2021-12-10 15:14:52 +09:00
[
2021-12-11 15:15:36 +09:00
{
"id" : 436666301 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce" ,
"full_name" : "tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce" ,
"owner" : {
"login" : "tangxiaofeng7" ,
"id" : 45926593 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4" ,
"html_url" : "https:\/\/github.com\/tangxiaofeng7"
} ,
"html_url" : "https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce" ,
"description" : "Apache Log4j 远程代码执行" ,
"fork" : false ,
"created_at" : "2021-12-09T15:27:38Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:58:47Z" ,
"pushed_at" : "2021-12-14T03:16:38Z" ,
"stargazers_count" : 2258 ,
"watchers_count" : 2258 ,
"forks_count" : 756 ,
2021-12-11 15:15:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 756 ,
"watchers" : 2258 ,
2021-12-11 15:15:36 +09:00
"score" : 0
} ,
2021-12-10 15:14:52 +09:00
{
"id" : 436771097 ,
"name" : "Healer" ,
"full_name" : "Glease\/Healer" ,
"owner" : {
"login" : "Glease" ,
"id" : 4586901 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4586901?v=4" ,
"html_url" : "https:\/\/github.com\/Glease"
} ,
"html_url" : "https:\/\/github.com\/Glease\/Healer" ,
"description" : "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2" ,
"fork" : false ,
"created_at" : "2021-12-09T21:49:33Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T04:22:35Z" ,
2021-12-10 15:14:52 +09:00
"pushed_at" : "2021-12-09T22:29:54Z" ,
2021-12-12 03:13:20 +09:00
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
2021-12-10 15:14:52 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-12 03:13:20 +09:00
"watchers" : 13 ,
2021-12-10 15:14:52 +09:00
"score" : 0
} ,
{
"id" : 436798675 ,
"name" : "L4J-Vuln-Patch" ,
"full_name" : "jacobtread\/L4J-Vuln-Patch" ,
"owner" : {
"login" : "jacobtread" ,
"id" : 33708767 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33708767?v=4" ,
"html_url" : "https:\/\/github.com\/jacobtread"
} ,
"html_url" : "https:\/\/github.com\/jacobtread\/L4J-Vuln-Patch" ,
"description" : "This tool patches the CVE-2021-44228 Log4J vulnerability present in all minecraft versions NOTE THIS TOOL MUST BE RE-RUN after downloading or updating versions of minecraft as its not a perminent patch" ,
"fork" : false ,
"created_at" : "2021-12-10T00:14:06Z" ,
2021-12-13 15:13:24 +09:00
"updated_at" : "2021-12-13T02:56:28Z" ,
2021-12-11 21:14:45 +09:00
"pushed_at" : "2021-12-11T07:17:57Z" ,
2021-12-13 15:13:24 +09:00
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"forks_count" : 2 ,
2021-12-10 15:14:52 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-13 15:13:24 +09:00
"forks" : 2 ,
"watchers" : 7 ,
2021-12-10 15:14:52 +09:00
"score" : 0
} ,
{
"id" : 436848055 ,
"name" : "LogJackFix" ,
"full_name" : "UltraVanilla\/LogJackFix" ,
"owner" : {
"login" : "UltraVanilla" ,
"id" : 73727575 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73727575?v=4" ,
"html_url" : "https:\/\/github.com\/UltraVanilla"
} ,
"html_url" : "https:\/\/github.com\/UltraVanilla\/LogJackFix" ,
"description" : "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients." ,
"fork" : false ,
"created_at" : "2021-12-10T04:20:03Z" ,
"updated_at" : "2021-12-10T05:11:17Z" ,
"pushed_at" : "2021-12-10T04:20:15Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 436860437 ,
"name" : "Log4j2-CVE-2021-44228" ,
"full_name" : "jas502n\/Log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/Log4j2-CVE-2021-44228" ,
"description" : "Remote Code Injection In Log4j" ,
"fork" : false ,
"created_at" : "2021-12-10T05:23:44Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:55:08Z" ,
"pushed_at" : "2021-12-14T03:57:43Z" ,
"stargazers_count" : 149 ,
"watchers_count" : 149 ,
"forks_count" : 39 ,
2021-12-10 21:13:19 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 39 ,
"watchers" : 149 ,
2021-12-10 21:13:19 +09:00
"score" : 0
} ,
{
"id" : 436871682 ,
"name" : "Log4J-RCE-Proof-Of-Concept" ,
"full_name" : "HyCraftHD\/Log4J-RCE-Proof-Of-Concept" ,
"owner" : {
"login" : "HyCraftHD" ,
"id" : 7681220 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7681220?v=4" ,
"html_url" : "https:\/\/github.com\/HyCraftHD"
} ,
"html_url" : "https:\/\/github.com\/HyCraftHD\/Log4J-RCE-Proof-Of-Concept" ,
2021-12-11 03:13:57 +09:00
"description" : "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information" ,
2021-12-10 21:13:19 +09:00
"fork" : false ,
"created_at" : "2021-12-10T06:15:38Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:23:32Z" ,
2021-12-13 09:13:18 +09:00
"pushed_at" : "2021-12-12T21:41:42Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 144 ,
"watchers_count" : 144 ,
2021-12-14 09:13:41 +09:00
"forks_count" : 25 ,
2021-12-10 21:13:19 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
2021-12-11 03:13:57 +09:00
"cve" ,
"cve-2021-44228" ,
2021-12-10 21:13:19 +09:00
"cves" ,
"exploit" ,
2021-12-11 03:13:57 +09:00
"log4j" ,
2021-12-10 21:13:19 +09:00
"log4j2" ,
"minecraft"
] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 25 ,
2021-12-14 15:13:39 +09:00
"watchers" : 144 ,
2021-12-10 21:13:19 +09:00
"score" : 0
} ,
{
"id" : 436877979 ,
"name" : "cloudrasp-log4j2" ,
"full_name" : "boundaryx\/cloudrasp-log4j2" ,
"owner" : {
"login" : "boundaryx" ,
"id" : 95878655 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/95878655?v=4" ,
"html_url" : "https:\/\/github.com\/boundaryx"
} ,
"html_url" : "https:\/\/github.com\/boundaryx\/cloudrasp-log4j2" ,
"description" : "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense." ,
"fork" : false ,
"created_at" : "2021-12-10T06:42:37Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T03:00:53Z" ,
2021-12-11 15:15:36 +09:00
"pushed_at" : "2021-12-11T02:49:41Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 68 ,
"watchers_count" : 68 ,
2021-12-11 03:13:57 +09:00
"forks_count" : 12 ,
2021-12-10 21:13:19 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"defense" ,
"hardening" ,
"java" ,
"log4j" ,
"log4j2" ,
"protection" ,
"rasp" ,
2021-12-11 15:15:36 +09:00
"rce" ,
2021-12-10 21:13:19 +09:00
"security" ,
2021-12-11 15:15:36 +09:00
"security-tools" ,
"vulnerability"
2021-12-10 21:13:19 +09:00
] ,
"visibility" : "public" ,
2021-12-11 03:13:57 +09:00
"forks" : 12 ,
2021-12-14 15:13:39 +09:00
"watchers" : 68 ,
2021-12-10 21:13:19 +09:00
"score" : 0
} ,
{
"id" : 436881928 ,
"name" : "CVE-2021-44228" ,
"full_name" : "dbgee\/CVE-2021-44228" ,
"owner" : {
"login" : "dbgee" ,
"id" : 46910972 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46910972?v=4" ,
"html_url" : "https:\/\/github.com\/dbgee"
} ,
"html_url" : "https:\/\/github.com\/dbgee\/CVE-2021-44228" ,
"description" : "Apache Log4j 2 a remote code execution vulnerability via the ldap JNDI parser." ,
"fork" : false ,
"created_at" : "2021-12-10T06:59:10Z" ,
"updated_at" : "2021-12-10T07:07:27Z" ,
"pushed_at" : "2021-12-10T07:07:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-12-10 15:14:52 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-10 21:13:19 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 436886692 ,
"name" : "Log4j2-CVE-2021-44228" ,
"full_name" : "y35uishere\/Log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "y35uishere" ,
"id" : 8746668 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8746668?v=4" ,
"html_url" : "https:\/\/github.com\/y35uishere"
} ,
"html_url" : "https:\/\/github.com\/y35uishere\/Log4j2-CVE-2021-44228" ,
"description" : "Remote Code Injection In Log4j" ,
"fork" : false ,
"created_at" : "2021-12-10T07:18:15Z" ,
2021-12-12 15:13:51 +09:00
"updated_at" : "2021-12-12T03:47:13Z" ,
2021-12-10 21:13:19 +09:00
"pushed_at" : "2021-12-10T05:46:20Z" ,
2021-12-12 15:13:51 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2021-12-10 21:13:19 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 1 ,
"watchers" : 1 ,
2021-12-10 21:13:19 +09:00
"score" : 0
} ,
2021-12-12 03:13:20 +09:00
{
"id" : 436918458 ,
"name" : "Log4jPatcher" ,
"full_name" : "CreeperHost\/Log4jPatcher" ,
"owner" : {
"login" : "CreeperHost" ,
"id" : 7502613 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7502613?v=4" ,
"html_url" : "https:\/\/github.com\/CreeperHost"
} ,
"html_url" : "https:\/\/github.com\/CreeperHost\/Log4jPatcher" ,
"description" : "A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)" ,
"fork" : false ,
"created_at" : "2021-12-10T09:16:46Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T23:11:58Z" ,
2021-12-12 03:13:20 +09:00
"pushed_at" : "2021-12-11T09:15:04Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 33 ,
"watchers_count" : 33 ,
2021-12-12 21:13:07 +09:00
"forks_count" : 4 ,
2021-12-12 03:13:20 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4j2" ,
"log4shell"
] ,
"visibility" : "public" ,
2021-12-12 21:13:07 +09:00
"forks" : 4 ,
2021-12-14 09:13:41 +09:00
"watchers" : 33 ,
2021-12-12 03:13:20 +09:00
"score" : 0
} ,
2021-12-10 21:13:19 +09:00
{
"id" : 436919597 ,
"name" : "RCE" ,
"full_name" : "DragonSurvivalEU\/RCE" ,
"owner" : {
"login" : "DragonSurvivalEU" ,
"id" : 92676019 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92676019?v=4" ,
"html_url" : "https:\/\/github.com\/DragonSurvivalEU"
} ,
"html_url" : "https:\/\/github.com\/DragonSurvivalEU\/RCE" ,
"description" : "CVE-2021-44228 fix" ,
"fork" : false ,
"created_at" : "2021-12-10T09:20:40Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T12:59:51Z" ,
2021-12-10 21:13:19 +09:00
"pushed_at" : "2021-12-10T09:36:32Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2021-12-10 21:13:19 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 03:13:40 +09:00
"watchers" : 5 ,
2021-12-10 21:13:19 +09:00
"score" : 0
} ,
{
"id" : 436926113 ,
"name" : "Log4j-0Day-Fix" ,
"full_name" : "Szczurowsky\/Log4j-0Day-Fix" ,
"owner" : {
"login" : "Szczurowsky" ,
"id" : 70973416 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70973416?v=4" ,
"html_url" : "https:\/\/github.com\/Szczurowsky"
} ,
"html_url" : "https:\/\/github.com\/Szczurowsky\/Log4j-0Day-Fix" ,
"description" : "Plugin which fixes 0day exploit (CVE-2021-44228) with Log4j apache package" ,
"fork" : false ,
"created_at" : "2021-12-10T09:43:49Z" ,
"updated_at" : "2021-12-10T10:03:31Z" ,
"pushed_at" : "2021-12-10T10:04:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 436933689 ,
"name" : "Log4jPatch" ,
"full_name" : "simonis\/Log4jPatch" ,
"owner" : {
"login" : "simonis" ,
"id" : 3178197 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3178197?v=4" ,
"html_url" : "https:\/\/github.com\/simonis"
} ,
"html_url" : "https:\/\/github.com\/simonis\/Log4jPatch" ,
"description" : "Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process" ,
"fork" : false ,
"created_at" : "2021-12-10T10:10:19Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T03:00:17Z" ,
