PoC-in-GitHub/2021/CVE-2021-44228.json

2684 lines
91 KiB
JSON
Raw Normal View History

2021-12-10 15:14:52 +09:00
[
2021-12-11 15:15:36 +09:00
{
"id": 436666301,
"name": "CVE-2021-44228-Apache-Log4j-Rce",
"full_name": "tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
"owner": {
"login": "tangxiaofeng7",
"id": 45926593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4",
"html_url": "https:\/\/github.com\/tangxiaofeng7"
},
"html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
"description": "Apache Log4j 远程代码执行",
"fork": false,
"created_at": "2021-12-09T15:27:38Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T18:11:28Z",
2021-12-12 03:13:20 +09:00
"pushed_at": "2021-12-11T14:57:57Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 1699,
"watchers_count": 1699,
"forks_count": 597,
2021-12-11 15:15:36 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 597,
"watchers": 1699,
2021-12-11 15:15:36 +09:00
"score": 0
},
2021-12-10 15:14:52 +09:00
{
"id": 436771097,
"name": "Healer",
"full_name": "Glease\/Healer",
"owner": {
"login": "Glease",
"id": 4586901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4586901?v=4",
"html_url": "https:\/\/github.com\/Glease"
},
"html_url": "https:\/\/github.com\/Glease\/Healer",
"description": "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2",
"fork": false,
"created_at": "2021-12-09T21:49:33Z",
2021-12-12 03:13:20 +09:00
"updated_at": "2021-12-11T17:12:29Z",
2021-12-10 15:14:52 +09:00
"pushed_at": "2021-12-09T22:29:54Z",
2021-12-12 03:13:20 +09:00
"stargazers_count": 13,
"watchers_count": 13,
2021-12-10 15:14:52 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-12 03:13:20 +09:00
"watchers": 13,
2021-12-10 15:14:52 +09:00
"score": 0
},
{
"id": 436798675,
"name": "L4J-Vuln-Patch",
"full_name": "jacobtread\/L4J-Vuln-Patch",
"owner": {
"login": "jacobtread",
"id": 33708767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33708767?v=4",
"html_url": "https:\/\/github.com\/jacobtread"
},
"html_url": "https:\/\/github.com\/jacobtread\/L4J-Vuln-Patch",
"description": "This tool patches the CVE-2021-44228 Log4J vulnerability present in all minecraft versions NOTE THIS TOOL MUST BE RE-RUN after downloading or updating versions of minecraft as its not a perminent patch",
"fork": false,
"created_at": "2021-12-10T00:14:06Z",
2021-12-12 09:13:11 +09:00
"updated_at": "2021-12-11T18:24:53Z",
2021-12-11 21:14:45 +09:00
"pushed_at": "2021-12-11T07:17:57Z",
2021-12-12 09:13:11 +09:00
"stargazers_count": 6,
"watchers_count": 6,
2021-12-10 15:14:52 +09:00
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
2021-12-12 09:13:11 +09:00
"watchers": 6,
2021-12-10 15:14:52 +09:00
"score": 0
},
{
"id": 436848055,
"name": "LogJackFix",
"full_name": "UltraVanilla\/LogJackFix",
"owner": {
"login": "UltraVanilla",
"id": 73727575,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73727575?v=4",
"html_url": "https:\/\/github.com\/UltraVanilla"
},
"html_url": "https:\/\/github.com\/UltraVanilla\/LogJackFix",
"description": "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients.",
"fork": false,
"created_at": "2021-12-10T04:20:03Z",
"updated_at": "2021-12-10T05:11:17Z",
"pushed_at": "2021-12-10T04:20:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 436860437,
"name": "Log4j2-CVE-2021-44228",
"full_name": "jas502n\/Log4j2-CVE-2021-44228",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/Log4j2-CVE-2021-44228",
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T15:22:43Z",
2021-12-12 21:13:07 +09:00
"pushed_at": "2021-12-12T11:21:26Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 14,
2021-12-10 21:13:19 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 14,
"watchers": 67,
2021-12-10 21:13:19 +09:00
"score": 0
},
{
"id": 436871682,
"name": "Log4J-RCE-Proof-Of-Concept",
"full_name": "HyCraftHD\/Log4J-RCE-Proof-Of-Concept",
"owner": {
"login": "HyCraftHD",
"id": 7681220,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7681220?v=4",
"html_url": "https:\/\/github.com\/HyCraftHD"
},
"html_url": "https:\/\/github.com\/HyCraftHD\/Log4J-RCE-Proof-Of-Concept",
2021-12-11 03:13:57 +09:00
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
2021-12-10 21:13:19 +09:00
"fork": false,
"created_at": "2021-12-10T06:15:38Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T18:10:02Z",
2021-12-12 03:13:20 +09:00
"pushed_at": "2021-12-11T16:56:02Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 73,
"watchers_count": 73,
2021-12-12 15:13:51 +09:00
"forks_count": 14,
2021-12-10 21:13:19 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
2021-12-11 03:13:57 +09:00
"cve",
"cve-2021-44228",
2021-12-10 21:13:19 +09:00
"cves",
"exploit",
2021-12-11 03:13:57 +09:00
"log4j",
2021-12-10 21:13:19 +09:00
"log4j2",
"minecraft"
],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 14,
2021-12-13 03:14:09 +09:00
"watchers": 73,
2021-12-10 21:13:19 +09:00
"score": 0
},
{
"id": 436877979,
"name": "cloudrasp-log4j2",
"full_name": "boundaryx\/cloudrasp-log4j2",
"owner": {
"login": "boundaryx",
"id": 95878655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95878655?v=4",
"html_url": "https:\/\/github.com\/boundaryx"
},
"html_url": "https:\/\/github.com\/boundaryx\/cloudrasp-log4j2",
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
"fork": false,
"created_at": "2021-12-10T06:42:37Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T14:04:26Z",
2021-12-11 15:15:36 +09:00
"pushed_at": "2021-12-11T02:49:41Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 63,
"watchers_count": 63,
2021-12-11 03:13:57 +09:00
"forks_count": 12,
2021-12-10 21:13:19 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"defense",
"hardening",
"java",
"log4j",
"log4j2",
"protection",
"rasp",
2021-12-11 15:15:36 +09:00
"rce",
2021-12-10 21:13:19 +09:00
"security",
2021-12-11 15:15:36 +09:00
"security-tools",
"vulnerability"
2021-12-10 21:13:19 +09:00
],
"visibility": "public",
2021-12-11 03:13:57 +09:00
"forks": 12,
2021-12-13 03:14:09 +09:00
"watchers": 63,
2021-12-10 21:13:19 +09:00
"score": 0
},
{
"id": 436881928,
"name": "CVE-2021-44228",
"full_name": "dbgee\/CVE-2021-44228",
"owner": {
"login": "dbgee",
"id": 46910972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46910972?v=4",
"html_url": "https:\/\/github.com\/dbgee"
},
"html_url": "https:\/\/github.com\/dbgee\/CVE-2021-44228",
"description": "Apache Log4j 2 a remote code execution vulnerability via the ldap JNDI parser.",
"fork": false,
"created_at": "2021-12-10T06:59:10Z",
"updated_at": "2021-12-10T07:07:27Z",
"pushed_at": "2021-12-10T07:07:25Z",
"stargazers_count": 0,
"watchers_count": 0,
2021-12-10 15:14:52 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-10 21:13:19 +09:00
"watchers": 0,
"score": 0
},
{
"id": 436886692,
"name": "Log4j2-CVE-2021-44228",
"full_name": "y35uishere\/Log4j2-CVE-2021-44228",
"owner": {
"login": "y35uishere",
"id": 8746668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8746668?v=4",
"html_url": "https:\/\/github.com\/y35uishere"
},
"html_url": "https:\/\/github.com\/y35uishere\/Log4j2-CVE-2021-44228",
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T07:18:15Z",
2021-12-12 15:13:51 +09:00
"updated_at": "2021-12-12T03:47:13Z",
2021-12-10 21:13:19 +09:00
"pushed_at": "2021-12-10T05:46:20Z",
2021-12-12 15:13:51 +09:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
2021-12-10 21:13:19 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 1,
"watchers": 1,
2021-12-10 21:13:19 +09:00
"score": 0
},
2021-12-12 03:13:20 +09:00
{
"id": 436918458,
"name": "Log4jPatcher",
"full_name": "CreeperHost\/Log4jPatcher",
"owner": {
"login": "CreeperHost",
"id": 7502613,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7502613?v=4",
"html_url": "https:\/\/github.com\/CreeperHost"
},
"html_url": "https:\/\/github.com\/CreeperHost\/Log4jPatcher",
"description": "A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)",
"fork": false,
"created_at": "2021-12-10T09:16:46Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T17:22:25Z",
2021-12-12 03:13:20 +09:00
"pushed_at": "2021-12-11T09:15:04Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 27,
"watchers_count": 27,
2021-12-12 21:13:07 +09:00
"forks_count": 4,
2021-12-12 03:13:20 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"log4j",
"log4j2",
"log4shell"
],
"visibility": "public",
2021-12-12 21:13:07 +09:00
"forks": 4,
2021-12-13 03:14:09 +09:00
"watchers": 27,
