log4jpwn
log4j rce test environment and poc (by leonjza)
canarytokens
Canarytokens helps track activity and actions on your network. (by thinkst)
log4jpwn | canarytokens | |
---|---|---|
1 | 27 | |
308 | 1,664 | |
- | 1.6% | |
0.0 | 8.5 | |
over 2 years ago | 7 days ago | |
Python | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
log4jpwn
Posts with mentions or reviews of log4jpwn.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-12-14.
canarytokens
Posts with mentions or reviews of canarytokens.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-01-30.
- 1Password detects "suspicious activity" in its internal Okta account
-
#Anonymous - AK - RABBIT MEET HOLE - #TheDEWFiles 3,000+ Docs On Tons Patents Various Tech, Studies, Research by TONs of Scientists on DEWs & Alternative Energy (Includes Aerospace Companies.)
Get a free OS in a VMand open any files in there. You should not trust a random batch of potentially backdoored or canarytoken'ed files
- What screams "I'm insecure"?
-
In your experience, what were some unconventional signs that there's a malware inside your network?
Throw some honeytokens/canarytokens on key systems. Thinkst has a free option where you can drop Word docs, PDF, AWS keys, etc. that will send you an email or webhook if they're ever used. https://canarytokens.org
-
IF you did door knocking, what would you leave behind?
QR code with some pdfs from inside a canarytokens.org folder.
- Increase in LockBit Ransomware
-
Worried someone has (or may gain) access to your UoG account? Try Canarytokens
You can generate Canarytokens for free on their website: https://www.canarytokens.org/generate. They're open-source, so if you're technically-inclined, you can run the software yourself: https://github.com/thinkst/canarytokens. All the documentation is here: https://docs.canarytokens.org/guide/.
- 1 minute Canaries
-
Please help me with internet stalker
I do not think a trap or "phishing link" is a good idea if she are getting serious threats! But it is not too hard, you can generate a few with here and if somebody opens the link you will get an email containing the time and IP address of who opened it: https://canarytokens.org (note that, you can not really do much with these information on your own).
-
Someone sending offensive material to people in our google domain
Good tip, OP could use this for quick setup. https://canarytokens.org