2021-12-12 21:13:07 +09:00
"pushed_at" : "2021-12-12T10:33:02Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 100 ,
"watchers_count" : 100 ,
2021-12-13 21:13:34 +09:00
"forks_count" : 9 ,
2021-12-11 03:13:57 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-13 21:13:34 +09:00
"forks" : 9 ,
2021-12-14 09:13:41 +09:00
"watchers" : 100 ,
2021-12-11 03:13:57 +09:00
"score" : 0
} ,
{
"id" : 436973468 ,
"name" : "CVE-2021-44228-Test-Server" ,
"full_name" : "zlepper\/CVE-2021-44228-Test-Server" ,
"owner" : {
"login" : "zlepper" ,
"id" : 1499810 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1499810?v=4" ,
"html_url" : "https:\/\/github.com\/zlepper"
} ,
"html_url" : "https:\/\/github.com\/zlepper\/CVE-2021-44228-Test-Server" ,
"description" : "A small server for verifing if a given java program is succeptibel to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-10T12:35:30Z" ,
2021-12-12 21:13:07 +09:00
"updated_at" : "2021-12-12T11:03:15Z" ,
2021-12-11 03:13:57 +09:00
"pushed_at" : "2021-12-10T12:39:25Z" ,
2021-12-12 21:13:07 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"forks_count" : 1 ,
2021-12-10 21:13:19 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-12 21:13:07 +09:00
"forks" : 1 ,
"watchers" : 4 ,
2021-12-11 03:13:57 +09:00
"score" : 0
} ,
{
"id" : 436974241 ,
"name" : "log4shell-vulnerable-app" ,
"full_name" : "christophetd\/log4shell-vulnerable-app" ,
"owner" : {
"login" : "christophetd" ,
"id" : 136675 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4" ,
"html_url" : "https:\/\/github.com\/christophetd"
} ,
"html_url" : "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app" ,
"description" : "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell." ,
"fork" : false ,
"created_at" : "2021-12-10T12:38:20Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T06:12:44Z" ,
2021-12-14 09:13:41 +09:00
"pushed_at" : "2021-12-13T23:02:39Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 530 ,
"watchers_count" : 530 ,
"forks_count" : 173 ,
2021-12-11 03:13:57 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 173 ,
"watchers" : 530 ,
2021-12-11 03:13:57 +09:00
"score" : 0
} ,
{
2021-12-11 15:15:36 +09:00
"id" : 437026730 ,
"name" : "VictimApp" ,
"full_name" : "nkoneko\/VictimApp" ,
2021-12-11 03:13:57 +09:00
"owner" : {
2021-12-11 15:15:36 +09:00
"login" : "nkoneko" ,
"id" : 1922341 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4" ,
"html_url" : "https:\/\/github.com\/nkoneko"
2021-12-11 03:13:57 +09:00
} ,
2021-12-11 15:15:36 +09:00
"html_url" : "https:\/\/github.com\/nkoneko\/VictimApp" ,
"description" : "Vulnerable to CVE-2021-44228. trustURLCodebase is not required." ,
2021-12-11 03:13:57 +09:00
"fork" : false ,
2021-12-11 15:15:36 +09:00
"created_at" : "2021-12-10T15:32:03Z" ,
2021-12-12 15:13:51 +09:00
"updated_at" : "2021-12-12T00:53:15Z" ,
2021-12-11 15:15:36 +09:00
"pushed_at" : "2021-12-10T22:40:15Z" ,
2021-12-12 15:13:51 +09:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"forks_count" : 2 ,
2021-12-11 03:13:57 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 2 ,
"watchers" : 5 ,
2021-12-11 03:13:57 +09:00
"score" : 0
} ,
{
"id" : 437031223 ,
"name" : "pulsar-docker-images-patch-CVE-2021-44228" ,
"full_name" : "lhotari\/pulsar-docker-images-patch-CVE-2021-44228" ,
"owner" : {
"login" : "lhotari" ,
"id" : 66864 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4" ,
"html_url" : "https:\/\/github.com\/lhotari"
} ,
"html_url" : "https:\/\/github.com\/lhotari\/pulsar-docker-images-patch-CVE-2021-44228" ,
"description" : "Patch Pulsar Docker images with Log4J 2.15.0 update to mitigate CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-10T15:46:49Z" ,
2021-12-11 21:14:45 +09:00
"updated_at" : "2021-12-11T10:40:34Z" ,
"pushed_at" : "2021-12-11T10:40:31Z" ,
2021-12-11 03:13:57 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
2021-12-11 15:15:36 +09:00
{
"id" : 437034295 ,
"name" : "Apache-Log4j2-RCE" ,
"full_name" : "1in9e\/Apache-Log4j2-RCE" ,
"owner" : {
"login" : "1in9e" ,
"id" : 15817052 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15817052?v=4" ,
"html_url" : "https:\/\/github.com\/1in9e"
} ,
"html_url" : "https:\/\/github.com\/1in9e\/Apache-Log4j2-RCE" ,
"description" : "Apache Log4j2 RCE( CVE-2021-44228)验证环境" ,
"fork" : false ,
"created_at" : "2021-12-10T15:57:14Z" ,
2021-12-12 15:13:51 +09:00
"updated_at" : "2021-12-12T03:48:15Z" ,
2021-12-11 15:15:36 +09:00
"pushed_at" : "2021-12-10T15:58:25Z" ,
2021-12-12 15:13:51 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2021-12-11 15:15:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"apache" ,
"bugbounty" ,
"cve-2021-44228" ,
"java" ,
"log4j2" ,
"rce" ,
"security"
] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 1 ,
"watchers" : 1 ,
2021-12-11 15:15:36 +09:00
"score" : 0
} ,
2021-12-11 03:13:57 +09:00
{
"id" : 437056774 ,
"name" : "CVE-2021-44228-example" ,
"full_name" : "KosmX\/CVE-2021-44228-example" ,
"owner" : {
"login" : "KosmX" ,
"id" : 15692868 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15692868?v=4" ,
"html_url" : "https:\/\/github.com\/KosmX"
} ,
"html_url" : "https:\/\/github.com\/KosmX\/CVE-2021-44228-example" ,
2021-12-11 09:13:08 +09:00
"description" : "RCE POC" ,
2021-12-11 03:13:57 +09:00
"fork" : false ,
"created_at" : "2021-12-10T17:13:18Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T12:45:37Z" ,
2021-12-12 03:13:20 +09:00
"pushed_at" : "2021-12-11T15:34:52Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2021-12-12 15:13:51 +09:00
"forks_count" : 1 ,
2021-12-11 03:13:57 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve" ,
"cve-2021-44228" ,
"rce"
] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 1 ,
2021-12-14 03:13:40 +09:00
"watchers" : 4 ,
2021-12-11 09:13:08 +09:00
"score" : 0
} ,
{
"id" : 437060009 ,
"name" : "CVE-2021-44228" ,
"full_name" : "greymd\/CVE-2021-44228" ,
"owner" : {
"login" : "greymd" ,
"id" : 3874767 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4" ,
"html_url" : "https:\/\/github.com\/greymd"
} ,
"html_url" : "https:\/\/github.com\/greymd\/CVE-2021-44228" ,
2021-12-13 21:13:34 +09:00
"description" : "Vulnerability CVE-2021-44228 checker" ,
2021-12-11 09:13:08 +09:00
"fork" : false ,
"created_at" : "2021-12-10T17:24:47Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T15:16:26Z" ,
"pushed_at" : "2021-12-13T15:16:23Z" ,
2021-12-13 15:13:24 +09:00
"stargazers_count" : 31 ,
"watchers_count" : 31 ,
2021-12-14 09:13:41 +09:00
"forks_count" : 3 ,
2021-12-11 09:13:08 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 3 ,
2021-12-13 15:13:24 +09:00
"watchers" : 31 ,
2021-12-11 03:13:57 +09:00
"score" : 0
} ,
{
"id" : 437071396 ,
"name" : "CVE-2021-44228-Log4Shell-Hashes" ,
"full_name" : "mubix\/CVE-2021-44228-Log4Shell-Hashes" ,
"owner" : {
"login" : "mubix" ,
"id" : 679319 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/679319?v=4" ,
"html_url" : "https:\/\/github.com\/mubix"
} ,
"html_url" : "https:\/\/github.com\/mubix\/CVE-2021-44228-Log4Shell-Hashes" ,
"description" : "Hashes for vulnerable LOG4J versions" ,
"fork" : false ,
"created_at" : "2021-12-10T18:06:06Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:31:47Z" ,
2021-12-11 15:15:36 +09:00
"pushed_at" : "2021-12-11T04:36:38Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 90 ,
"watchers_count" : 90 ,
2021-12-14 09:13:41 +09:00
"forks_count" : 17 ,
2021-12-11 09:13:08 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 17 ,
2021-12-14 15:13:39 +09:00
"watchers" : 90 ,
2021-12-11 09:13:08 +09:00
"score" : 0
} ,
{
"id" : 437091396 ,
"name" : "mc-log4j-patcher" ,
"full_name" : "OopsieWoopsie\/mc-log4j-patcher" ,
"owner" : {
"login" : "OopsieWoopsie" ,
"id" : 15069175 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15069175?v=4" ,
"html_url" : "https:\/\/github.com\/OopsieWoopsie"
} ,
"html_url" : "https:\/\/github.com\/OopsieWoopsie\/mc-log4j-patcher" ,
"description" : "CVE-2021-44228 server-side fix for minecraft servers." ,
"fork" : false ,
"created_at" : "2021-12-10T19:25:31Z" ,
2021-12-12 03:13:20 +09:00
"updated_at" : "2021-12-11T16:51:56Z" ,
2021-12-11 09:13:08 +09:00
"pushed_at" : "2021-12-10T19:47:45Z" ,
2021-12-11 21:14:45 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-11 09:13:08 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"fix" ,
"log4j2" ,
"minecraft" ,
"paper" ,
"spigot"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-11 21:14:45 +09:00
"watchers" : 1 ,
2021-12-11 09:13:08 +09:00
"score" : 0
} ,
{
"id" : 437097787 ,
"name" : "CVE-2021-44228-kusto" ,
"full_name" : "wheez-y\/CVE-2021-44228-kusto" ,
"owner" : {
"login" : "wheez-y" ,
"id" : 77060088 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/77060088?v=4" ,
"html_url" : "https:\/\/github.com\/wheez-y"
} ,
"html_url" : "https:\/\/github.com\/wheez-y\/CVE-2021-44228-kusto" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-10T19:53:32Z" ,
"updated_at" : "2021-12-10T19:55:16Z" ,
"pushed_at" : "2021-12-10T19:55:14Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-12-11 03:13:57 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-11 09:13:08 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437108119 ,
"name" : "log4shell-mitigation" ,
"full_name" : "izzyacademy\/log4shell-mitigation" ,
"owner" : {
"login" : "izzyacademy" ,
"id" : 44282278 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44282278?v=4" ,
"html_url" : "https:\/\/github.com\/izzyacademy"
} ,
"html_url" : "https:\/\/github.com\/izzyacademy\/log4shell-mitigation" ,
"description" : "Mitigation for Log4Shell Security Vulnerability CVE-2021-44228 " ,
"fork" : false ,
"created_at" : "2021-12-10T20:39:56Z" ,
2021-12-12 03:13:20 +09:00
"updated_at" : "2021-12-11T16:21:03Z" ,
"pushed_at" : "2021-12-11T16:21:01Z" ,
2021-12-11 09:13:08 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437115624 ,
"name" : "CVE-2021-44228-poc" ,
"full_name" : "StandB\/CVE-2021-44228-poc" ,
"owner" : {
"login" : "StandB" ,
"id" : 17493969 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17493969?v=4" ,
"html_url" : "https:\/\/github.com\/StandB"
} ,
"html_url" : "https:\/\/github.com\/StandB\/CVE-2021-44228-poc" ,
"description" : "log4shell sample application (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-10T21:13:46Z" ,
2021-12-13 15:13:24 +09:00
"updated_at" : "2021-12-13T03:41:16Z" ,
2021-12-11 09:13:08 +09:00
"pushed_at" : "2021-12-10T21:15:23Z" ,
2021-12-13 15:13:24 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-12-14 09:13:41 +09:00
"forks_count" : 3 ,
2021-12-11 09:13:08 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 3 ,
2021-12-13 15:13:24 +09:00
"watchers" : 2 ,
2021-12-11 09:13:08 +09:00
"score" : 0
} ,
{