2021-12-12 03:13:20 +09:00
"score": 0
},
2021-12-10 21:13:19 +09:00
{
"id": 436919597,
"name": "RCE",
"full_name": "DragonSurvivalEU\/RCE",
"owner": {
"login": "DragonSurvivalEU",
"id": 92676019,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92676019?v=4",
"html_url": "https:\/\/github.com\/DragonSurvivalEU"
},
"html_url": "https:\/\/github.com\/DragonSurvivalEU\/RCE",
"description": "CVE-2021-44228 fix",
"fork": false,
"created_at": "2021-12-10T09:20:40Z",
2021-12-12 21:13:07 +09:00
"updated_at": "2021-12-12T11:48:03Z",
2021-12-10 21:13:19 +09:00
"pushed_at": "2021-12-10T09:36:32Z",
2021-12-12 21:13:07 +09:00
"stargazers_count": 3,
"watchers_count": 3,
2021-12-10 21:13:19 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-12 21:13:07 +09:00
"watchers": 3,
2021-12-10 21:13:19 +09:00
"score": 0
},
{
"id": 436926113,
"name": "Log4j-0Day-Fix",
"full_name": "Szczurowsky\/Log4j-0Day-Fix",
"owner": {
"login": "Szczurowsky",
"id": 70973416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70973416?v=4",
"html_url": "https:\/\/github.com\/Szczurowsky"
},
"html_url": "https:\/\/github.com\/Szczurowsky\/Log4j-0Day-Fix",
"description": "Plugin which fixes 0day exploit (CVE-2021-44228) with Log4j apache package",
"fork": false,
"created_at": "2021-12-10T09:43:49Z",
"updated_at": "2021-12-10T10:03:31Z",
"pushed_at": "2021-12-10T10:04:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 436933689,
"name": "Log4jPatch",
"full_name": "simonis\/Log4jPatch",
"owner": {
"login": "simonis",
"id": 3178197,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3178197?v=4",
"html_url": "https:\/\/github.com\/simonis"
},
"html_url": "https:\/\/github.com\/simonis\/Log4jPatch",
"description": "Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process",
"fork": false,
"created_at": "2021-12-10T10:10:19Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T16:09:58Z",
2021-12-12 21:13:07 +09:00
"pushed_at": "2021-12-12T10:33:02Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 7,
2021-12-11 03:13:57 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 7,
"watchers": 91,
2021-12-11 03:13:57 +09:00
"score": 0
},
{
"id": 436973468,
"name": "CVE-2021-44228-Test-Server",
"full_name": "zlepper\/CVE-2021-44228-Test-Server",
"owner": {
"login": "zlepper",
"id": 1499810,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1499810?v=4",
"html_url": "https:\/\/github.com\/zlepper"
},
"html_url": "https:\/\/github.com\/zlepper\/CVE-2021-44228-Test-Server",
"description": "A small server for verifing if a given java program is succeptibel to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-10T12:35:30Z",
2021-12-12 21:13:07 +09:00
"updated_at": "2021-12-12T11:03:15Z",
2021-12-11 03:13:57 +09:00
"pushed_at": "2021-12-10T12:39:25Z",
2021-12-12 21:13:07 +09:00
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
2021-12-10 21:13:19 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 21:13:07 +09:00
"forks": 1,
"watchers": 4,
2021-12-11 03:13:57 +09:00
"score": 0
},
{
"id": 436974241,
"name": "log4shell-vulnerable-app",
"full_name": "christophetd\/log4shell-vulnerable-app",
"owner": {
"login": "christophetd",
"id": 136675,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4",
"html_url": "https:\/\/github.com\/christophetd"
},
"html_url": "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app",
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T18:10:06Z",
"pushed_at": "2021-12-12T15:43:05Z",
"stargazers_count": 318,
"watchers_count": 318,
"forks_count": 94,
2021-12-11 03:13:57 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 94,
"watchers": 318,
2021-12-11 03:13:57 +09:00
"score": 0
},
{
2021-12-11 15:15:36 +09:00
"id": 437026730,
"name": "VictimApp",
"full_name": "nkoneko\/VictimApp",
2021-12-11 03:13:57 +09:00
"owner": {
2021-12-11 15:15:36 +09:00
"login": "nkoneko",
"id": 1922341,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4",
"html_url": "https:\/\/github.com\/nkoneko"
2021-12-11 03:13:57 +09:00
},
2021-12-11 15:15:36 +09:00
"html_url": "https:\/\/github.com\/nkoneko\/VictimApp",
"description": "Vulnerable to CVE-2021-44228. trustURLCodebase is not required.",
2021-12-11 03:13:57 +09:00
"fork": false,
2021-12-11 15:15:36 +09:00
"created_at": "2021-12-10T15:32:03Z",
2021-12-12 15:13:51 +09:00
"updated_at": "2021-12-12T00:53:15Z",
2021-12-11 15:15:36 +09:00
"pushed_at": "2021-12-10T22:40:15Z",
2021-12-12 15:13:51 +09:00
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
2021-12-11 03:13:57 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 2,
"watchers": 5,
2021-12-11 03:13:57 +09:00
"score": 0
},
{
"id": 437031223,
"name": "pulsar-docker-images-patch-CVE-2021-44228",
"full_name": "lhotari\/pulsar-docker-images-patch-CVE-2021-44228",
"owner": {
"login": "lhotari",
"id": 66864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4",
"html_url": "https:\/\/github.com\/lhotari"
},
"html_url": "https:\/\/github.com\/lhotari\/pulsar-docker-images-patch-CVE-2021-44228",
"description": "Patch Pulsar Docker images with Log4J 2.15.0 update to mitigate CVE-2021-44228",
"fork": false,
"created_at": "2021-12-10T15:46:49Z",
2021-12-11 21:14:45 +09:00
"updated_at": "2021-12-11T10:40:34Z",
"pushed_at": "2021-12-11T10:40:31Z",
2021-12-11 03:13:57 +09:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
2021-12-11 15:15:36 +09:00
{
"id": 437034295,
"name": "Apache-Log4j2-RCE",
"full_name": "1in9e\/Apache-Log4j2-RCE",
"owner": {
"login": "1in9e",
"id": 15817052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15817052?v=4",
"html_url": "https:\/\/github.com\/1in9e"
},
"html_url": "https:\/\/github.com\/1in9e\/Apache-Log4j2-RCE",
"description": "Apache Log4j2 RCE( CVE-2021-44228)验证环境",
"fork": false,
"created_at": "2021-12-10T15:57:14Z",
2021-12-12 15:13:51 +09:00
"updated_at": "2021-12-12T03:48:15Z",
2021-12-11 15:15:36 +09:00
"pushed_at": "2021-12-10T15:58:25Z",
2021-12-12 15:13:51 +09:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
2021-12-11 15:15:36 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"bugbounty",
"cve-2021-44228",
"java",
"log4j2",
"rce",
"security"
],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 1,
"watchers": 1,
2021-12-11 15:15:36 +09:00
"score": 0
},
2021-12-11 03:13:57 +09:00
{
"id": 437056774,
"name": "CVE-2021-44228-example",
"full_name": "KosmX\/CVE-2021-44228-example",
"owner": {
"login": "KosmX",
"id": 15692868,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15692868?v=4",
"html_url": "https:\/\/github.com\/KosmX"
},
"html_url": "https:\/\/github.com\/KosmX\/CVE-2021-44228-example",
2021-12-11 09:13:08 +09:00
"description": "RCE POC",
2021-12-11 03:13:57 +09:00
"fork": false,
"created_at": "2021-12-10T17:13:18Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T17:41:46Z",
2021-12-12 03:13:20 +09:00
"pushed_at": "2021-12-11T15:34:52Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 3,
"watchers_count": 3,
2021-12-12 15:13:51 +09:00
"forks_count": 1,
2021-12-11 03:13:57 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve",
"cve-2021-44228",
"rce"
],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 1,
2021-12-13 03:14:09 +09:00
"watchers": 3,
2021-12-11 09:13:08 +09:00
"score": 0
},
{
"id": 437060009,
"name": "CVE-2021-44228",
"full_name": "greymd\/CVE-2021-44228",
"owner": {
"login": "greymd",
"id": 3874767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4",
"html_url": "https:\/\/github.com\/greymd"
},
"html_url": "https:\/\/github.com\/greymd\/CVE-2021-44228",
2021-12-13 03:14:09 +09:00
"description": "Checking for vulnerability CVE-2021-44228.",
2021-12-11 09:13:08 +09:00
"fork": false,
"created_at": "2021-12-10T17:24:47Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T18:01:45Z",
"pushed_at": "2021-12-12T17:41:02Z",
"stargazers_count": 30,
"watchers_count": 30,
2021-12-12 21:13:07 +09:00
"forks_count": 4,
2021-12-11 09:13:08 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 21:13:07 +09:00
"forks": 4,
2021-12-13 03:14:09 +09:00
"watchers": 30,
2021-12-11 03:13:57 +09:00
"score": 0
},
{
"id": 437071396,
"name": "CVE-2021-44228-Log4Shell-Hashes",
"full_name": "mubix\/CVE-2021-44228-Log4Shell-Hashes",
"owner": {
"login": "mubix",
"id": 679319,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/679319?v=4",
"html_url": "https:\/\/github.com\/mubix"
},
"html_url": "https:\/\/github.com\/mubix\/CVE-2021-44228-Log4Shell-Hashes",
"description": "Hashes for vulnerable LOG4J versions",
