![Log4Shell scanner: detect and exploit Log4j CVE-2021-44228 in your network and web apps | Pentest-Tools.com Blog Log4Shell scanner: detect and exploit Log4j CVE-2021-44228 in your network and web apps | Pentest-Tools.com Blog](https://pentest-tools.com/_vercel/image?url=https://content.pentest-tools.com/assets/content/log4shell-scanner-detect-cve-2021-44228/untitled-1.png&w=1536&q=50)
Log4Shell scanner: detect and exploit Log4j CVE-2021-44228 in your network and web apps | Pentest-Tools.com Blog
![LDAPFragger: Bypassing network restrictions using LDAP attributes | NCC Group Research Blog | Making the world safer and more secure LDAPFragger: Bypassing network restrictions using LDAP attributes | NCC Group Research Blog | Making the world safer and more secure](https://i0.wp.com/research.nccgroup.com/wp-content/uploads/2023/04/1.png?fit=608%2C365&ssl=1)
LDAPFragger: Bypassing network restrictions using LDAP attributes | NCC Group Research Blog | Making the world safer and more secure
GitHub - lefayjey/linWinPwn: linWinPwn is a bash script that automates a number of Active Directory Enumeration and Vulnerability checks
![Ryan M. Montgomery on X: "LinWinPwn - Active Directory Vulnerability Scanner - Scan with the help of impacket, bloodhound, crackmapexec, ldapdomaindump, lsassy, smbmap, kerbrute, adidnsdump, and more. - Repo: https://t.co/GvYIyzK703 - - # Ryan M. Montgomery on X: "LinWinPwn - Active Directory Vulnerability Scanner - Scan with the help of impacket, bloodhound, crackmapexec, ldapdomaindump, lsassy, smbmap, kerbrute, adidnsdump, and more. - Repo: https://t.co/GvYIyzK703 - - #](https://pbs.twimg.com/media/FmcQ0uMWQAAtWTN.png)
Ryan M. Montgomery on X: "LinWinPwn - Active Directory Vulnerability Scanner - Scan with the help of impacket, bloodhound, crackmapexec, ldapdomaindump, lsassy, smbmap, kerbrute, adidnsdump, and more. - Repo: https://t.co/GvYIyzK703 - - #
![Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability | Microsoft Security Blog Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability | Microsoft Security Blog](https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2021/12/Log4j-Microsoft-365-Defender-social-ff.png)
Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability | Microsoft Security Blog
![Apache Log4j Vulnerability CVE-2021-44228 Raises widespread Concerns | Official Juniper Networks Blogs Apache Log4j Vulnerability CVE-2021-44228 Raises widespread Concerns | Official Juniper Networks Blogs](https://blogs.juniper.net/wp-content/uploads/2021/12/Log4jAnchorImage.png)
Apache Log4j Vulnerability CVE-2021-44228 Raises widespread Concerns | Official Juniper Networks Blogs
![Scanning for vulnerabilities — using an #ArchiMate diagram about scanning for log4j – R&A IT Strategy & Architecture Scanning for vulnerabilities — using an #ArchiMate diagram about scanning for log4j – R&A IT Strategy & Architecture](https://rnaea.files.wordpress.com/2022/03/log4j-scanning-overview.jpg)