"id" : 437121151 ,
"name" : "CVE-2021-44228" ,
"full_name" : "seamus-dev\/CVE-2021-44228" ,
"owner" : {
"login" : "seamus-dev" ,
"id" : 77751614 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/77751614?v=4" ,
"html_url" : "https:\/\/github.com\/seamus-dev"
} ,
"html_url" : "https:\/\/github.com\/seamus-dev\/CVE-2021-44228" ,
"description" : "list of ips pulled from greynoise for this" ,
"fork" : false ,
"created_at" : "2021-12-10T21:41:12Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:39:05Z" ,
"pushed_at" : "2021-12-13T22:39:02Z" ,
2021-12-11 09:13:08 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437122153 ,
"name" : "log4j-detect" ,
"full_name" : "takito1812\/log4j-detect" ,
"owner" : {
"login" : "takito1812" ,
"id" : 56491288 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56491288?v=4" ,
"html_url" : "https:\/\/github.com\/takito1812"
} ,
"html_url" : "https:\/\/github.com\/takito1812\/log4j-detect" ,
2021-12-14 09:13:41 +09:00
"description" : "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading" ,
2021-12-11 09:13:08 +09:00
"fork" : false ,
"created_at" : "2021-12-10T21:46:18Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:31:01Z" ,
2021-12-14 09:13:41 +09:00
"pushed_at" : "2021-12-13T22:27:25Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 86 ,
"watchers_count" : 86 ,
"forks_count" : 34 ,
2021-12-11 09:13:08 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 34 ,
"watchers" : 86 ,
2021-12-11 15:15:36 +09:00
"score" : 0
} ,
{
"id" : 437124793 ,
2021-12-13 15:13:24 +09:00
"name" : "log4noshell" ,
"full_name" : "alerithe\/log4noshell" ,
2021-12-11 15:15:36 +09:00
"owner" : {
"login" : "alerithe" ,
"id" : 31022473 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4" ,
"html_url" : "https:\/\/github.com\/alerithe"
} ,
2021-12-13 15:13:24 +09:00
"html_url" : "https:\/\/github.com\/alerithe\/log4noshell" ,
"description" : "Java agent that disables Apache Log4J's JNDI Lookup. Fixes CVE-2021-44228, aka \"Log4Shell.\"" ,
2021-12-11 15:15:36 +09:00
"fork" : false ,
"created_at" : "2021-12-10T21:59:31Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:59:48Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T14:54:33Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
2021-12-11 15:15:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"apache" ,
"cve" ,
"log4j" ,
"patch" ,
"security" ,
"vulnerability"
] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 1 ,
"watchers" : 2 ,
2021-12-11 09:13:08 +09:00
"score" : 0
} ,
{
"id" : 437128632 ,
"name" : "CVE-2021-44228-DFIR-Notes" ,
"full_name" : "Azeemering\/CVE-2021-44228-DFIR-Notes" ,
"owner" : {
"login" : "Azeemering" ,
"id" : 31852867 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31852867?v=4" ,
"html_url" : "https:\/\/github.com\/Azeemering"
} ,
"html_url" : "https:\/\/github.com\/Azeemering\/CVE-2021-44228-DFIR-Notes" ,
"description" : "CVE-2021-44228 DFIR Notes" ,
"fork" : false ,
"created_at" : "2021-12-10T22:19:16Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T13:46:36Z" ,
"pushed_at" : "2021-12-13T13:46:33Z" ,
2021-12-13 09:13:18 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2021-12-12 15:13:51 +09:00
"forks_count" : 2 ,
2021-12-11 09:13:08 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 2 ,
2021-12-13 09:13:18 +09:00
"watchers" : 6 ,
2021-12-11 09:13:08 +09:00
"score" : 0
} ,
{
"id" : 437131550 ,
"name" : "CVE-2021-44228-PoC-log4j-bypass-words" ,
"full_name" : "Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words" ,
"owner" : {
"login" : "Puliczek" ,
"id" : 12344862 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12344862?v=4" ,
"html_url" : "https:\/\/github.com\/Puliczek"
} ,
"html_url" : "https:\/\/github.com\/Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words" ,
"description" : "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches" ,
"fork" : false ,
"created_at" : "2021-12-10T22:35:00Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:51:03Z" ,
2021-12-13 09:13:18 +09:00
"pushed_at" : "2021-12-12T18:22:56Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 298 ,
"watchers_count" : 298 ,
"forks_count" : 50 ,
2021-12-11 09:13:08 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"bugbounttips" ,
"bugbounty" ,
"bugbounty-writeups" ,
"cve" ,
"cve-2021-44228" ,
"cybersecurity" ,
"exploit" ,
"hacking" ,
"log4j" ,
"payload" ,
"pentest" ,
"pentesting" ,
"red-team" ,
"security" ,
"security-writeups" ,
"writeups"
] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 50 ,
"watchers" : 298 ,
2021-12-11 15:15:36 +09:00
"score" : 0
} ,
{
"id" : 437139341 ,
"name" : "log4j-shell-poc" ,
"full_name" : "kozmer\/log4j-shell-poc" ,
"owner" : {
"login" : "kozmer" ,
"id" : 87979263 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4" ,
"html_url" : "https:\/\/github.com\/kozmer"
} ,
"html_url" : "https:\/\/github.com\/kozmer\/log4j-shell-poc" ,
"description" : "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. " ,
"fork" : false ,
"created_at" : "2021-12-10T23:19:28Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T04:33:51Z" ,
"pushed_at" : "2021-12-14T01:08:45Z" ,
"stargazers_count" : 30 ,
"watchers_count" : 30 ,
"forks_count" : 18 ,
2021-12-11 15:15:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"java" ,
"log4j" ,
"security"
] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 18 ,
"watchers" : 30 ,
2021-12-11 09:13:08 +09:00
"score" : 0
} ,
{
"id" : 437141854 ,
"name" : "cve-2021-44228-workaround-buildpack" ,
"full_name" : "alexandreroman\/cve-2021-44228-workaround-buildpack" ,
"owner" : {
"login" : "alexandreroman" ,
"id" : 665131 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/665131?v=4" ,
"html_url" : "https:\/\/github.com\/alexandreroman"
} ,
"html_url" : "https:\/\/github.com\/alexandreroman\/cve-2021-44228-workaround-buildpack" ,
"description" : "Buildpack providing a workaround for CVE-2021-44228 (Log4j RCE exploit)" ,
"fork" : false ,
"created_at" : "2021-12-10T23:34:52Z" ,
2021-12-12 15:13:51 +09:00
"updated_at" : "2021-12-12T02:02:27Z" ,
2021-12-11 09:13:08 +09:00
"pushed_at" : "2021-12-10T23:47:14Z" ,
2021-12-12 15:13:51 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-11 09:13:08 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-12 15:13:51 +09:00
"watchers" : 1 ,
2021-12-11 09:13:08 +09:00
"score" : 0
} ,
{
"id" : 437141974 ,
"name" : "minecraft-log4j-honeypot" ,
"full_name" : "Adikso\/minecraft-log4j-honeypot" ,
"owner" : {
"login" : "Adikso" ,
"id" : 1407751 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1407751?v=4" ,
"html_url" : "https:\/\/github.com\/Adikso"
} ,
"html_url" : "https:\/\/github.com\/Adikso\/minecraft-log4j-honeypot" ,
"description" : "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam" ,
"fork" : false ,
"created_at" : "2021-12-10T23:35:31Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T02:51:23Z" ,
2021-12-14 09:13:41 +09:00
"pushed_at" : "2021-12-13T22:04:04Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 35 ,
"watchers_count" : 35 ,
"forks_count" : 10 ,
2021-12-11 09:13:08 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve" ,
"exploit" ,
"log4j" ,
"minecraft"
] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 10 ,
"watchers" : 35 ,
2021-12-11 15:15:36 +09:00
"score" : 0
} ,
{
"id" : 437142312 ,
"name" : "CVE-2021-44228" ,
"full_name" : "racoon-rac\/CVE-2021-44228" ,
"owner" : {
"login" : "racoon-rac" ,
"id" : 64579294 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4" ,
"html_url" : "https:\/\/github.com\/racoon-rac"
} ,
"html_url" : "https:\/\/github.com\/racoon-rac\/CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-10T23:37:55Z" ,
"updated_at" : "2021-12-11T01:11:19Z" ,
"pushed_at" : "2021-12-11T01:07:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437155858 ,
"name" : "log4shelldetect" ,
"full_name" : "1lann\/log4shelldetect" ,
"owner" : {
"login" : "1lann" ,
"id" : 804919 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/804919?v=4" ,
"html_url" : "https:\/\/github.com\/1lann"
} ,
"html_url" : "https:\/\/github.com\/1lann\/log4shelldetect" ,
2021-12-14 03:13:40 +09:00
"description" : "Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or \"that Log4j JNDI exploit\" by inspecting the class paths inside the file" ,
2021-12-11 15:15:36 +09:00
"fork" : false ,
"created_at" : "2021-12-11T01:08:00Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T19:32:36Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T17:40:20Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 22 ,
"watchers_count" : 22 ,
"forks_count" : 4 ,
2021-12-11 15:15:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
2021-12-13 15:13:24 +09:00
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell" ,
"scanner" ,
"vulnerability-scanners"
] ,
2021-12-11 15:15:36 +09:00
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 4 ,
"watchers" : 22 ,
2021-12-11 15:15:36 +09:00
"score" : 0
} ,
{
"id" : 437164940 ,
"name" : "Log4j2-RCE" ,
"full_name" : "binganao\/Log4j2-RCE" ,
"owner" : {
"login" : "binganao" ,
"id" : 70050083 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4" ,
"html_url" : "https:\/\/github.com\/binganao"
} ,
"html_url" : "https:\/\/github.com\/binganao\/Log4j2-RCE" ,
"description" : "Log4j2 CVE-2021-44228 复现和回显利用" ,
"fork" : false ,
"created_at" : "2021-12-11T02:08:41Z" ,
"updated_at" : "2021-12-11T03:38:05Z" ,
"pushed_at" : "2021-12-11T03:38:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437170557 ,
"name" : "sample-ldap-exploit" ,
"full_name" : "phoswald\/sample-ldap-exploit" ,
"owner" : {
"login" : "phoswald" ,
"id" : 12776329 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4" ,
"html_url" : "https:\/\/github.com\/phoswald"
} ,
"html_url" : "https:\/\/github.com\/phoswald\/sample-ldap-exploit" ,
"description" : "A short demo of CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T02:45:39Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T14:32:36Z" ,
2021-12-13 21:13:34 +09:00
"pushed_at" : "2021-12-13T09:20:35Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2021-12-13 03:14:09 +09:00
"forks_count" : 2 ,
2021-12-11 15:15:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-13 03:14:09 +09:00
"forks" : 2 ,
2021-12-14 03:13:40 +09:00
"watchers" : 6 ,
2021-12-11 15:15:36 +09:00
"score" : 0
} ,
{
"id" : 437174339 ,
"name" : "jndi-ldap-test-server" ,
"full_name" : "rakutentech\/jndi-ldap-test-server" ,
"owner" : {
"login" : "rakutentech" ,
"id" : 1415441 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1415441?v=4" ,
"html_url" : "https:\/\/github.com\/rakutentech"
} ,
"html_url" : "https:\/\/github.com\/rakutentech\/jndi-ldap-test-server" ,
"description" : "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228." ,
"fork" : false ,