"fork": false,
"created_at": "2021-12-10T18:06:06Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T16:43:43Z",
2021-12-11 15:15:36 +09:00
"pushed_at": "2021-12-11T04:36:38Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 58,
"watchers_count": 58,
2021-12-12 21:13:07 +09:00
"forks_count": 9,
2021-12-11 09:13:08 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 21:13:07 +09:00
"forks": 9,
2021-12-13 03:14:09 +09:00
"watchers": 58,
2021-12-11 09:13:08 +09:00
"score": 0
},
{
"id": 437091396,
"name": "mc-log4j-patcher",
"full_name": "OopsieWoopsie\/mc-log4j-patcher",
"owner": {
"login": "OopsieWoopsie",
"id": 15069175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15069175?v=4",
"html_url": "https:\/\/github.com\/OopsieWoopsie"
},
"html_url": "https:\/\/github.com\/OopsieWoopsie\/mc-log4j-patcher",
"description": "CVE-2021-44228 server-side fix for minecraft servers.",
"fork": false,
"created_at": "2021-12-10T19:25:31Z",
2021-12-12 03:13:20 +09:00
"updated_at": "2021-12-11T16:51:56Z",
2021-12-11 09:13:08 +09:00
"pushed_at": "2021-12-10T19:47:45Z",
2021-12-11 21:14:45 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2021-12-11 09:13:08 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"fix",
"log4j2",
"minecraft",
"paper",
"spigot"
],
"visibility": "public",
"forks": 0,
2021-12-11 21:14:45 +09:00
"watchers": 1,
2021-12-11 09:13:08 +09:00
"score": 0
},
{
"id": 437097787,
"name": "CVE-2021-44228-kusto",
"full_name": "wheez-y\/CVE-2021-44228-kusto",
"owner": {
"login": "wheez-y",
"id": 77060088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77060088?v=4",
"html_url": "https:\/\/github.com\/wheez-y"
},
"html_url": "https:\/\/github.com\/wheez-y\/CVE-2021-44228-kusto",
"description": null,
"fork": false,
"created_at": "2021-12-10T19:53:32Z",
"updated_at": "2021-12-10T19:55:16Z",
"pushed_at": "2021-12-10T19:55:14Z",
"stargazers_count": 0,
"watchers_count": 0,
2021-12-11 03:13:57 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-11 09:13:08 +09:00
"watchers": 0,
"score": 0
},
{
"id": 437108119,
"name": "log4shell-mitigation",
"full_name": "izzyacademy\/log4shell-mitigation",
"owner": {
"login": "izzyacademy",
"id": 44282278,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44282278?v=4",
"html_url": "https:\/\/github.com\/izzyacademy"
},
"html_url": "https:\/\/github.com\/izzyacademy\/log4shell-mitigation",
"description": "Mitigation for Log4Shell Security Vulnerability CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-10T20:39:56Z",
2021-12-12 03:13:20 +09:00
"updated_at": "2021-12-11T16:21:03Z",
"pushed_at": "2021-12-11T16:21:01Z",
2021-12-11 09:13:08 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437115624,
"name": "CVE-2021-44228-poc",
"full_name": "StandB\/CVE-2021-44228-poc",
"owner": {
"login": "StandB",
"id": 17493969,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17493969?v=4",
"html_url": "https:\/\/github.com\/StandB"
},
"html_url": "https:\/\/github.com\/StandB\/CVE-2021-44228-poc",
"description": "log4shell sample application (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-10T21:13:46Z",
"updated_at": "2021-12-11T00:07:52Z",
"pushed_at": "2021-12-10T21:15:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 437121151,
"name": "CVE-2021-44228",
"full_name": "seamus-dev\/CVE-2021-44228",
"owner": {
"login": "seamus-dev",
"id": 77751614,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77751614?v=4",
"html_url": "https:\/\/github.com\/seamus-dev"
},
"html_url": "https:\/\/github.com\/seamus-dev\/CVE-2021-44228",
"description": "list of ips pulled from greynoise for this",
"fork": false,
"created_at": "2021-12-10T21:41:12Z",
"updated_at": "2021-12-10T22:33:45Z",
"pushed_at": "2021-12-10T22:33:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437122153,
"name": "log4j-detect",
"full_name": "takito1812\/log4j-detect",
"owner": {
"login": "takito1812",
"id": 56491288,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56491288?v=4",
"html_url": "https:\/\/github.com\/takito1812"
},
"html_url": "https:\/\/github.com\/takito1812\/log4j-detect",
2021-12-12 03:13:20 +09:00
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading",
2021-12-11 09:13:08 +09:00
"fork": false,
"created_at": "2021-12-10T21:46:18Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T17:19:40Z",
2021-12-12 03:13:20 +09:00
"pushed_at": "2021-12-11T16:01:28Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 18,
2021-12-11 09:13:08 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 18,
"watchers": 56,
2021-12-11 15:15:36 +09:00
"score": 0
},
{
"id": 437124793,
"name": "log4j-patcher",
"full_name": "alerithe\/log4j-patcher",
"owner": {
"login": "alerithe",
"id": 31022473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4",
"html_url": "https:\/\/github.com\/alerithe"
},
"html_url": "https:\/\/github.com\/alerithe\/log4j-patcher",
"description": "Java Agent that disables Apache Log4J's JNDI Lookup. Quick-fix for CVE-2021-44228",
"fork": false,
"created_at": "2021-12-10T21:59:31Z",
2021-12-11 21:14:45 +09:00
"updated_at": "2021-12-11T07:45:41Z",
"pushed_at": "2021-12-11T07:45:38Z",
2021-12-11 15:15:36 +09:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"cve",
"log4j",
"patch",
"security",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
2021-12-11 09:13:08 +09:00
"score": 0
},
{
"id": 437128632,
"name": "CVE-2021-44228-DFIR-Notes",
"full_name": "Azeemering\/CVE-2021-44228-DFIR-Notes",
"owner": {
"login": "Azeemering",
"id": 31852867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31852867?v=4",
"html_url": "https:\/\/github.com\/Azeemering"
},
"html_url": "https:\/\/github.com\/Azeemering\/CVE-2021-44228-DFIR-Notes",
"description": "CVE-2021-44228 DFIR Notes",
"fork": false,
"created_at": "2021-12-10T22:19:16Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T17:19:34Z",
2021-12-12 21:13:07 +09:00
"pushed_at": "2021-12-12T10:24:22Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 5,
"watchers_count": 5,
2021-12-12 15:13:51 +09:00
"forks_count": 2,
2021-12-11 09:13:08 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 2,
2021-12-13 03:14:09 +09:00
"watchers": 5,
2021-12-11 09:13:08 +09:00
"score": 0
},
{
"id": 437131550,
"name": "CVE-2021-44228-PoC-log4j-bypass-words",
"full_name": "Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words",
"owner": {
"login": "Puliczek",
"id": 12344862,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12344862?v=4",
"html_url": "https:\/\/github.com\/Puliczek"
},
"html_url": "https:\/\/github.com\/Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words",
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T18:04:30Z",
2021-12-11 21:14:45 +09:00
"pushed_at": "2021-12-11T10:10:10Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 30,
2021-12-11 09:13:08 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"bugbounttips",
"bugbounty",
"bugbounty-writeups",
"cve",
"cve-2021-44228",
"cybersecurity",
"exploit",
"hacking",
"log4j",
"payload",
"pentest",
"pentesting",
"red-team",
"security",
"security-writeups",
"writeups"
],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 30,
"watchers": 117,
2021-12-11 15:15:36 +09:00
"score": 0
},
{
"id": 437139341,
"name": "log4j-shell-poc",
"full_name": "kozmer\/log4j-shell-poc",
"owner": {
"login": "kozmer",
"id": 87979263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4",
"html_url": "https:\/\/github.com\/kozmer"
},
"html_url": "https:\/\/github.com\/kozmer\/log4j-shell-poc",
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T17:28:57Z",
"pushed_at": "2021-12-12T17:28:54Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
2021-12-11 15:15:36 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"java",
"log4j",
"security"
],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 5,
"watchers": 9,
2021-12-11 09:13:08 +09:00
"score": 0
},
{
"id": 437141854,
"name": "cve-2021-44228-workaround-buildpack",
"full_name": "alexandreroman\/cve-2021-44228-workaround-buildpack",
"owner": {
"login": "alexandreroman",
"id": 665131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/665131?v=4",
"html_url": "https:\/\/github.com\/alexandreroman"
},
"html_url": "https:\/\/github.com\/alexandreroman\/cve-2021-44228-workaround-buildpack",
"description": "Buildpack providing a workaround for CVE-2021-44228 (Log4j RCE exploit)",
"fork": false,
"created_at": "2021-12-10T23:34:52Z",
2021-12-12 15:13:51 +09:00
