A simple simulation of the infamous CVE-2021-44228 issue.
-
Updated
Dec 18, 2021 - Java
A simple simulation of the infamous CVE-2021-44228 issue.
This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 and CVE-2021-45046 (mirror from GitLab.com)
Log4j Vulnerability RCE - CVE-2021-44228
Script for downloading newest log4j jar files and upgrades it on a Linux-system.
Dockerized honeypot for CVE-2021-44228.
Simple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228)
Shell script to remove JndiLookup class from Log4J 2 jar file, inside WAR file, in order to mitigate CVE-2021-44228, a.k.a., #Log4Shell
Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.
A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Script to combine all host specific json outputs from log4j-detector into one single csv file. Requires only standard python installation, no further dependencies.
Minecraft 1.12.2 Forge mod to ensure your log4j version is safe upon server connection
log4j PowerShell Checker - looking for CVE 2021 44228 log4j LDAP JNDI exploit
If you are sad and blue scan for Log4J in Sytem32...
Add a description, image, and links to the cve-2021-44228 topic page so that developers can more easily learn about it.
To associate your repository with the cve-2021-44228 topic, visit your repo's landing page and select "manage topics."