"created_at" : "2021-12-11T03:08:14Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:02:21Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T16:17:03Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2021-12-11 15:15:36 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"jndi" ,
"ldap" ,
"log4j" ,
"log4j2" ,
"vulnerability-detection"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 15:13:39 +09:00
"watchers" : 6 ,
2021-12-11 15:15:36 +09:00
"score" : 0
} ,
2021-12-12 21:13:07 +09:00
{
"id" : 437186290 ,
"name" : "cve-2021-44228--spring-hibernate" ,
"full_name" : "uint0\/cve-2021-44228--spring-hibernate" ,
"owner" : {
"login" : "uint0" ,
"id" : 11325389 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4" ,
"html_url" : "https:\/\/github.com\/uint0"
} ,
"html_url" : "https:\/\/github.com\/uint0\/cve-2021-44228--spring-hibernate" ,
"description" : "CVE-2021-44228 POC - Spring \/ Hibernate" ,
"fork" : false ,
"created_at" : "2021-12-11T04:23:22Z" ,
"updated_at" : "2021-12-12T09:41:19Z" ,
"pushed_at" : "2021-12-11T06:25:12Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-12-11 15:15:36 +09:00
{
"id" : 437188129 ,
"name" : "log4j_CVE-2021-44228_tester" ,
"full_name" : "ssstonebraker\/log4j_CVE-2021-44228_tester" ,
"owner" : {
"login" : "ssstonebraker" ,
"id" : 774940 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/774940?v=4" ,
"html_url" : "https:\/\/github.com\/ssstonebraker"
} ,
"html_url" : "https:\/\/github.com\/ssstonebraker\/log4j_CVE-2021-44228_tester" ,
"description" : "Test for log4j vulnerability across your external footprint" ,
"fork" : false ,
"created_at" : "2021-12-11T04:34:51Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:41:05Z" ,
"pushed_at" : "2021-12-13T22:41:02Z" ,
2021-12-13 15:13:24 +09:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2021-12-12 15:13:51 +09:00
"forks_count" : 2 ,
2021-12-11 21:14:45 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 2 ,
2021-12-13 15:13:24 +09:00
"watchers" : 8 ,
2021-12-11 21:14:45 +09:00
"score" : 0
} ,
{
"id" : 437214791 ,
"name" : "log4j-vulnerability-patcher-agent" ,
"full_name" : "saharNooby\/log4j-vulnerability-patcher-agent" ,
"owner" : {
"login" : "saharNooby" ,
"id" : 10616794 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10616794?v=4" ,
"html_url" : "https:\/\/github.com\/saharNooby"
} ,
"html_url" : "https:\/\/github.com\/saharNooby\/log4j-vulnerability-patcher-agent" ,
"description" : "Fixes CVE-2021-44228 in log4j by patching JndiLookup class" ,
"fork" : false ,
"created_at" : "2021-12-11T07:16:21Z" ,
"updated_at" : "2021-12-11T11:09:42Z" ,
"pushed_at" : "2021-12-11T07:34:01Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-12-13 21:13:34 +09:00
"forks_count" : 1 ,
2021-12-11 21:14:45 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"agent" ,
"bytecode" ,
"cve" ,
"fix" ,
"log4j" ,
"patch"
] ,
"visibility" : "public" ,
2021-12-13 21:13:34 +09:00
"forks" : 1 ,
2021-12-11 21:14:45 +09:00
"watchers" : 2 ,
"score" : 0
} ,
{
"id" : 437215271 ,
"name" : "log4j2burpscanner" ,
"full_name" : "f0ng\/log4j2burpscanner" ,
"owner" : {
"login" : "f0ng" ,
"id" : 48286013 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4" ,
"html_url" : "https:\/\/github.com\/f0ng"
} ,
"html_url" : "https:\/\/github.com\/f0ng\/log4j2burpscanner" ,
2021-12-14 15:13:39 +09:00
"description" : "CVE-2021-44228, log4j2 burp插件 Java版本, 可自定义ceye.io, 也可以自定义内网的dnslog平台及请求接口定位内网漏洞机器(log4j2 RCE Burp Suite Passive Scanner, can customize the ceye.io api or other apis, including internal networks)" ,
2021-12-11 21:14:45 +09:00
"fork" : false ,
"created_at" : "2021-12-11T07:19:11Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T06:08:01Z" ,
"pushed_at" : "2021-12-14T06:07:58Z" ,
"stargazers_count" : 128 ,
"watchers_count" : 128 ,
"forks_count" : 21 ,
2021-12-11 21:14:45 +09:00
"allow_forking" : true ,
"is_template" : false ,
2021-12-14 15:13:39 +09:00
"topics" : [
"burp-extensions" ,
"burp-plugin" ,
"log4j2"
] ,
2021-12-11 21:14:45 +09:00
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 21 ,
"watchers" : 128 ,
2021-12-11 21:14:45 +09:00
"score" : 0
} ,
{
"id" : 437221795 ,
"name" : "CVE-2021-44228-Log4j-lookup-Rce" ,
"full_name" : "M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce" ,
"owner" : {
"login" : "M1ngGod" ,
"id" : 81064151 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/81064151?v=4" ,
"html_url" : "https:\/\/github.com\/M1ngGod"
} ,
"html_url" : "https:\/\/github.com\/M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-11T07:55:45Z" ,
2021-12-12 21:13:07 +09:00
"updated_at" : "2021-12-12T09:17:27Z" ,
2021-12-11 21:14:45 +09:00
"pushed_at" : "2021-12-11T08:07:20Z" ,
2021-12-12 21:13:07 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-12-11 21:14:45 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-12 21:13:07 +09:00
"watchers" : 2 ,
2021-12-11 21:14:45 +09:00
"score" : 0
} ,
{
"id" : 437244092 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce" ,
"full_name" : "byteboycn\/CVE-2021-44228-Apache-Log4j-Rce" ,
"owner" : {
"login" : "byteboycn" ,
"id" : 14987996 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14987996?v=4" ,
"html_url" : "https:\/\/github.com\/byteboycn"
} ,
"html_url" : "https:\/\/github.com\/byteboycn\/CVE-2021-44228-Apache-Log4j-Rce" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-11T09:52:36Z" ,
2021-12-13 21:13:34 +09:00
"updated_at" : "2021-12-13T07:32:26Z" ,
2021-12-11 21:14:45 +09:00
"pushed_at" : "2021-12-11T09:53:39Z" ,
2021-12-13 21:13:34 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
2021-12-11 21:14:45 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-13 21:13:34 +09:00
"forks" : 1 ,
"watchers" : 2 ,
2021-12-11 21:14:45 +09:00
"score" : 0
} ,
{
"id" : 437248883 ,
"name" : "log4shell-mitigation-tester" ,
"full_name" : "lhotari\/log4shell-mitigation-tester" ,
"owner" : {
"login" : "lhotari" ,
"id" : 66864 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4" ,
"html_url" : "https:\/\/github.com\/lhotari"
} ,
"html_url" : "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester" ,
"description" : "Log4Shell CVE-2021-44228 mitigation tester" ,
"fork" : false ,
"created_at" : "2021-12-11T10:16:58Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:36:46Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T17:24:37Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2021-12-11 21:14:45 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 15:13:39 +09:00
"watchers" : 11 ,
2021-12-11 21:14:45 +09:00
"score" : 0
} ,
{
"id" : 437249303 ,
"name" : "log4j-rce-detect-waf-bypass" ,
"full_name" : "toramanemre\/log4j-rce-detect-waf-bypass" ,
"owner" : {
"login" : "toramanemre" ,
"id" : 24626967 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4" ,
"html_url" : "https:\/\/github.com\/toramanemre"
} ,
"html_url" : "https:\/\/github.com\/toramanemre\/log4j-rce-detect-waf-bypass" ,
"description" : "A Nuclei Template for Apache Log4j RCE (CVE-2021-44228) Detection with WAF Bypass Payloads" ,
"fork" : false ,
"created_at" : "2021-12-11T10:19:01Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T17:04:51Z" ,
2021-12-11 21:14:45 +09:00
"pushed_at" : "2021-12-11T10:19:51Z" ,
2021-12-13 09:13:18 +09:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
2021-12-12 15:13:51 +09:00
"forks_count" : 2 ,
2021-12-11 21:14:45 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 2 ,
2021-12-13 09:13:18 +09:00
"watchers" : 9 ,
2021-12-11 21:14:45 +09:00
"score" : 0
} ,
{
"id" : 437261211 ,
"name" : "CVE-2021-44228-Scanner" ,
"full_name" : "logpresso\/CVE-2021-44228-Scanner" ,
"owner" : {
"login" : "logpresso" ,
"id" : 14171714 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14171714?v=4" ,
"html_url" : "https:\/\/github.com\/logpresso"
} ,
"html_url" : "https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner" ,
2021-12-12 15:13:51 +09:00
"description" : "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228" ,
2021-12-11 21:14:45 +09:00
"fork" : false ,
"created_at" : "2021-12-11T11:18:46Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:54:36Z" ,
"pushed_at" : "2021-12-14T05:38:08Z" ,
"stargazers_count" : 162 ,
"watchers_count" : 162 ,
"forks_count" : 39 ,
2021-12-11 21:14:45 +09:00
"allow_forking" : true ,
"is_template" : false ,
2021-12-12 21:13:07 +09:00
"topics" : [
"cve-2021-44228" ,
"log4j2" ,
"patch" ,
"scanner"
] ,
2021-12-11 21:14:45 +09:00
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 39 ,
"watchers" : 162 ,
2021-12-11 21:14:45 +09:00
"score" : 0
} ,
{
"id" : 437265194 ,
"name" : "Log4j_CVE-2021-44228" ,
"full_name" : "vorburger\/Log4j_CVE-2021-44228" ,
"owner" : {
"login" : "vorburger" ,
"id" : 298598 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/298598?v=4" ,
"html_url" : "https:\/\/github.com\/vorburger"
} ,
"html_url" : "https:\/\/github.com\/vorburger\/Log4j_CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-11T11:38:16Z" ,
2021-12-12 03:13:20 +09:00
"updated_at" : "2021-12-11T17:02:11Z" ,
"pushed_at" : "2021-12-11T17:02:09Z" ,
2021-12-11 21:14:45 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437265792 ,
"name" : "log4j2021_vul_test" ,
"full_name" : "gauthamg\/log4j2021_vul_test" ,
"owner" : {
"login" : "gauthamg" ,
"id" : 8748677 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4" ,
"html_url" : "https:\/\/github.com\/gauthamg"
} ,
"html_url" : "https:\/\/github.com\/gauthamg\/log4j2021_vul_test" ,
"description" : "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T11:41:04Z" ,
2021-12-13 21:13:34 +09:00
"updated_at" : "2021-12-13T06:49:35Z" ,
"pushed_at" : "2021-12-13T06:49:32Z" ,
2021-12-12 03:13:20 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437275323 ,
"name" : "jndiRep" ,
"full_name" : "js-on\/jndiRep" ,
"owner" : {
"login" : "js-on" ,
"id" : 55274241 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55274241?v=4" ,
"html_url" : "https:\/\/github.com\/js-on"
} ,
"html_url" : "https:\/\/github.com\/js-on\/jndiRep" ,
"description" : "Scan your logs for CVE-2021-44228 related activity and report the attackers" ,
"fork" : false ,
"created_at" : "2021-12-11T12:25:08Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:59:07Z" ,
2021-12-12 09:13:11 +09:00
"pushed_at" : "2021-12-11T23:45:33Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
2021-12-12 03:13:20 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 1 ,
"watchers" : 2 ,
2021-12-12 03:13:20 +09:00
"score" : 0
} ,
{
"id" : 437278973 ,
"name" : "CVE-2021-44228-Advisories" ,
"full_name" : "leetxyz\/CVE-2021-44228-Advisories" ,
"owner" : {
"login" : "leetxyz" ,
"id" : 46599191 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46599191?v=4" ,
"html_url" : "https:\/\/github.com\/leetxyz"
} ,