"updated_at": "2021-12-12T02:02:27Z",
2021-12-11 09:13:08 +09:00
"pushed_at": "2021-12-10T23:47:14Z",
2021-12-12 15:13:51 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2021-12-11 09:13:08 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-12 15:13:51 +09:00
"watchers": 1,
2021-12-11 09:13:08 +09:00
"score": 0
},
{
"id": 437141974,
"name": "minecraft-log4j-honeypot",
"full_name": "Adikso\/minecraft-log4j-honeypot",
"owner": {
"login": "Adikso",
"id": 1407751,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1407751?v=4",
"html_url": "https:\/\/github.com\/Adikso"
},
"html_url": "https:\/\/github.com\/Adikso\/minecraft-log4j-honeypot",
"description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
"fork": false,
"created_at": "2021-12-10T23:35:31Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T17:10:49Z",
2021-12-12 03:13:20 +09:00
"pushed_at": "2021-12-11T15:22:42Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
2021-12-11 09:13:08 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve",
"exploit",
"log4j",
"minecraft"
],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 4,
"watchers": 16,
2021-12-11 15:15:36 +09:00
"score": 0
},
{
"id": 437142312,
"name": "CVE-2021-44228",
"full_name": "racoon-rac\/CVE-2021-44228",
"owner": {
"login": "racoon-rac",
"id": 64579294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4",
"html_url": "https:\/\/github.com\/racoon-rac"
},
"html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-10T23:37:55Z",
"updated_at": "2021-12-11T01:11:19Z",
"pushed_at": "2021-12-11T01:07:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437155858,
"name": "log4shelldetect",
"full_name": "1lann\/log4shelldetect",
"owner": {
"login": "1lann",
"id": 804919,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/804919?v=4",
"html_url": "https:\/\/github.com\/1lann"
},
"html_url": "https:\/\/github.com\/1lann\/log4shelldetect",
"description": "Scans files for .jars potentially vulnerable to Log4Shell (CVE-2021-44228) by inspecting the class paths inside the .jar.",
"fork": false,
"created_at": "2021-12-11T01:08:00Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T13:23:13Z",
2021-12-11 21:14:45 +09:00
"pushed_at": "2021-12-11T07:45:30Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 10,
"watchers_count": 10,
2021-12-11 15:15:36 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-13 03:14:09 +09:00
"watchers": 10,
2021-12-11 15:15:36 +09:00
"score": 0
},
{
"id": 437164940,
"name": "Log4j2-RCE",
"full_name": "binganao\/Log4j2-RCE",
"owner": {
"login": "binganao",
"id": 70050083,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4",
"html_url": "https:\/\/github.com\/binganao"
},
"html_url": "https:\/\/github.com\/binganao\/Log4j2-RCE",
"description": "Log4j2 CVE-2021-44228 复现和回显利用",
"fork": false,
"created_at": "2021-12-11T02:08:41Z",
"updated_at": "2021-12-11T03:38:05Z",
"pushed_at": "2021-12-11T03:38:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437170557,
"name": "sample-ldap-exploit",
"full_name": "phoswald\/sample-ldap-exploit",
"owner": {
"login": "phoswald",
"id": 12776329,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4",
"html_url": "https:\/\/github.com\/phoswald"
},
"html_url": "https:\/\/github.com\/phoswald\/sample-ldap-exploit",
"description": "A short demo of CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T02:45:39Z",
2021-12-12 21:13:07 +09:00
"updated_at": "2021-12-12T11:32:41Z",
"pushed_at": "2021-12-12T11:32:38Z",
2021-12-12 15:13:51 +09:00
"stargazers_count": 4,
"watchers_count": 4,
2021-12-13 03:14:09 +09:00
"forks_count": 2,
2021-12-11 15:15:36 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 2,
2021-12-12 15:13:51 +09:00
"watchers": 4,
2021-12-11 15:15:36 +09:00
"score": 0
},
{
"id": 437174339,
"name": "jndi-ldap-test-server",
"full_name": "rakutentech\/jndi-ldap-test-server",
"owner": {
"login": "rakutentech",
"id": 1415441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1415441?v=4",
"html_url": "https:\/\/github.com\/rakutentech"
},
"html_url": "https:\/\/github.com\/rakutentech\/jndi-ldap-test-server",
"description": "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-11T03:08:14Z",
2021-12-11 21:14:45 +09:00
"updated_at": "2021-12-11T07:29:28Z",
"pushed_at": "2021-12-11T07:31:02Z",
2021-12-11 15:15:36 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"jndi",
"ldap",
"log4j",
"log4j2",
"vulnerability-detection"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
2021-12-12 21:13:07 +09:00
{
"id": 437186290,
"name": "cve-2021-44228--spring-hibernate",
"full_name": "uint0\/cve-2021-44228--spring-hibernate",
"owner": {
"login": "uint0",
"id": 11325389,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4",
"html_url": "https:\/\/github.com\/uint0"
},
"html_url": "https:\/\/github.com\/uint0\/cve-2021-44228--spring-hibernate",
"description": "CVE-2021-44228 POC - Spring \/ Hibernate",
"fork": false,
"created_at": "2021-12-11T04:23:22Z",
"updated_at": "2021-12-12T09:41:19Z",
"pushed_at": "2021-12-11T06:25:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
2021-12-11 15:15:36 +09:00
{
"id": 437188129,
"name": "log4j_CVE-2021-44228_tester",
"full_name": "ssstonebraker\/log4j_CVE-2021-44228_tester",
"owner": {
"login": "ssstonebraker",
"id": 774940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/774940?v=4",
"html_url": "https:\/\/github.com\/ssstonebraker"
},
"html_url": "https:\/\/github.com\/ssstonebraker\/log4j_CVE-2021-44228_tester",
"description": "Test for log4j vulnerability across your external footprint",
"fork": false,
"created_at": "2021-12-11T04:34:51Z",
2021-12-12 15:13:51 +09:00
"updated_at": "2021-12-12T03:52:32Z",
2021-12-11 15:15:36 +09:00
"pushed_at": "2021-12-11T06:11:45Z",
2021-12-12 15:13:51 +09:00
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
2021-12-11 21:14:45 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 2,
"watchers": 7,
2021-12-11 21:14:45 +09:00
"score": 0
},
{
"id": 437214791,
"name": "log4j-vulnerability-patcher-agent",
"full_name": "saharNooby\/log4j-vulnerability-patcher-agent",
"owner": {
"login": "saharNooby",
"id": 10616794,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10616794?v=4",
"html_url": "https:\/\/github.com\/saharNooby"
},
"html_url": "https:\/\/github.com\/saharNooby\/log4j-vulnerability-patcher-agent",
"description": "Fixes CVE-2021-44228 in log4j by patching JndiLookup class",
"fork": false,
"created_at": "2021-12-11T07:16:21Z",
"updated_at": "2021-12-11T11:09:42Z",
"pushed_at": "2021-12-11T07:34:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"agent",
"bytecode",
"cve",
"fix",
"log4j",
"patch"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 437215271,
"name": "log4j2burpscanner",
"full_name": "f0ng\/log4j2burpscanner",
"owner": {
"login": "f0ng",
"id": 48286013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4",
"html_url": "https:\/\/github.com\/f0ng"
},
"html_url": "https:\/\/github.com\/f0ng\/log4j2burpscanner",
"description": "CVE-2021-44228log4j2 burp插件 Java版本dnslog选取了非dnslog.cn域名",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T15:00:33Z",
2021-12-12 21:13:07 +09:00
"pushed_at": "2021-12-12T11:03:19Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 8,
2021-12-11 21:14:45 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 8,
"watchers": 23,
2021-12-11 21:14:45 +09:00
"score": 0
},
{
"id": 437221795,
"name": "CVE-2021-44228-Log4j-lookup-Rce",
"full_name": "M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce",
"owner": {
"login": "M1ngGod",
"id": 81064151,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81064151?v=4",
"html_url": "https:\/\/github.com\/M1ngGod"
},
"html_url": "https:\/\/github.com\/M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce",
"description": null,
"fork": false,
"created_at": "2021-12-11T07:55:45Z",
2021-12-12 21:13:07 +09:00
"updated_at": "2021-12-12T09:17:27Z",
2021-12-11 21:14:45 +09:00
"pushed_at": "2021-12-11T08:07:20Z",
2021-12-12 21:13:07 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2021-12-11 21:14:45 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-12 21:13:07 +09:00
"watchers": 2,
2021-12-11 21:14:45 +09:00
"score": 0
},
{
"id": 437244092,
"name": "CVE-2021-44228-Apache-Log4j-Rce",
"full_name": "byteboycn\/CVE-2021-44228-Apache-Log4j-Rce",
"owner": {
"login": "byteboycn",
"id": 14987996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14987996?v=4",
