers who gain initial access, mainly to companies and sell that access to third party groups such as ransomware groups. Powershell Empire is an open source post exploitation tool for windows and u can find it on github: https://github.com/EmpireProject/Empire.git
  • HoneyHash
    1 project | news.ycombinator.com | 30 Dec 2022
  • Canary Tokens
    1 project | news.ycombinator.com | 30 Dec 2022
    I evaluated this a while back. Cool idea but limited application in a corporate environment. But for personal use, why not?

    Someone needs to open a document for the canary token to trigger. Even the smallest company with M365 gets MSIP (formerly Azure Information Protection), if you classify your docs right, only people who own or have been shared the document can decrypt it and even without a good classification, you get logs of any M365 document being opened, so why can't I just have a regular but public doc everywhere and monitor when it gets opened from external IPs, user agents,etc....

    I struggled to show value for this. Honehashes are more interesting for me: https://github.com/EmpireProject/Empire/blob/master/data/mod...

  • Empire C2 API problem
    1 project | /r/BlackArchOfficial | 23 May 2022
    I've installed Empire C2 on an Arch VM. I've installed it from the github https://github.com/EmpireProject/Empire but the API is not working as expected.
  • Why doesn't Empire start??
    2 projects | /r/Kalilinux | 3 Apr 2022
    Is the new version. The original Empire one was discontinued Old: https://github.com/EmpireProject/Empire New: https://github.com/BC-SECURITY/Empire
  • Today is a bad day to run a VMWare cluster with thousands of java apps.
    5 projects | /r/sysadmin | 11 Dec 2021
    PowerShell Empire is a post-exploitation framework written primarily in PowerShell. It is something to consider from a security perspective if remote PowerShell commands are enabled in the environment.
  • Empire Program is not getting started
    1 project | /r/Kalilinux | 20 May 2021

log4shelldetect

Posts with mentions or reviews of log4shelldetect. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-12-11.
  • Today is a bad day to run a VMWare cluster with thousands of java apps.
    5 projects | /r/sysadmin | 11 Dec 2021
    I'm not sure what you mean. You can deploy a built binary over your network and run it on all your servers. For example: curl -sSL https://github.com/1lann/log4shelldetect/releases/download/v0.0.2/log4shelldetect_0.0.2_Linux_x86_64.tar.gz | tar -C /tmp/ -zxf - log4shelldetect && /tmp/log4shelldetect -mode list /path/to/scan 2>/dev/null would download and extract the prebuilt binary to /tmp, and run it scanning at /path/to/scan, only outputting paths to potentially vulnerable .jars and ignoring warnings. You can replace the URL with your own build or distribute your own build as you wish.
  • Log4j 0day being exploited
    10 projects | /r/blueteamsec | 9 Dec 2021

What are some alternatives?

When comparing Empire and log4shelldetect you can also consider the following projects:

sliver - Adversary Emulation Framework

CVE-2021-44228-Scanner - Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228

Covenant - Covenant is a collaborative .NET C2 framework for red teamers.

local-log4j-vuln-scanner - Simple local scanner for vulnerable log4j instances

coolify - An open-source & self-hostable Heroku / Netlify / Vercel alternative.

log4shell_ioc_ips - log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)

PoshC2 - A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

log4j-sniffer - A tool that scans archives to check for vulnerable log4j versions

merlin - Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

Log4j-CVE-Detect - Detections for CVE-2021-44228 inside of nested binaries

Empire - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

Windowslog4jClassRemover