"html_url" : "https:\/\/github.com\/leetxyz\/CVE-2021-44228-Advisories" ,
"description" : "List of company advisories log4j" ,
"fork" : false ,
"created_at" : "2021-12-11T12:41:38Z" ,
2021-12-12 21:13:07 +09:00
"updated_at" : "2021-12-12T09:46:19Z" ,
"pushed_at" : "2021-12-12T09:46:17Z" ,
2021-12-12 15:13:51 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2021-12-12 03:13:20 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 1 ,
"watchers" : 1 ,
2021-12-12 03:13:20 +09:00
"score" : 0
} ,
{
"id" : 437283982 ,
"name" : "log4shell" ,
"full_name" : "cado-security\/log4shell" ,
"owner" : {
"login" : "cado-security" ,
"id" : 63289041 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63289041?v=4" ,
"html_url" : "https:\/\/github.com\/cado-security"
} ,
"html_url" : "https:\/\/github.com\/cado-security\/log4shell" ,
"description" : "Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T13:03:31Z" ,
"updated_at" : "2021-12-11T14:52:33Z" ,
"pushed_at" : "2021-12-11T14:52:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437289885 ,
"name" : "Log4J_0day_RCE" ,
"full_name" : "PwnC00re\/Log4J_0day_RCE" ,
"owner" : {
"login" : "PwnC00re" ,
"id" : 95032387 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/95032387?v=4" ,
"html_url" : "https:\/\/github.com\/PwnC00re"
} ,
"html_url" : "https:\/\/github.com\/PwnC00re\/Log4J_0day_RCE" ,
"description" : "Log4j-RCE (CVE-2021-44228) Proof of Concept" ,
"fork" : false ,
"created_at" : "2021-12-11T13:28:52Z" ,
2021-12-12 15:13:51 +09:00
"updated_at" : "2021-12-12T03:48:01Z" ,
2021-12-12 03:13:20 +09:00
"pushed_at" : "2021-12-11T13:31:47Z" ,
2021-12-12 15:13:51 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
2021-12-12 03:13:20 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 1 ,
"watchers" : 2 ,
2021-12-12 03:13:20 +09:00
"score" : 0
} ,
{
"id" : 437296454 ,
"name" : "log4j-vulnerable-app-cve-2021-44228-terraform" ,
"full_name" : "Mormoroth\/log4j-vulnerable-app-cve-2021-44228-terraform" ,
"owner" : {
"login" : "Mormoroth" ,
"id" : 23025217 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23025217?v=4" ,
"html_url" : "https:\/\/github.com\/Mormoroth"
} ,
"html_url" : "https:\/\/github.com\/Mormoroth\/log4j-vulnerable-app-cve-2021-44228-terraform" ,
"description" : "A Terraform to deploy vulnerable app and a JDNIExploit to work with CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T13:56:28Z" ,
"updated_at" : "2021-12-11T16:44:51Z" ,
"pushed_at" : "2021-12-11T14:53:38Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 437305706 ,
"name" : "javalogslulz" ,
"full_name" : "trevalkov\/javalogslulz" ,
"owner" : {
"login" : "trevalkov" ,
"id" : 52704508 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52704508?v=4" ,
"html_url" : "https:\/\/github.com\/trevalkov"
} ,
"html_url" : "https:\/\/github.com\/trevalkov\/javalogslulz" ,
"description" : "proof of concept for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T14:34:43Z" ,
"updated_at" : "2021-12-11T16:53:22Z" ,
"pushed_at" : "2021-12-11T16:53:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437310436 ,
"name" : "log4j-CVE-2021-44228-Public-IoCs" ,
"full_name" : "Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs" ,
"owner" : {
"login" : "Sh0ckFR" ,
"id" : 10033649 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10033649?v=4" ,
"html_url" : "https:\/\/github.com\/Sh0ckFR"
} ,
"html_url" : "https:\/\/github.com\/Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs" ,
"description" : "Public IoCs about log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T14:54:45Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T12:53:06Z" ,
2021-12-13 03:14:09 +09:00
"pushed_at" : "2021-12-12T15:08:33Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2021-12-12 15:13:51 +09:00
"forks_count" : 1 ,
2021-12-11 15:15:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 1 ,
2021-12-14 03:13:40 +09:00
"watchers" : 8 ,
2021-12-10 15:14:52 +09:00
"score" : 0
2021-12-12 03:13:20 +09:00
} ,
{
"id" : 437316134 ,
"name" : "log4j2-vulnerable-spring-app" ,
"full_name" : "zzzz0317\/log4j2-vulnerable-spring-app" ,
"owner" : {
"login" : "zzzz0317" ,
"id" : 16097046 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4" ,
"html_url" : "https:\/\/github.com\/zzzz0317"
} ,
"html_url" : "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T15:18:42Z" ,
2021-12-13 15:13:24 +09:00
"updated_at" : "2021-12-13T02:14:17Z" ,
"pushed_at" : "2021-12-13T02:14:14Z" ,
2021-12-12 03:13:20 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
"score" : 0
} ,
{
"id" : 437319619 ,
"name" : "test-44228" ,
"full_name" : "datadavev\/test-44228" ,
"owner" : {
"login" : "datadavev" ,
"id" : 605409 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/605409?v=4" ,
"html_url" : "https:\/\/github.com\/datadavev"
} ,
"html_url" : "https:\/\/github.com\/datadavev\/test-44228" ,
"description" : "Simple demo of CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T15:33:17Z" ,
"updated_at" : "2021-12-11T15:42:35Z" ,
"pushed_at" : "2021-12-11T15:42:33Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-12-12 15:13:51 +09:00
{
"id" : 437327955 ,
"name" : "Log4j-Rec-CVE-2021-44228" ,
"full_name" : "zhangxvx\/Log4j-Rec-CVE-2021-44228" ,
"owner" : {
"login" : "zhangxvx" ,
"id" : 19684449 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/19684449?v=4" ,
"html_url" : "https:\/\/github.com\/zhangxvx"
} ,
"html_url" : "https:\/\/github.com\/zhangxvx\/Log4j-Rec-CVE-2021-44228" ,
"description" : "Apache Log4j CVE-2021-44228 漏洞复现" ,
"fork" : false ,
"created_at" : "2021-12-11T16:08:34Z" ,
"updated_at" : "2021-12-12T03:50:45Z" ,
"pushed_at" : "2021-12-12T03:49:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-12-12 03:13:20 +09:00
{
"id" : 437327995 ,
"name" : "CVE-2021-44228" ,
"full_name" : "darkarnium\/CVE-2021-44228" ,
"owner" : {
"login" : "darkarnium" ,
"id" : 3048394 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3048394?v=4" ,
"html_url" : "https:\/\/github.com\/darkarnium"
} ,
"html_url" : "https:\/\/github.com\/darkarnium\/CVE-2021-44228" ,
"description" : "Detections for CVE-2021-44228 inside of nested binaries" ,
"fork" : false ,
"created_at" : "2021-12-11T16:08:47Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T02:30:50Z" ,
2021-12-14 09:13:41 +09:00
"pushed_at" : "2021-12-13T20:07:35Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2021-12-12 15:13:51 +09:00
"forks_count" : 1 ,
2021-12-12 03:13:20 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"binary" ,
"cve-2021-44228" ,
"detection" ,
"devops" ,
"python" ,
"sca" ,
"security"
] ,
"visibility" : "public" ,
2021-12-12 15:13:51 +09:00
"forks" : 1 ,
2021-12-14 15:13:39 +09:00
"watchers" : 8 ,
2021-12-12 09:13:11 +09:00
"score" : 0
} ,
{
"id" : 437381453 ,
"name" : "CVE-2021-44228_Example" ,
"full_name" : "chilliwebs\/CVE-2021-44228_Example" ,
"owner" : {
"login" : "chilliwebs" ,
"id" : 6079309 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6079309?v=4" ,
"html_url" : "https:\/\/github.com\/chilliwebs"
} ,
"html_url" : "https:\/\/github.com\/chilliwebs\/CVE-2021-44228_Example" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-11T20:25:08Z" ,
"updated_at" : "2021-12-11T20:28:25Z" ,
"pushed_at" : "2021-12-11T20:28:23Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437397347 ,
"name" : "f5-waf-enforce-sig-CVE-2021-44228" ,
"full_name" : "irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228" ,
"owner" : {
"login" : "irgoncalves" ,
"id" : 23459099 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4" ,
"html_url" : "https:\/\/github.com\/irgoncalves"
} ,
"html_url" : "https:\/\/github.com\/irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228" ,
"description" : "This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device" ,
"fork" : false ,
"created_at" : "2021-12-11T21:59:19Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T17:53:22Z" ,
"pushed_at" : "2021-12-13T17:53:19Z" ,
2021-12-13 21:13:34 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-12-14 15:13:39 +09:00
"forks_count" : 1 ,
2021-12-12 09:13:11 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 1 ,
2021-12-13 21:13:34 +09:00
"watchers" : 3 ,
2021-12-12 09:13:11 +09:00
"score" : 0
} ,
{
"id" : 437407625 ,
"name" : "log4j-docker-vaccine" ,
"full_name" : "jeffbryner\/log4j-docker-vaccine" ,
"owner" : {
"login" : "jeffbryner" ,
"id" : 566889 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/566889?v=4" ,
"html_url" : "https:\/\/github.com\/jeffbryner"
} ,
"html_url" : "https:\/\/github.com\/jeffbryner\/log4j-docker-vaccine" ,
"description" : "docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T23:06:23Z" ,
2021-12-13 03:14:09 +09:00
"updated_at" : "2021-12-12T12:28:06Z" ,
2021-12-12 15:13:51 +09:00
"pushed_at" : "2021-12-12T00:15:23Z" ,
2021-12-13 03:14:09 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-12 15:13:51 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-13 03:14:09 +09:00
"watchers" : 1 ,
2021-12-12 15:13:51 +09:00
"score" : 0
} ,
2021-12-12 21:13:07 +09:00
{
"id" : 437426248 ,
"name" : "log4j2-rce-poc" ,
"full_name" : "unlimitedsola\/log4j2-rce-poc" ,
"owner" : {
"login" : "unlimitedsola" ,
"id" : 3632663 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3632663?v=4" ,
"html_url" : "https:\/\/github.com\/unlimitedsola"
} ,
"html_url" : "https:\/\/github.com\/unlimitedsola\/log4j2-rce-poc" ,
"description" : "A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228\/Log4Shell)." ,
"fork" : false ,
"created_at" : "2021-12-12T01:23:45Z" ,
2021-12-13 15:13:24 +09:00
"updated_at" : "2021-12-13T04:06:08Z" ,
2021-12-12 21:13:07 +09:00
"pushed_at" : "2021-12-12T09:59:26Z" ,
2021-12-13 15:13:24 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-12-12 21:13:07 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j2" ,
"log4shell" ,
"poc" ,
"proof-of-concept" ,
"rce" ,
"remote-code-execution"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-13 15:13:24 +09:00
"watchers" : 2 ,
2021-12-12 21:13:07 +09:00
"score" : 0
} ,
2021-12-12 15:13:51 +09:00
{
"id" : 437426386 ,
"name" : "hotpatch-for-apache-log4j2" ,
"full_name" : "corretto\/hotpatch-for-apache-log4j2" ,
"owner" : {
"login" : "corretto" ,
"id" : 44104058 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44104058?v=4" ,
"html_url" : "https:\/\/github.com\/corretto"
} ,
"html_url" : "https:\/\/github.com\/corretto\/hotpatch-for-apache-log4j2" ,
"description" : "An agent to hotpatch the log4j RCE from CVE-2021-44228." ,
"fork" : false ,
"created_at" : "2021-12-12T01:24:51Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:30:48Z" ,
2021-12-14 09:13:41 +09:00
"pushed_at" : "2021-12-13T18:33:28Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 166 ,
"watchers_count" : 166 ,