"html_url": "https:\/\/github.com\/byteboycn"
},
"html_url": "https:\/\/github.com\/byteboycn\/CVE-2021-44228-Apache-Log4j-Rce",
"description": null,
"fork": false,
"created_at": "2021-12-11T09:52:36Z",
"updated_at": "2021-12-11T09:56:47Z",
"pushed_at": "2021-12-11T09:53:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 437248883,
"name": "log4shell-mitigation-tester",
"full_name": "lhotari\/log4shell-mitigation-tester",
"owner": {
"login": "lhotari",
"id": 66864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4",
"html_url": "https:\/\/github.com\/lhotari"
},
"html_url": "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester",
"description": "Log4Shell CVE-2021-44228 mitigation tester",
"fork": false,
"created_at": "2021-12-11T10:16:58Z",
2021-12-12 21:13:07 +09:00
"updated_at": "2021-12-12T09:12:45Z",
"pushed_at": "2021-12-12T09:12:42Z",
"stargazers_count": 2,
"watchers_count": 2,
2021-12-11 21:14:45 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-12 21:13:07 +09:00
"watchers": 2,
2021-12-11 21:14:45 +09:00
"score": 0
},
{
"id": 437249303,
"name": "log4j-rce-detect-waf-bypass",
"full_name": "toramanemre\/log4j-rce-detect-waf-bypass",
"owner": {
"login": "toramanemre",
"id": 24626967,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4",
"html_url": "https:\/\/github.com\/toramanemre"
},
"html_url": "https:\/\/github.com\/toramanemre\/log4j-rce-detect-waf-bypass",
"description": "A Nuclei Template for Apache Log4j RCE (CVE-2021-44228) Detection with WAF Bypass Payloads",
"fork": false,
"created_at": "2021-12-11T10:19:01Z",
2021-12-12 21:13:07 +09:00
"updated_at": "2021-12-12T09:01:17Z",
2021-12-11 21:14:45 +09:00
"pushed_at": "2021-12-11T10:19:51Z",
2021-12-12 21:13:07 +09:00
"stargazers_count": 8,
"watchers_count": 8,
2021-12-12 15:13:51 +09:00
"forks_count": 2,
2021-12-11 21:14:45 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 2,
2021-12-12 21:13:07 +09:00
"watchers": 8,
2021-12-11 21:14:45 +09:00
"score": 0
},
{
"id": 437261211,
"name": "CVE-2021-44228-Scanner",
"full_name": "logpresso\/CVE-2021-44228-Scanner",
"owner": {
"login": "logpresso",
"id": 14171714,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14171714?v=4",
"html_url": "https:\/\/github.com\/logpresso"
},
"html_url": "https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner",
2021-12-12 15:13:51 +09:00
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
2021-12-11 21:14:45 +09:00
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T16:51:07Z",
"pushed_at": "2021-12-12T18:01:31Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 6,
2021-12-11 21:14:45 +09:00
"allow_forking": true,
"is_template": false,
2021-12-12 21:13:07 +09:00
"topics": [
"cve-2021-44228",
"log4j2",
"patch",
"scanner"
],
2021-12-11 21:14:45 +09:00
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 6,
"watchers": 30,
2021-12-11 21:14:45 +09:00
"score": 0
},
{
"id": 437265194,
"name": "Log4j_CVE-2021-44228",
"full_name": "vorburger\/Log4j_CVE-2021-44228",
"owner": {
"login": "vorburger",
"id": 298598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/298598?v=4",
"html_url": "https:\/\/github.com\/vorburger"
},
"html_url": "https:\/\/github.com\/vorburger\/Log4j_CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-11T11:38:16Z",
2021-12-12 03:13:20 +09:00
"updated_at": "2021-12-11T17:02:11Z",
"pushed_at": "2021-12-11T17:02:09Z",
2021-12-11 21:14:45 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437265792,
"name": "log4j2021_vul_test",
"full_name": "gauthamg\/log4j2021_vul_test",
"owner": {
"login": "gauthamg",
"id": 8748677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4",
"html_url": "https:\/\/github.com\/gauthamg"
},
"html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test",
"description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:41:04Z",
2021-12-12 03:13:20 +09:00
"updated_at": "2021-12-11T15:15:15Z",
"pushed_at": "2021-12-11T15:15:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437275323,
"name": "jndiRep",
"full_name": "js-on\/jndiRep",
"owner": {
"login": "js-on",
"id": 55274241,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55274241?v=4",
"html_url": "https:\/\/github.com\/js-on"
},
"html_url": "https:\/\/github.com\/js-on\/jndiRep",
"description": "Scan your logs for CVE-2021-44228 related activity and report the attackers",
"fork": false,
"created_at": "2021-12-11T12:25:08Z",
2021-12-12 09:13:11 +09:00
"updated_at": "2021-12-11T23:45:36Z",
"pushed_at": "2021-12-11T23:45:33Z",
2021-12-12 03:13:20 +09:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 437278973,
"name": "CVE-2021-44228-Advisories",
"full_name": "leetxyz\/CVE-2021-44228-Advisories",
"owner": {
"login": "leetxyz",
"id": 46599191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46599191?v=4",
"html_url": "https:\/\/github.com\/leetxyz"
},
"html_url": "https:\/\/github.com\/leetxyz\/CVE-2021-44228-Advisories",
"description": "List of company advisories log4j",
"fork": false,
"created_at": "2021-12-11T12:41:38Z",
2021-12-12 21:13:07 +09:00
"updated_at": "2021-12-12T09:46:19Z",
"pushed_at": "2021-12-12T09:46:17Z",
2021-12-12 15:13:51 +09:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
2021-12-12 03:13:20 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 1,
"watchers": 1,
2021-12-12 03:13:20 +09:00
"score": 0
},
{
"id": 437283982,
"name": "log4shell",
"full_name": "cado-security\/log4shell",
"owner": {
"login": "cado-security",
"id": 63289041,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63289041?v=4",
"html_url": "https:\/\/github.com\/cado-security"
},
"html_url": "https:\/\/github.com\/cado-security\/log4shell",
"description": "Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T13:03:31Z",
"updated_at": "2021-12-11T14:52:33Z",
"pushed_at": "2021-12-11T14:52:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 437289885,
"name": "Log4J_0day_RCE",
"full_name": "PwnC00re\/Log4J_0day_RCE",
"owner": {
"login": "PwnC00re",
"id": 95032387,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95032387?v=4",
"html_url": "https:\/\/github.com\/PwnC00re"
},
"html_url": "https:\/\/github.com\/PwnC00re\/Log4J_0day_RCE",
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept",
"fork": false,
"created_at": "2021-12-11T13:28:52Z",
2021-12-12 15:13:51 +09:00
"updated_at": "2021-12-12T03:48:01Z",
2021-12-12 03:13:20 +09:00
"pushed_at": "2021-12-11T13:31:47Z",
2021-12-12 15:13:51 +09:00
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
2021-12-12 03:13:20 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 1,
"watchers": 2,
2021-12-12 03:13:20 +09:00
"score": 0
},
{
"id": 437296454,
"name": "log4j-vulnerable-app-cve-2021-44228-terraform",
"full_name": "Mormoroth\/log4j-vulnerable-app-cve-2021-44228-terraform",
"owner": {
"login": "Mormoroth",
"id": 23025217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23025217?v=4",
"html_url": "https:\/\/github.com\/Mormoroth"
},
"html_url": "https:\/\/github.com\/Mormoroth\/log4j-vulnerable-app-cve-2021-44228-terraform",
"description": "A Terraform to deploy vulnerable app and a JDNIExploit to work with CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T13:56:28Z",
"updated_at": "2021-12-11T16:44:51Z",
"pushed_at": "2021-12-11T14:53:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 437305706,
"name": "javalogslulz",
"full_name": "trevalkov\/javalogslulz",
"owner": {
"login": "trevalkov",
"id": 52704508,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52704508?v=4",
"html_url": "https:\/\/github.com\/trevalkov"
},
"html_url": "https:\/\/github.com\/trevalkov\/javalogslulz",
"description": "proof of concept for CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T14:34:43Z",
"updated_at": "2021-12-11T16:53:22Z",
"pushed_at": "2021-12-11T16:53:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437310436,
"name": "log4j-CVE-2021-44228-Public-IoCs",
"full_name": "Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs",
"owner": {
"login": "Sh0ckFR",
"id": 10033649,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10033649?v=4",
"html_url": "https:\/\/github.com\/Sh0ckFR"
},
"html_url": "https:\/\/github.com\/Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs",
"description": "Public IoCs about log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T14:54:45Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T15:08:36Z",
"pushed_at": "2021-12-12T15:08:33Z",
"stargazers_count": 2,
