Today is a bad day to run a VMWare cluster with thousands of java apps.

This page summarizes the projects mentioned and recommended in the original post on /r/sysadmin

CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
InfluxDB high-performance time series database
Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
influxdata.com
featured
  1. Logout4Shell

    Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell

    Did you see this? https://www.cybereason.com/blog/cybereason-releases-vaccine-to-prevent-exploitation-of-apache-log4shell-vulnerability-cve-2021-44228 Originally seen in r/netsec and r/cybersecurity Git: https://github.com/Cybereason/Logout4Shell

  2. CodeRabbit

    CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.

    CodeRabbit logo
  3. log4shelldetect

    Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files

    I'm not sure what you mean. You can deploy a built binary over your network and run it on all your servers. For example: curl -sSL https://github.com/1lann/log4shelldetect/releases/download/v0.0.2/log4shelldetect_0.0.2_Linux_x86_64.tar.gz | tar -C /tmp/ -zxf - log4shelldetect && /tmp/log4shelldetect -mode list /path/to/scan 2>/dev/null would download and extract the prebuilt binary to /tmp, and run it scanning at /path/to/scan, only outputting paths to potentially vulnerable .jars and ignoring warnings. You can replace the URL with your own build or distribute your own build as you wish.

  4. Empire

    Discontinued Empire is a PowerShell and Python post-exploitation agent.

    PowerShell Empire is a post-exploitation framework written primarily in PowerShell. It is something to consider from a security perspective if remote PowerShell commands are enabled in the environment.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Preview 2 of .NET AI Chat Web App Template Now Available

    2 projects | dev.to | 22 Apr 2025
  • C# 14 updates in .NET 10 Preview 3 – Release Notes

    1 project | news.ycombinator.com | 20 Apr 2025
  • Automating VMware Tools Upgrades with PowerShell and N-Central

    1 project | dev.to | 14 Apr 2025
  • How I passed my AZ-104 (Associate Administrator) exams in less than 21 days.

    1 project | dev.to | 13 Apr 2025
  • I've made a PROCEDURALLY GENERATED aim map! Tens of millions possible layouts! Let me know what do you think about this!

    1 project | /r/GlobalOffensive | 15 Jan 2021