"forks_count" : 18 ,
2021-12-12 15:13:51 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 18 ,
"watchers" : 166 ,
2021-12-12 15:13:51 +09:00
"score" : 0
} ,
{
"id" : 437438829 ,
"name" : "python-log4rce" ,
"full_name" : "alexandre-lavoie\/python-log4rce" ,
"owner" : {
"login" : "alexandre-lavoie" ,
"id" : 36684879 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36684879?v=4" ,
"html_url" : "https:\/\/github.com\/alexandre-lavoie"
} ,
"html_url" : "https:\/\/github.com\/alexandre-lavoie\/python-log4rce" ,
"description" : "An All-In-One Pure Python PoC for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-12T02:57:49Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T06:10:33Z" ,
2021-12-13 15:13:24 +09:00
"pushed_at" : "2021-12-13T04:29:28Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 87 ,
"watchers_count" : 87 ,
"forks_count" : 19 ,
2021-12-12 15:13:51 +09:00
"allow_forking" : true ,
"is_template" : false ,
2021-12-13 03:14:09 +09:00
"topics" : [
2021-12-13 15:13:24 +09:00
"cli" ,
2021-12-13 03:14:09 +09:00
"cve-2021-44228" ,
"log4j" ,
"python" ,
"rce"
] ,
2021-12-12 15:13:51 +09:00
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 19 ,
"watchers" : 87 ,
2021-12-12 15:13:51 +09:00
"score" : 0
} ,
{
"id" : 437439106 ,
"name" : "Log4Shell_CVE-2021-44228_related_attacks_IOCs" ,
"full_name" : "RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs" ,
"owner" : {
"login" : "RedDrip7" ,
"id" : 51360411 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51360411?v=4" ,
"html_url" : "https:\/\/github.com\/RedDrip7"
} ,
"html_url" : "https:\/\/github.com\/RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T02:59:54Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:29:53Z" ,
"pushed_at" : "2021-12-14T02:54:41Z" ,
"stargazers_count" : 26 ,
"watchers_count" : 26 ,
2021-12-14 03:13:40 +09:00
"forks_count" : 4 ,
2021-12-12 15:13:51 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 03:13:40 +09:00
"forks" : 4 ,
2021-12-14 15:13:39 +09:00
"watchers" : 26 ,
2021-12-12 15:13:51 +09:00
"score" : 0
} ,
{
"id" : 437440782 ,
"name" : "CVE-2021-44228-Demo" ,
"full_name" : "mzlogin\/CVE-2021-44228-Demo" ,
"owner" : {
"login" : "mzlogin" ,
"id" : 1646590 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1646590?v=4" ,
"html_url" : "https:\/\/github.com\/mzlogin"
} ,
"html_url" : "https:\/\/github.com\/mzlogin\/CVE-2021-44228-Demo" ,
"description" : "Apache Log4j2 CVE-2021-44228 RCE" ,
"fork" : false ,
"created_at" : "2021-12-12T03:11:14Z" ,
"updated_at" : "2021-12-12T04:06:24Z" ,
"pushed_at" : "2021-12-12T03:22:59Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"jndi" ,
"ldap" ,
"rmi"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 2 ,
"score" : 0
} ,
{
"id" : 437450552 ,
"name" : "CVE-2021-44228-quickfix-script" ,
"full_name" : "Ghost-chu\/CVE-2021-44228-quickfix-script" ,
"owner" : {
"login" : "Ghost-chu" ,
"id" : 30802565 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/30802565?v=4" ,
"html_url" : "https:\/\/github.com\/Ghost-chu"
} ,
"html_url" : "https:\/\/github.com\/Ghost-chu\/CVE-2021-44228-quickfix-script" ,
"description" : "Use environment variable to disable lookup." ,
"fork" : false ,
"created_at" : "2021-12-12T04:17:08Z" ,
"updated_at" : "2021-12-12T05:19:16Z" ,
"pushed_at" : "2021-12-12T05:19:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437451451 ,
"name" : "vcenter-log4j" ,
"full_name" : "blake-fm\/vcenter-log4j" ,
"owner" : {
"login" : "blake-fm" ,
"id" : 89286531 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89286531?v=4" ,
"html_url" : "https:\/\/github.com\/blake-fm"
} ,
"html_url" : "https:\/\/github.com\/blake-fm\/vcenter-log4j" ,
"description" : "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-12T04:23:10Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:34:35Z" ,
"pushed_at" : "2021-12-13T22:34:32Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
2021-12-13 21:13:34 +09:00
"forks_count" : 3 ,
2021-12-12 21:13:07 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-13 21:13:34 +09:00
"forks" : 3 ,
2021-12-14 03:13:40 +09:00
"watchers" : 7 ,
2021-12-12 21:13:07 +09:00
"score" : 0
} ,
{
"id" : 437479258 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce__review" ,
"full_name" : "creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review" ,
"owner" : {
"login" : "creamIcec" ,
"id" : 42510470 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42510470?v=4" ,
"html_url" : "https:\/\/github.com\/creamIcec"
} ,
"html_url" : "https:\/\/github.com\/creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review" ,
"description" : "log4j2漏洞复现" ,
"fork" : false ,
"created_at" : "2021-12-12T07:20:03Z" ,
"updated_at" : "2021-12-12T07:20:03Z" ,
"pushed_at" : "2021-12-12T07:20:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437482830 ,
"name" : "CVE-2021-44228" ,
"full_name" : "bchaber\/CVE-2021-44228" ,
"owner" : {
"login" : "bchaber" ,
"id" : 45143424 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45143424?v=4" ,
"html_url" : "https:\/\/github.com\/bchaber"
} ,
"html_url" : "https:\/\/github.com\/bchaber\/CVE-2021-44228" ,
"description" : "My take on Log4j2 vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-12T07:39:51Z" ,
"updated_at" : "2021-12-12T07:41:16Z" ,
"pushed_at" : "2021-12-12T07:41:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437501121 ,
"name" : "cve-2021-44228-helpers" ,
"full_name" : "uint0\/cve-2021-44228-helpers" ,
"owner" : {
"login" : "uint0" ,
"id" : 11325389 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4" ,
"html_url" : "https:\/\/github.com\/uint0"
} ,
"html_url" : "https:\/\/github.com\/uint0\/cve-2021-44228-helpers" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T09:21:09Z" ,
2021-12-13 09:13:18 +09:00
"updated_at" : "2021-12-13T00:01:22Z" ,
"pushed_at" : "2021-12-13T00:01:19Z" ,
2021-12-12 21:13:07 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437511755 ,
"name" : "apache-log4j-poc" ,
"full_name" : "RK800-DEV\/apache-log4j-poc" ,
"owner" : {
"login" : "RK800-DEV" ,
"id" : 85429713 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/85429713?v=4" ,
"html_url" : "https:\/\/github.com\/RK800-DEV"
} ,
"html_url" : "https:\/\/github.com\/RK800-DEV\/apache-log4j-poc" ,
"description" : "CVE-2021-44228(Apache Log4j Remote Code Execution) " ,
"fork" : false ,
"created_at" : "2021-12-12T10:17:13Z" ,
"updated_at" : "2021-12-12T10:17:47Z" ,
"pushed_at" : "2021-12-12T10:17:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-12-14 09:13:41 +09:00
"forks_count" : 0 ,
2021-12-12 21:13:07 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 0 ,
2021-12-12 21:13:07 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437512798 ,
2021-12-13 03:14:09 +09:00
"name" : "log4j-CVE-2021-44228" ,
"full_name" : "sud0x00\/log4j-CVE-2021-44228" ,
2021-12-12 21:13:07 +09:00
"owner" : {
"login" : "sud0x00" ,
"id" : 91898207 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/91898207?v=4" ,
"html_url" : "https:\/\/github.com\/sud0x00"
} ,
2021-12-13 03:14:09 +09:00
"html_url" : "https:\/\/github.com\/sud0x00\/log4j-CVE-2021-44228" ,
2021-12-12 21:13:07 +09:00
"description" : "On December 5, 2021, Apache identified a vulnerability (later identified as CVE-2021-44228) in their widely used Log4j logging service. The vulnerability, also known as Log4shell, enables attackers to gain full control of affected servers by allowing unauthenticated remote code execution if the user is running an application utilizing the Java logging library. Log4j is heavily integrated into a broad set of devops frameworks, enterprise IT systems, and vendor software and cloud products." ,
"fork" : false ,
"created_at" : "2021-12-12T10:22:45Z" ,
2021-12-13 21:13:34 +09:00
"updated_at" : "2021-12-13T06:30:01Z" ,
2021-12-13 03:14:09 +09:00
"pushed_at" : "2021-12-12T14:08:08Z" ,
2021-12-13 21:13:34 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-12-12 21:13:07 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-13 21:13:34 +09:00
"watchers" : 2 ,
2021-12-12 21:13:07 +09:00
"score" : 0
} ,
2021-12-13 09:13:18 +09:00
{
"id" : 437518939 ,
"name" : "CVE-2021-44228-docker-example" ,
"full_name" : "DiCanio\/CVE-2021-44228-docker-example" ,
"owner" : {
"login" : "DiCanio" ,
"id" : 6052859 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6052859?v=4" ,
"html_url" : "https:\/\/github.com\/DiCanio"
} ,
"html_url" : "https:\/\/github.com\/DiCanio\/CVE-2021-44228-docker-example" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T10:53:15Z" ,
2021-12-13 15:13:24 +09:00
"updated_at" : "2021-12-13T03:58:51Z" ,
2021-12-13 09:13:18 +09:00
"pushed_at" : "2021-12-13T00:03:51Z" ,
2021-12-13 15:13:24 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-13 09:13:18 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-13 15:13:24 +09:00
"watchers" : 1 ,
2021-12-13 09:13:18 +09:00
"score" : 0
} ,
2021-12-12 21:13:07 +09:00
{
"id" : 437522139 ,
"name" : "CVE-2021-44228-research" ,
"full_name" : "mute1997\/CVE-2021-44228-research" ,
"owner" : {
"login" : "mute1997" ,
"id" : 4436476 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4436476?v=4" ,
"html_url" : "https:\/\/github.com\/mute1997"
} ,
"html_url" : "https:\/\/github.com\/mute1997\/CVE-2021-44228-research" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T11:08:54Z" ,
"updated_at" : "2021-12-12T11:10:28Z" ,
"pushed_at" : "2021-12-12T11:09:26Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437525008 ,
"name" : "cve-2021-44228-minecraft-poc" ,
"full_name" : "myyxl\/cve-2021-44228-minecraft-poc" ,
"owner" : {
"login" : "myyxl" ,
"id" : 22593897 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22593897?v=4" ,
"html_url" : "https:\/\/github.com\/myyxl"
} ,
"html_url" : "https:\/\/github.com\/myyxl\/cve-2021-44228-minecraft-poc" ,
2021-12-13 03:14:09 +09:00
"description" : "Log4J CVE-2021-44228 Minecraft PoC" ,
2021-12-12 21:13:07 +09:00
"fork" : false ,
"created_at" : "2021-12-12T11:22:51Z" ,
2021-12-13 21:13:34 +09:00
"updated_at" : "2021-12-13T11:50:46Z" ,
2021-12-12 21:13:07 +09:00
"pushed_at" : "2021-12-12T11:34:50Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2021-12-13 21:13:34 +09:00
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell" ,
"poc"
] ,
2021-12-12 21:13:07 +09:00
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437525445 ,
"name" : "Awesome-CVE-2021-44228" ,
"full_name" : "RrUZi\/Awesome-CVE-2021-44228" ,
"owner" : {
"login" : "RrUZi" ,
"id" : 43235635 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43235635?v=4" ,
"html_url" : "https:\/\/github.com\/RrUZi"
} ,
"html_url" : "https:\/\/github.com\/RrUZi\/Awesome-CVE-2021-44228" ,
"description" : "An awesome curated list of repos for CVE-2021-44228. ``Apache Log4j 2``" ,