"watchers_count": 2,
2021-12-12 15:13:51 +09:00
"forks_count": 1,
2021-12-11 15:15:36 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 1,
2021-12-13 03:14:09 +09:00
"watchers": 2,
2021-12-10 15:14:52 +09:00
"score": 0
2021-12-12 03:13:20 +09:00
},
{
"id": 437316134,
"name": "log4j2-vulnerable-spring-app",
"full_name": "zzzz0317\/log4j2-vulnerable-spring-app",
"owner": {
"login": "zzzz0317",
"id": 16097046,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4",
"html_url": "https:\/\/github.com\/zzzz0317"
},
"html_url": "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app",
"description": "CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T15:18:42Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T17:20:41Z",
"pushed_at": "2021-12-12T17:20:39Z",
2021-12-12 03:13:20 +09:00
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 437319619,
"name": "test-44228",
"full_name": "datadavev\/test-44228",
"owner": {
"login": "datadavev",
"id": 605409,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/605409?v=4",
"html_url": "https:\/\/github.com\/datadavev"
},
"html_url": "https:\/\/github.com\/datadavev\/test-44228",
"description": "Simple demo of CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T15:33:17Z",
"updated_at": "2021-12-11T15:42:35Z",
"pushed_at": "2021-12-11T15:42:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
2021-12-12 15:13:51 +09:00
{
"id": 437327955,
"name": "Log4j-Rec-CVE-2021-44228",
"full_name": "zhangxvx\/Log4j-Rec-CVE-2021-44228",
"owner": {
"login": "zhangxvx",
"id": 19684449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19684449?v=4",
"html_url": "https:\/\/github.com\/zhangxvx"
},
"html_url": "https:\/\/github.com\/zhangxvx\/Log4j-Rec-CVE-2021-44228",
"description": "Apache Log4j CVE-2021-44228 漏洞复现",
"fork": false,
"created_at": "2021-12-11T16:08:34Z",
"updated_at": "2021-12-12T03:50:45Z",
"pushed_at": "2021-12-12T03:49:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
2021-12-12 03:13:20 +09:00
{
"id": 437327995,
"name": "CVE-2021-44228",
"full_name": "darkarnium\/CVE-2021-44228",
"owner": {
"login": "darkarnium",
"id": 3048394,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3048394?v=4",
"html_url": "https:\/\/github.com\/darkarnium"
},
"html_url": "https:\/\/github.com\/darkarnium\/CVE-2021-44228",
"description": "Detections for CVE-2021-44228 inside of nested binaries",
"fork": false,
"created_at": "2021-12-11T16:08:47Z",
2021-12-12 15:13:51 +09:00
"updated_at": "2021-12-12T03:52:25Z",
2021-12-12 09:13:11 +09:00
"pushed_at": "2021-12-11T22:47:58Z",
2021-12-12 15:13:51 +09:00
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
2021-12-12 03:13:20 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"binary",
"cve-2021-44228",
"detection",
"devops",
"python",
"sca",
"security"
],
"visibility": "public",
2021-12-12 15:13:51 +09:00
"forks": 1,
"watchers": 4,
2021-12-12 09:13:11 +09:00
"score": 0
},
{
"id": 437381453,
"name": "CVE-2021-44228_Example",
"full_name": "chilliwebs\/CVE-2021-44228_Example",
"owner": {
"login": "chilliwebs",
"id": 6079309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6079309?v=4",
"html_url": "https:\/\/github.com\/chilliwebs"
},
"html_url": "https:\/\/github.com\/chilliwebs\/CVE-2021-44228_Example",
"description": null,
"fork": false,
"created_at": "2021-12-11T20:25:08Z",
"updated_at": "2021-12-11T20:28:25Z",
"pushed_at": "2021-12-11T20:28:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437397347,
"name": "f5-waf-enforce-sig-CVE-2021-44228",
"full_name": "irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228",
"owner": {
"login": "irgoncalves",
"id": 23459099,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4",
"html_url": "https:\/\/github.com\/irgoncalves"
},
"html_url": "https:\/\/github.com\/irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228",
"description": "This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device",
"fork": false,
"created_at": "2021-12-11T21:59:19Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T12:48:11Z",
2021-12-12 09:13:11 +09:00
"pushed_at": "2021-12-11T22:16:49Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2021-12-12 09:13:11 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-13 03:14:09 +09:00
"watchers": 2,
2021-12-12 09:13:11 +09:00
"score": 0
},
{
"id": 437407625,
"name": "log4j-docker-vaccine",
"full_name": "jeffbryner\/log4j-docker-vaccine",
"owner": {
"login": "jeffbryner",
"id": 566889,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/566889?v=4",
"html_url": "https:\/\/github.com\/jeffbryner"
},
"html_url": "https:\/\/github.com\/jeffbryner\/log4j-docker-vaccine",
"description": "docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T23:06:23Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T12:28:06Z",
2021-12-12 15:13:51 +09:00
"pushed_at": "2021-12-12T00:15:23Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2021-12-12 15:13:51 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-13 03:14:09 +09:00
"watchers": 1,
2021-12-12 15:13:51 +09:00
"score": 0
},
2021-12-12 21:13:07 +09:00
{
"id": 437426248,
"name": "log4j2-rce-poc",
"full_name": "unlimitedsola\/log4j2-rce-poc",
"owner": {
"login": "unlimitedsola",
"id": 3632663,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3632663?v=4",
"html_url": "https:\/\/github.com\/unlimitedsola"
},
"html_url": "https:\/\/github.com\/unlimitedsola\/log4j2-rce-poc",
"description": "A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228\/Log4Shell).",
"fork": false,
"created_at": "2021-12-12T01:23:45Z",
"updated_at": "2021-12-12T09:59:28Z",
"pushed_at": "2021-12-12T09:59:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"log4j2",
"log4shell",
"poc",
"proof-of-concept",
"rce",
"remote-code-execution"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
2021-12-12 15:13:51 +09:00
{
"id": 437426386,
"name": "hotpatch-for-apache-log4j2",
"full_name": "corretto\/hotpatch-for-apache-log4j2",
"owner": {
"login": "corretto",
"id": 44104058,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44104058?v=4",
"html_url": "https:\/\/github.com\/corretto"
},
"html_url": "https:\/\/github.com\/corretto\/hotpatch-for-apache-log4j2",
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T18:03:58Z",
"pushed_at": "2021-12-12T16:44:20Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 3,
2021-12-12 15:13:51 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 3,
"watchers": 30,
2021-12-12 15:13:51 +09:00
"score": 0
},
{
"id": 437438829,
"name": "python-log4rce",
"full_name": "alexandre-lavoie\/python-log4rce",
"owner": {
"login": "alexandre-lavoie",
"id": 36684879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36684879?v=4",
"html_url": "https:\/\/github.com\/alexandre-lavoie"
},
"html_url": "https:\/\/github.com\/alexandre-lavoie\/python-log4rce",
"description": "An All-In-One Pure Python PoC for CVE-2021-44228",
"fork": false,
"created_at": "2021-12-12T02:57:49Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T17:58:26Z",
2021-12-12 21:13:07 +09:00
"pushed_at": "2021-12-12T06:36:27Z",
2021-12-13 03:14:09 +09:00
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
2021-12-12 15:13:51 +09:00
"allow_forking": true,
"is_template": false,
2021-12-13 03:14:09 +09:00
"topics": [
"cve-2021-44228",
"log4j",
"python",
"rce"
],
2021-12-12 15:13:51 +09:00
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 4,
"watchers": 11,
2021-12-12 15:13:51 +09:00
"score": 0
},
{
"id": 437439106,
"name": "Log4Shell_CVE-2021-44228_related_attacks_IOCs",
"full_name": "RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs",
"owner": {
"login": "RedDrip7",
"id": 51360411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51360411?v=4",
"html_url": "https:\/\/github.com\/RedDrip7"
},
"html_url": "https:\/\/github.com\/RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs",
"description": null,
"fork": false,
"created_at": "2021-12-12T02:59:54Z",
2021-12-12 21:13:07 +09:00
"updated_at": "2021-12-12T11:14:41Z",
"pushed_at": "2021-12-12T08:13:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
2021-12-12 15:13:51 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-12 21:13:07 +09:00
"forks": 2,
"watchers": 3,
2021-12-12 15:13:51 +09:00
"score": 0
},
{
"id": 437440782,
"name": "CVE-2021-44228-Demo",
"full_name": "mzlogin\/CVE-2021-44228-Demo",
"owner": {
"login": "mzlogin",
"id": 1646590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1646590?v=4",
