Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
-
Updated
Jun 15, 2022 - Python
Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)
A collection of intelligence about Log4Shell and its exploitation activity.
An All-In-One Pure Python PoC for CVE-2021-44228
Log4j jndi injection fuzz tool
Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.
Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.
Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.
A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks
A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228
CVE-log4j CheckMK plugin
Dockerized honeypot for CVE-2021-44228.
Provides script to download and format public IP lists related to the Log4j exploit. Current format includes: plain list, Cisco ASA and Fortinet Fortigate Network Groups.
Add a description, image, and links to the cve-2021-44228 topic page so that developers can more easily learn about it.
To associate your repository with the cve-2021-44228 topic, visit your repo's landing page and select "manage topics."