"fork" : false ,
"created_at" : "2021-12-12T11:25:00Z" ,
"updated_at" : "2021-12-12T11:35:58Z" ,
"pushed_at" : "2021-12-12T11:33:43Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j2"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 437525803 ,
"name" : "CVE-2021-44228" ,
"full_name" : "0-x-2-2\/CVE-2021-44228" ,
"owner" : {
"login" : "0-x-2-2" ,
"id" : 9968651 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9968651?v=4" ,
"html_url" : "https:\/\/github.com\/0-x-2-2"
} ,
"html_url" : "https:\/\/github.com\/0-x-2-2\/CVE-2021-44228" ,
"description" : "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) " ,
"fork" : false ,
"created_at" : "2021-12-12T11:26:42Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:29:14Z" ,
2021-12-13 03:14:09 +09:00
"pushed_at" : "2021-12-12T17:37:11Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 37 ,
"watchers_count" : 37 ,
2021-12-14 03:13:40 +09:00
"forks_count" : 2 ,
2021-12-12 21:13:07 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"exploit" ,
"jndi" ,
"ldap" ,
"log4j" ,
"minecraft" ,
"rce"
] ,
"visibility" : "public" ,
2021-12-14 03:13:40 +09:00
"forks" : 2 ,
2021-12-14 09:13:41 +09:00
"watchers" : 37 ,
2021-12-12 21:13:07 +09:00
"score" : 0
} ,
{
"id" : 437526871 ,
"name" : "log4j-poc" ,
"full_name" : "Crane-Mocker\/log4j-poc" ,
"owner" : {
"login" : "Crane-Mocker" ,
"id" : 46662246 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46662246?v=4" ,
"html_url" : "https:\/\/github.com\/Crane-Mocker"
} ,
"html_url" : "https:\/\/github.com\/Crane-Mocker\/log4j-poc" ,
"description" : "Poc of log4j2 (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-12T11:31:45Z" ,
2021-12-13 03:14:09 +09:00
"updated_at" : "2021-12-12T12:19:15Z" ,
"pushed_at" : "2021-12-12T12:19:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437538957 ,
"name" : "CVE-2021-44228-log4Shell" ,
"full_name" : "kali-dass\/CVE-2021-44228-log4Shell" ,
"owner" : {
"login" : "kali-dass" ,
"id" : 28717904 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28717904?v=4" ,
"html_url" : "https:\/\/github.com\/kali-dass"
} ,
"html_url" : "https:\/\/github.com\/kali-dass\/CVE-2021-44228-log4Shell" ,
"description" : "Sample log4j shell exploit" ,
"fork" : false ,
"created_at" : "2021-12-12T12:27:39Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T16:37:25Z" ,
"pushed_at" : "2021-12-13T16:37:22Z" ,
2021-12-13 03:14:09 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437546559 ,
"name" : "log4j2-CVE-2021-44228" ,
"full_name" : "pravin-pp\/log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "pravin-pp" ,
"id" : 12995541 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4" ,
"html_url" : "https:\/\/github.com\/pravin-pp"
} ,
"html_url" : "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T13:00:38Z" ,
2021-12-13 15:13:24 +09:00
"updated_at" : "2021-12-13T04:00:49Z" ,
2021-12-13 03:14:09 +09:00
"pushed_at" : "2021-12-12T13:25:27Z" ,
2021-12-13 15:13:24 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-14 09:13:41 +09:00
"forks_count" : 1 ,
2021-12-13 03:14:09 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 1 ,
2021-12-13 15:13:24 +09:00
"watchers" : 1 ,
2021-12-13 03:14:09 +09:00
"score" : 0
} ,
{
"id" : 437550473 ,
"name" : "Exploitation-of-Log4j2-CVE-2021-44228" ,
"full_name" : "Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "Malwar3Ninja" ,
"id" : 34618086 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/34618086?v=4" ,
"html_url" : "https:\/\/github.com\/Malwar3Ninja"
} ,
"html_url" : "https:\/\/github.com\/Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228" ,
"description" : "IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 " ,
"fork" : false ,
"created_at" : "2021-12-12T13:17:18Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T01:55:53Z" ,
2021-12-13 21:13:34 +09:00
"pushed_at" : "2021-12-13T10:19:15Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2021-12-14 03:13:40 +09:00
"forks_count" : 1 ,
2021-12-13 03:14:09 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 03:13:40 +09:00
"forks" : 1 ,
2021-12-14 15:13:39 +09:00
"watchers" : 6 ,
2021-12-13 03:14:09 +09:00
"score" : 0
} ,
{
"id" : 437551037 ,
"name" : "docker-log4shell" ,
"full_name" : "urholaukkarinen\/docker-log4shell" ,
"owner" : {
"login" : "urholaukkarinen" ,
"id" : 5576504 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5576504?v=4" ,
"html_url" : "https:\/\/github.com\/urholaukkarinen"
} ,
"html_url" : "https:\/\/github.com\/urholaukkarinen\/docker-log4shell" ,
"description" : "Dockerized Go app for testing the CVE-2021-44228 vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-12T13:19:50Z" ,
"updated_at" : "2021-12-12T13:23:50Z" ,
"pushed_at" : "2021-12-12T13:21:28Z" ,
2021-12-12 09:13:11 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-12 03:13:20 +09:00
"watchers" : 0 ,
"score" : 0
2021-12-13 03:14:09 +09:00
} ,
{
"id" : 437553138 ,
"name" : "scan4log4j" ,
"full_name" : "ssl\/scan4log4j" ,
"owner" : {
"login" : "ssl" ,
"id" : 25695071 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25695071?v=4" ,
"html_url" : "https:\/\/github.com\/ssl"
} ,
"html_url" : "https:\/\/github.com\/ssl\/scan4log4j" ,
"description" : "Python script that sends CVE-2021-44228 log4j payload requests to url list" ,
"fork" : false ,
"created_at" : "2021-12-12T13:28:31Z" ,
2021-12-13 21:13:34 +09:00
"updated_at" : "2021-12-13T09:34:30Z" ,
2021-12-13 03:14:09 +09:00
"pushed_at" : "2021-12-12T13:39:45Z" ,
2021-12-13 21:13:34 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2021-12-14 15:13:39 +09:00
"forks_count" : 4 ,
2021-12-13 03:14:09 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 4 ,
2021-12-13 21:13:34 +09:00
"watchers" : 6 ,
2021-12-13 03:14:09 +09:00
"score" : 0
} ,
{
"id" : 437557116 ,
"name" : "nginx-mitigate-log4shell" ,
"full_name" : "infiniroot\/nginx-mitigate-log4shell" ,
"owner" : {
"login" : "infiniroot" ,
"id" : 29702565 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29702565?v=4" ,
"html_url" : "https:\/\/github.com\/infiniroot"
} ,
"html_url" : "https:\/\/github.com\/infiniroot\/nginx-mitigate-log4shell" ,
"description" : "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script" ,
"fork" : false ,
"created_at" : "2021-12-12T13:45:08Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-14T00:10:17Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T15:24:19Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
2021-12-13 21:13:34 +09:00
"forks_count" : 2 ,
2021-12-13 03:14:09 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-13 21:13:34 +09:00
"forks" : 2 ,
2021-12-14 09:13:41 +09:00
"watchers" : 15 ,
2021-12-13 03:14:09 +09:00
"score" : 0
} ,
{
"id" : 437560690 ,
"name" : "log4j-cve-2021-44228" ,
"full_name" : "lohanichaten\/log4j-cve-2021-44228" ,
"owner" : {
"login" : "lohanichaten" ,
"id" : 70852336 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70852336?v=4" ,
"html_url" : "https:\/\/github.com\/lohanichaten"
} ,
"html_url" : "https:\/\/github.com\/lohanichaten\/log4j-cve-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T13:59:38Z" ,
"updated_at" : "2021-12-12T14:03:46Z" ,
"pushed_at" : "2021-12-12T14:03:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437562080 ,
"name" : "log4j-log4shell-affected" ,
"full_name" : "authomize\/log4j-log4shell-affected" ,
"owner" : {
"login" : "authomize" ,
"id" : 57180096 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57180096?v=4" ,
"html_url" : "https:\/\/github.com\/authomize"
} ,
"html_url" : "https:\/\/github.com\/authomize\/log4j-log4shell-affected" ,
"description" : "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability " ,
"fork" : false ,
"created_at" : "2021-12-12T14:05:05Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T01:49:15Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T18:09:23Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 30 ,
"watchers_count" : 30 ,
2021-12-14 03:13:40 +09:00
"forks_count" : 3 ,
2021-12-13 03:14:09 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4j-rce"
] ,
"visibility" : "public" ,
2021-12-14 03:13:40 +09:00
"forks" : 3 ,
2021-12-14 15:13:39 +09:00
"watchers" : 30 ,
2021-12-13 03:14:09 +09:00
"score" : 0
} ,
{
"id" : 437567489 ,
"name" : "CVE-2021-44228_IoCs" ,
"full_name" : "guardicode\/CVE-2021-44228_IoCs" ,
"owner" : {
"login" : "guardicode" ,
"id" : 64462782 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64462782?v=4" ,
"html_url" : "https:\/\/github.com\/guardicode"
} ,
"html_url" : "https:\/\/github.com\/guardicode\/CVE-2021-44228_IoCs" ,
"description" : "Known IoCs for log4j framework vulnerability " ,
"fork" : false ,
"created_at" : "2021-12-12T14:27:28Z" ,
2021-12-13 09:13:18 +09:00
"updated_at" : "2021-12-12T21:18:28Z" ,
"pushed_at" : "2021-12-12T21:18:22Z" ,
2021-12-13 03:14:09 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-12-14 03:13:40 +09:00
"forks_count" : 2 ,
2021-12-13 03:14:09 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 03:13:40 +09:00
"forks" : 2 ,
2021-12-13 03:14:09 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437574258 ,
"name" : "log4j-poc" ,
"full_name" : "fireflyingup\/log4j-poc" ,
"owner" : {
"login" : "fireflyingup" ,
"id" : 48504204 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4" ,
"html_url" : "https:\/\/github.com\/fireflyingup"
} ,
"html_url" : "https:\/\/github.com\/fireflyingup\/log4j-poc" ,
"description" : "CVE-2021-44228 test demo" ,
"fork" : false ,
"created_at" : "2021-12-12T14:54:25Z" ,
2021-12-13 15:13:24 +09:00
"updated_at" : "2021-12-13T05:10:53Z" ,
"pushed_at" : "2021-12-13T05:10:50Z" ,
2021-12-13 03:14:09 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437575607 ,
"name" : "cve-2021-44228-qingteng-patch" ,
"full_name" : "qingtengyun\/cve-2021-44228-qingteng-patch" ,
"owner" : {
"login" : "qingtengyun" ,
"id" : 18526503 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4" ,
"html_url" : "https:\/\/github.com\/qingtengyun"
} ,
"html_url" : "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-patch" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T15:00:04Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T00:35:13Z" ,
2021-12-13 03:14:09 +09:00
"pushed_at" : "2021-12-12T16:03:21Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2021-12-13 03:14:09 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 15:13:39 +09:00
"watchers" : 5 ,
2021-12-13 03:14:09 +09:00
"score" : 0
} ,
2021-12-13 21:13:34 +09:00
{
"id" : 437582859 ,
"name" : "log4j-jndi-be-gone" ,
"full_name" : "nccgroup\/log4j-jndi-be-gone" ,
"owner" : {
"login" : "nccgroup" ,
"id" : 4067082 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4" ,
"html_url" : "https:\/\/github.com\/nccgroup"
} ,