"html_url": "https:\/\/github.com\/mzlogin"
},
"html_url": "https:\/\/github.com\/mzlogin\/CVE-2021-44228-Demo",
"description": "Apache Log4j2 CVE-2021-44228 RCE",
"fork": false,
"created_at": "2021-12-12T03:11:14Z",
"updated_at": "2021-12-12T04:06:24Z",
"pushed_at": "2021-12-12T03:22:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"jndi",
"ldap",
"rmi"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 437450552,
"name": "CVE-2021-44228-quickfix-script",
"full_name": "Ghost-chu\/CVE-2021-44228-quickfix-script",
"owner": {
"login": "Ghost-chu",
"id": 30802565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30802565?v=4",
"html_url": "https:\/\/github.com\/Ghost-chu"
},
"html_url": "https:\/\/github.com\/Ghost-chu\/CVE-2021-44228-quickfix-script",
"description": "Use environment variable to disable lookup.",
"fork": false,
"created_at": "2021-12-12T04:17:08Z",
"updated_at": "2021-12-12T05:19:16Z",
"pushed_at": "2021-12-12T05:19:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437451451,
"name": "vcenter-log4j",
"full_name": "blake-fm\/vcenter-log4j",
"owner": {
"login": "blake-fm",
"id": 89286531,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89286531?v=4",
"html_url": "https:\/\/github.com\/blake-fm"
},
"html_url": "https:\/\/github.com\/blake-fm\/vcenter-log4j",
"description": "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228",
"fork": false,
"created_at": "2021-12-12T04:23:10Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T17:09:41Z",
"pushed_at": "2021-12-12T17:09:38Z",
"stargazers_count": 2,
"watchers_count": 2,
2021-12-12 21:13:07 +09:00
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
2021-12-13 03:14:09 +09:00
"watchers": 2,
2021-12-12 21:13:07 +09:00
"score": 0
},
{
"id": 437479258,
"name": "CVE-2021-44228-Apache-Log4j-Rce__review",
"full_name": "creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review",
"owner": {
"login": "creamIcec",
"id": 42510470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42510470?v=4",
"html_url": "https:\/\/github.com\/creamIcec"
},
"html_url": "https:\/\/github.com\/creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review",
"description": "log4j2漏洞复现",
"fork": false,
"created_at": "2021-12-12T07:20:03Z",
"updated_at": "2021-12-12T07:20:03Z",
"pushed_at": "2021-12-12T07:20:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437482830,
"name": "CVE-2021-44228",
"full_name": "bchaber\/CVE-2021-44228",
"owner": {
"login": "bchaber",
"id": 45143424,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45143424?v=4",
"html_url": "https:\/\/github.com\/bchaber"
},
"html_url": "https:\/\/github.com\/bchaber\/CVE-2021-44228",
"description": "My take on Log4j2 vulnerability",
"fork": false,
"created_at": "2021-12-12T07:39:51Z",
"updated_at": "2021-12-12T07:41:16Z",
"pushed_at": "2021-12-12T07:41:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437501121,
"name": "cve-2021-44228-helpers",
"full_name": "uint0\/cve-2021-44228-helpers",
"owner": {
"login": "uint0",
"id": 11325389,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4",
"html_url": "https:\/\/github.com\/uint0"
},
"html_url": "https:\/\/github.com\/uint0\/cve-2021-44228-helpers",
"description": null,
"fork": false,
"created_at": "2021-12-12T09:21:09Z",
"updated_at": "2021-12-12T09:21:27Z",
"pushed_at": "2021-12-12T09:21:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437511755,
"name": "apache-log4j-poc",
"full_name": "RK800-DEV\/apache-log4j-poc",
"owner": {
"login": "RK800-DEV",
"id": 85429713,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85429713?v=4",
"html_url": "https:\/\/github.com\/RK800-DEV"
},
"html_url": "https:\/\/github.com\/RK800-DEV\/apache-log4j-poc",
"description": "CVE-2021-44228(Apache Log4j Remote Code Execution",
"fork": false,
"created_at": "2021-12-12T10:17:13Z",
"updated_at": "2021-12-12T10:17:47Z",
"pushed_at": "2021-12-12T10:17:44Z",
"stargazers_count": 0,
"watchers_count": 0,
2021-12-13 03:14:09 +09:00
"forks_count": 1,
2021-12-12 21:13:07 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-13 03:14:09 +09:00
"forks": 1,
2021-12-12 21:13:07 +09:00
"watchers": 0,
"score": 0
},
{
"id": 437512798,
2021-12-13 03:14:09 +09:00
"name": "log4j-CVE-2021-44228",
"full_name": "sud0x00\/log4j-CVE-2021-44228",
2021-12-12 21:13:07 +09:00
"owner": {
"login": "sud0x00",
"id": 91898207,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91898207?v=4",
"html_url": "https:\/\/github.com\/sud0x00"
},
2021-12-13 03:14:09 +09:00
"html_url": "https:\/\/github.com\/sud0x00\/log4j-CVE-2021-44228",
2021-12-12 21:13:07 +09:00
"description": "On December 5, 2021, Apache identified a vulnerability (later identified as CVE-2021-44228) in their widely used Log4j logging service. The vulnerability, also known as Log4shell, enables attackers to gain full control of affected servers by allowing unauthenticated remote code execution if the user is running an application utilizing the Java logging library. Log4j is heavily integrated into a broad set of devops frameworks, enterprise IT systems, and vendor software and cloud products.",
"fork": false,
"created_at": "2021-12-12T10:22:45Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T14:08:35Z",
"pushed_at": "2021-12-12T14:08:08Z",
"stargazers_count": 1,
"watchers_count": 1,
2021-12-12 21:13:07 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-13 03:14:09 +09:00
"watchers": 1,
2021-12-12 21:13:07 +09:00
"score": 0
},
{
"id": 437522139,
"name": "CVE-2021-44228-research",
"full_name": "mute1997\/CVE-2021-44228-research",
"owner": {
"login": "mute1997",
"id": 4436476,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436476?v=4",
"html_url": "https:\/\/github.com\/mute1997"
},
"html_url": "https:\/\/github.com\/mute1997\/CVE-2021-44228-research",
"description": null,
"fork": false,
"created_at": "2021-12-12T11:08:54Z",
"updated_at": "2021-12-12T11:10:28Z",
"pushed_at": "2021-12-12T11:09:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437525008,
"name": "cve-2021-44228-minecraft-poc",
"full_name": "myyxl\/cve-2021-44228-minecraft-poc",
"owner": {
"login": "myyxl",
"id": 22593897,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22593897?v=4",
"html_url": "https:\/\/github.com\/myyxl"
},
"html_url": "https:\/\/github.com\/myyxl\/cve-2021-44228-minecraft-poc",
2021-12-13 03:14:09 +09:00
"description": "Log4J CVE-2021-44228 Minecraft PoC",
2021-12-12 21:13:07 +09:00
"fork": false,
"created_at": "2021-12-12T11:22:51Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T15:25:58Z",
2021-12-12 21:13:07 +09:00
"pushed_at": "2021-12-12T11:34:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437525445,
"name": "Awesome-CVE-2021-44228",
"full_name": "RrUZi\/Awesome-CVE-2021-44228",
"owner": {
"login": "RrUZi",
"id": 43235635,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43235635?v=4",
"html_url": "https:\/\/github.com\/RrUZi"
},
"html_url": "https:\/\/github.com\/RrUZi\/Awesome-CVE-2021-44228",
"description": "An awesome curated list of repos for CVE-2021-44228. ``Apache Log4j 2``",
"fork": false,
"created_at": "2021-12-12T11:25:00Z",
"updated_at": "2021-12-12T11:35:58Z",
"pushed_at": "2021-12-12T11:33:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"log4j2"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 437525803,
"name": "CVE-2021-44228",
"full_name": "0-x-2-2\/CVE-2021-44228",
"owner": {
"login": "0-x-2-2",
"id": 9968651,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9968651?v=4",
"html_url": "https:\/\/github.com\/0-x-2-2"
},
"html_url": "https:\/\/github.com\/0-x-2-2\/CVE-2021-44228",
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
"fork": false,
"created_at": "2021-12-12T11:26:42Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T18:00:22Z",
"pushed_at": "2021-12-12T17:37:11Z",
"stargazers_count": 13,
"watchers_count": 13,
2021-12-12 21:13:07 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"exploit",
"jndi",
"ldap",
"log4j",
"minecraft",
"rce"
],
"visibility": "public",
"forks": 0,
2021-12-13 03:14:09 +09:00
"watchers": 13,
2021-12-12 21:13:07 +09:00
"score": 0
},
{
"id": 437526871,
"name": "log4j-poc",
"full_name": "Crane-Mocker\/log4j-poc",
"owner": {
"login": "Crane-Mocker",
"id": 46662246,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46662246?v=4",
"html_url": "https:\/\/github.com\/Crane-Mocker"
},
"html_url": "https:\/\/github.com\/Crane-Mocker\/log4j-poc",
"description": "Poc of log4j2 (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T11:31:45Z",
2021-12-13 03:14:09 +09:00
"updated_at": "2021-12-12T12:19:15Z",
"pushed_at": "2021-12-12T12:19:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437538957,
"name": "CVE-2021-44228-log4Shell",
"full_name": "kali-dass\/CVE-2021-44228-log4Shell",
"owner": {
"login": "kali-dass",
"id": 28717904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28717904?v=4",
"html_url": "https:\/\/github.com\/kali-dass"
},
"html_url": "https:\/\/github.com\/kali-dass\/CVE-2021-44228-log4Shell",
"description": "Sample log4j shell exploit",
"fork": false,
"created_at": "2021-12-12T12:27:39Z",
"updated_at": "2021-12-12T13:23:12Z",
"pushed_at": "2021-12-12T13:23:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437546559,
"name": "log4j2-CVE-2021-44228",
"full_name": "pravin-pp\/log4j2-CVE-2021-44228",
"owner": {
"login": "pravin-pp",
"id": 12995541,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4",
"html_url": "https:\/\/github.com\/pravin-pp"
},
"html_url": "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-12T13:00:38Z",
"updated_at": "2021-12-12T13:25:30Z",
"pushed_at": "2021-12-12T13:25:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437550473,
"name": "Exploitation-of-Log4j2-CVE-2021-44228",
"full_name": "Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228",
"owner": {
"login": "Malwar3Ninja",
"id": 34618086,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34618086?v=4",
"html_url": "https:\/\/github.com\/Malwar3Ninja"
},
"html_url": "https:\/\/github.com\/Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228",
"description": "IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-12T13:17:18Z",
"updated_at": "2021-12-12T17:42:25Z",
"pushed_at": "2021-12-12T17:42:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 437551037,
"name": "docker-log4shell",
"full_name": "urholaukkarinen\/docker-log4shell",
"owner": {
"login": "urholaukkarinen",
"id": 5576504,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5576504?v=4",
"html_url": "https:\/\/github.com\/urholaukkarinen"
},
"html_url": "https:\/\/github.com\/urholaukkarinen\/docker-log4shell",
"description": "Dockerized Go app for testing the CVE-2021-44228 vulnerability",
"fork": false,
"created_at": "2021-12-12T13:19:50Z",
"updated_at": "2021-12-12T13:23:50Z",
"pushed_at": "2021-12-12T13:21:28Z",
2021-12-12 09:13:11 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-12 03:13:20 +09:00
"watchers": 0,
"score": 0
2021-12-13 03:14:09 +09:00
},
{
"id": 437553138,
"name": "scan4log4j",
"full_name": "ssl\/scan4log4j",
"owner": {
"login": "ssl",
"id": 25695071,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25695071?v=4",
"html_url": "https:\/\/github.com\/ssl"
},
"html_url": "https:\/\/github.com\/ssl\/scan4log4j",
"description": "Python script that sends CVE-2021-44228 log4j payload requests to url list",
"fork": false,
"created_at": "2021-12-12T13:28:31Z",
"updated_at": "2021-12-12T18:07:33Z",
"pushed_at": "2021-12-12T13:39:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 437557116,
"name": "nginx-mitigate-log4shell",
"full_name": "infiniroot\/nginx-mitigate-log4shell",
"owner": {
"login": "infiniroot",
"id": 29702565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29702565?v=4",
"html_url": "https:\/\/github.com\/infiniroot"
},
"html_url": "https:\/\/github.com\/infiniroot\/nginx-mitigate-log4shell",
"description": "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script",
"fork": false,
"created_at": "2021-12-12T13:45:08Z",
"updated_at": "2021-12-12T15:16:56Z",
"pushed_at": "2021-12-12T13:51:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 437560690,
"name": "log4j-cve-2021-44228",
"full_name": "lohanichaten\/log4j-cve-2021-44228",
"owner": {
"login": "lohanichaten",
"id": 70852336,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70852336?v=4",
"html_url": "https:\/\/github.com\/lohanichaten"
},
"html_url": "https:\/\/github.com\/lohanichaten\/log4j-cve-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-12T13:59:38Z",
"updated_at": "2021-12-12T14:03:46Z",
"pushed_at": "2021-12-12T14:03:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437562080,
"name": "log4j-log4shell-affected",
"full_name": "authomize\/log4j-log4shell-affected",
"owner": {
"login": "authomize",
"id": 57180096,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57180096?v=4",
"html_url": "https:\/\/github.com\/authomize"
},
"html_url": "https:\/\/github.com\/authomize\/log4j-log4shell-affected",
"description": "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability ",
"fork": false,
"created_at": "2021-12-12T14:05:05Z",
"updated_at": "2021-12-12T17:19:07Z",
"pushed_at": "2021-12-12T15:52:13Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"log4j",
"log4j-rce"
],
"visibility": "public",
"forks": 0,
"watchers": 13,
"score": 0
},
{
"id": 437567489,
"name": "CVE-2021-44228_IoCs",
"full_name": "guardicode\/CVE-2021-44228_IoCs",
"owner": {
"login": "guardicode",
"id": 64462782,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64462782?v=4",
"html_url": "https:\/\/github.com\/guardicode"
},
"html_url": "https:\/\/github.com\/guardicode\/CVE-2021-44228_IoCs",
"description": "Known IoCs for log4j framework vulnerability ",
"fork": false,
"created_at": "2021-12-12T14:27:28Z",
"updated_at": "2021-12-12T17:58:45Z",
"pushed_at": "2021-12-12T17:58:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 437574258,
"name": "log4j-poc",
"full_name": "fireflyingup\/log4j-poc",
"owner": {
"login": "fireflyingup",
"id": 48504204,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4",
"html_url": "https:\/\/github.com\/fireflyingup"
},
"html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc",
"description": "CVE-2021-44228 test demo",
"fork": false,
"created_at": "2021-12-12T14:54:25Z",
"updated_at": "2021-12-12T15:12:56Z",
"pushed_at": "2021-12-12T15:12:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437575607,
"name": "cve-2021-44228-qingteng-patch",
"full_name": "qingtengyun\/cve-2021-44228-qingteng-patch",
"owner": {
"login": "qingtengyun",
"id": 18526503,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4",
"html_url": "https:\/\/github.com\/qingtengyun"
},
"html_url": "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-patch",
"description": null,
"fork": false,
"created_at": "2021-12-12T15:00:04Z",
"updated_at": "2021-12-12T16:13:36Z",
"pushed_at": "2021-12-12T16:03:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 437583301,
"name": "cve-2021-44228-qingteng-online-patch",
"full_name": "qingtengyun\/cve-2021-44228-qingteng-online-patch",
"owner": {
"login": "qingtengyun",
"id": 18526503,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4",
"html_url": "https:\/\/github.com\/qingtengyun"
},
"html_url": "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-online-patch",
"description": null,
"fork": false,
"created_at": "2021-12-12T15:30:55Z",
"updated_at": "2021-12-12T16:20:03Z",
"pushed_at": "2021-12-12T15:49:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 437602257,
"name": "evil-rmi-server",
"full_name": "Hydragyrum\/evil-rmi-server",
"owner": {
"login": "Hydragyrum",
"id": 4928181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
"html_url": "https:\/\/github.com\/Hydragyrum"
},
"html_url": "https:\/\/github.com\/Hydragyrum\/evil-rmi-server",
"description": "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228",
"fork": false,
"created_at": "2021-12-12T16:49:45Z",
"updated_at": "2021-12-12T18:01:08Z",
"pushed_at": "2021-12-12T18:01:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437603411,
"name": "Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab",
"full_name": "twseptian\/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab",
"owner": {
"login": "twseptian",
"id": 9025301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
"html_url": "https:\/\/github.com\/twseptian"
},
"html_url": "https:\/\/github.com\/twseptian\/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab",
"description": "Spring Boot Log4j - CVE-2021-44228 Docker Lab ",
"fork": false,
"created_at": "2021-12-12T16:54:33Z",
"updated_at": "2021-12-12T17:58:16Z",
"pushed_at": "2021-12-12T17:33:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"log4j",
"spring-boot-log4j"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
2021-12-10 15:14:52 +09:00
}
]