"html_url" : "https:\/\/github.com\/nccgroup\/log4j-jndi-be-gone" ,
"description" : "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability." ,
"fork" : false ,
"created_at" : "2021-12-12T15:29:20Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T03:12:52Z" ,
2021-12-13 21:13:34 +09:00
"pushed_at" : "2021-12-12T21:29:20Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"forks_count" : 1 ,
2021-12-13 21:13:34 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 1 ,
"watchers" : 13 ,
2021-12-13 21:13:34 +09:00
"score" : 0
} ,
2021-12-13 03:14:09 +09:00
{
"id" : 437583301 ,
"name" : "cve-2021-44228-qingteng-online-patch" ,
"full_name" : "qingtengyun\/cve-2021-44228-qingteng-online-patch" ,
"owner" : {
"login" : "qingtengyun" ,
"id" : 18526503 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4" ,
"html_url" : "https:\/\/github.com\/qingtengyun"
} ,
"html_url" : "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-online-patch" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T15:30:55Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T01:43:17Z" ,
"pushed_at" : "2021-12-14T01:54:56Z" ,
"stargazers_count" : 17 ,
"watchers_count" : 17 ,
2021-12-13 03:14:09 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 15:13:39 +09:00
"watchers" : 17 ,
2021-12-13 03:14:09 +09:00
"score" : 0
} ,
2021-12-13 09:13:18 +09:00
{
"id" : 437586734 ,
"name" : "horrors-log4shell" ,
"full_name" : "tasooshi\/horrors-log4shell" ,
"owner" : {
"login" : "tasooshi" ,
"id" : 44586478 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44586478?v=4" ,
"html_url" : "https:\/\/github.com\/tasooshi"
} ,
"html_url" : "https:\/\/github.com\/tasooshi\/horrors-log4shell" ,
"description" : "A micro lab for CVE-2021-44228 (log4j)" ,
"fork" : false ,
"created_at" : "2021-12-12T15:44:49Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T23:19:35Z" ,
"pushed_at" : "2021-12-13T23:19:32Z" ,
2021-12-13 09:13:18 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2021-12-13 15:13:24 +09:00
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell"
] ,
2021-12-13 09:13:18 +09:00
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-12-13 03:14:09 +09:00
{
"id" : 437602257 ,
"name" : "evil-rmi-server" ,
"full_name" : "Hydragyrum\/evil-rmi-server" ,
"owner" : {
"login" : "Hydragyrum" ,
"id" : 4928181 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4" ,
"html_url" : "https:\/\/github.com\/Hydragyrum"
} ,
"html_url" : "https:\/\/github.com\/Hydragyrum\/evil-rmi-server" ,
"description" : "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-12T16:49:45Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T21:20:00Z" ,
2021-12-13 09:13:18 +09:00
"pushed_at" : "2021-12-12T21:48:06Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
2021-12-13 03:14:09 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 1 ,
"watchers" : 2 ,
2021-12-13 03:14:09 +09:00
"score" : 0
} ,
{
"id" : 437603411 ,
"name" : "Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab" ,
"full_name" : "twseptian\/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab" ,
"owner" : {
"login" : "twseptian" ,
"id" : 9025301 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4" ,
"html_url" : "https:\/\/github.com\/twseptian"
} ,
"html_url" : "https:\/\/github.com\/twseptian\/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab" ,
"description" : "Spring Boot Log4j - CVE-2021-44228 Docker Lab " ,
"fork" : false ,
"created_at" : "2021-12-12T16:54:33Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T21:16:00Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T17:37:05Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-12-13 15:13:24 +09:00
"forks_count" : 2 ,
2021-12-13 03:14:09 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"spring-boot-log4j"
] ,
"visibility" : "public" ,
2021-12-13 15:13:24 +09:00
"forks" : 2 ,
2021-12-14 09:13:41 +09:00
"watchers" : 3 ,
2021-12-13 03:14:09 +09:00
"score" : 0
2021-12-13 09:13:18 +09:00
} ,
{
"id" : 437630669 ,
"name" : "log4jcheck" ,
"full_name" : "OlafHaalstra\/log4jcheck" ,
"owner" : {
"login" : "OlafHaalstra" ,
"id" : 6420723 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6420723?v=4" ,
"html_url" : "https:\/\/github.com\/OlafHaalstra"
} ,
"html_url" : "https:\/\/github.com\/OlafHaalstra\/log4jcheck" ,
"description" : "Check list of URLs against Log4j vulnerability CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-12T18:57:05Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T21:06:24Z" ,
"pushed_at" : "2021-12-13T21:06:21Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-13 09:13:18 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 03:13:40 +09:00
"watchers" : 1 ,
2021-12-13 09:13:18 +09:00
"score" : 0
} ,
{
"id" : 437649883 ,
"name" : "Proof-CVE-2021-44228" ,
"full_name" : "Panyaprach\/Proof-CVE-2021-44228" ,
"owner" : {
"login" : "Panyaprach" ,
"id" : 9110880 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9110880?v=4" ,
"html_url" : "https:\/\/github.com\/Panyaprach"
} ,
"html_url" : "https:\/\/github.com\/Panyaprach\/Proof-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T20:31:19Z" ,
2021-12-13 15:13:24 +09:00
"updated_at" : "2021-12-13T05:13:22Z" ,
"pushed_at" : "2021-12-13T05:13:19Z" ,
2021-12-13 09:13:18 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437660117 ,
"name" : "Log4j-RCE" ,
"full_name" : "momos1337\/Log4j-RCE" ,
"owner" : {
"login" : "momos1337" ,
"id" : 64172550 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64172550?v=4" ,
"html_url" : "https:\/\/github.com\/momos1337"
} ,
"html_url" : "https:\/\/github.com\/momos1337\/Log4j-RCE" ,
"description" : "Log4j RCE - (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-12T21:26:44Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T15:02:20Z" ,
2021-12-13 15:13:24 +09:00
"pushed_at" : "2021-12-13T00:54:22Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2021-12-13 15:13:24 +09:00
"forks_count" : 2 ,
2021-12-13 09:13:18 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"bughunter" ,
"cve-2021-44228" ,
"exploit" ,
"hacking" ,
"log4j" ,
"log4j-rce" ,
"rce" ,
"remote-code-execution"
] ,
"visibility" : "public" ,
2021-12-13 15:13:24 +09:00
"forks" : 2 ,
2021-12-14 03:13:40 +09:00
"watchers" : 6 ,
2021-12-13 09:13:18 +09:00
"score" : 0
} ,
{
"id" : 437660360 ,
"name" : "cve-2021-44228-log4j-mitigation" ,
"full_name" : "palominoinc\/cve-2021-44228-log4j-mitigation" ,
"owner" : {
"login" : "palominoinc" ,
"id" : 7401270 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7401270?v=4" ,
"html_url" : "https:\/\/github.com\/palominoinc"
} ,
"html_url" : "https:\/\/github.com\/palominoinc\/cve-2021-44228-log4j-mitigation" ,
"description" : "Mitigate against log4j vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-12T21:28:09Z" ,
"updated_at" : "2021-12-12T21:49:42Z" ,
"pushed_at" : "2021-12-12T21:49:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437663314 ,
"name" : "log4j-poc" ,
"full_name" : "cyberxml\/log4j-poc" ,
"owner" : {
"login" : "cyberxml" ,
"id" : 10391872 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10391872?v=4" ,
"html_url" : "https:\/\/github.com\/cyberxml"
} ,
"html_url" : "https:\/\/github.com\/cyberxml\/log4j-poc" ,
"description" : "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell" ,
"fork" : false ,
"created_at" : "2021-12-12T21:45:33Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:59:34Z" ,
"pushed_at" : "2021-12-13T20:55:56Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
2021-12-13 09:13:18 +09:00
"allow_forking" : true ,
"is_template" : false ,
2021-12-13 15:13:24 +09:00
"topics" : [
"cve-2021-44228" ,
"exploit" ,
"log4j" ,
"log4shell" ,
"poc"
] ,
2021-12-13 09:13:18 +09:00
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 1 ,
"watchers" : 2 ,
2021-12-13 09:13:18 +09:00
"score" : 0
} ,
{
"id" : 437664611 ,
"name" : "Log4J-CVE-2021-44228-RCE" ,
"full_name" : "corneacristian\/Log4J-CVE-2021-44228-RCE" ,
"owner" : {
"login" : "corneacristian" ,
"id" : 59137279 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59137279?v=4" ,
"html_url" : "https:\/\/github.com\/corneacristian"
} ,
"html_url" : "https:\/\/github.com\/corneacristian\/Log4J-CVE-2021-44228-RCE" ,
"description" : "Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)" ,
"fork" : false ,
"created_at" : "2021-12-12T21:52:53Z" ,
"updated_at" : "2021-12-12T22:36:04Z" ,
"pushed_at" : "2021-12-12T22:36:02Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437674455 ,
"name" : "nse-log4shell" ,
"full_name" : "Diverto\/nse-log4shell" ,
"owner" : {
"login" : "Diverto" ,
"id" : 11384089 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11384089?v=4" ,
"html_url" : "https:\/\/github.com\/Diverto"
} ,
"html_url" : "https:\/\/github.com\/Diverto\/nse-log4shell" ,
"description" : "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-12T22:52:02Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:47:23Z" ,
2021-12-13 21:13:34 +09:00
"pushed_at" : "2021-12-13T07:09:29Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 52 ,
"watchers_count" : 52 ,
"forks_count" : 9 ,
2021-12-13 09:13:18 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 9 ,
"watchers" : 52 ,
2021-12-13 09:13:18 +09:00
"score" : 0
} ,
{
"id" : 437674999 ,
"name" : "log4py" ,
"full_name" : "dotPY-hax\/log4py" ,
"owner" : {
"login" : "dotPY-hax" ,
"id" : 67259802 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/67259802?v=4" ,
"html_url" : "https:\/\/github.com\/dotPY-hax"
} ,
"html_url" : "https:\/\/github.com\/dotPY-hax\/log4py" ,
"description" : "pythonic pure python RCE exploit for CVE-2021-44228 log4shell" ,
"fork" : false ,
"created_at" : "2021-12-12T22:55:25Z" ,
2021-12-13 21:13:34 +09:00
"updated_at" : "2021-12-13T06:51:21Z" ,
2021-12-13 09:13:18 +09:00
"pushed_at" : "2021-12-12T23:49:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"exploit" ,
"log4j" ,
"python" ,
"pythonic" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437681598 ,
"name" : "CVE-2021-44228-PoC" ,
"full_name" : "sunnyvale-it\/CVE-2021-44228-PoC" ,
"owner" : {
"login" : "sunnyvale-it" ,
"id" : 44291039 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4" ,
"html_url" : "https:\/\/github.com\/sunnyvale-it"
} ,
"html_url" : "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC" ,
2021-12-13 21:13:34 +09:00
"description" : "CVE-2021-44228 (Log4Shell) Proof of Concept" ,
2021-12-13 09:13:18 +09:00
"fork" : false ,
"created_at" : "2021-12-12T23:37:39Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:53:54Z" ,
"pushed_at" : "2021-12-13T21:23:25Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-12-13 09:13:18 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2021-12-13 21:13:34 +09:00
"topics" : [
2021-12-14 09:13:41 +09:00
"cve" ,
"cybersecurity" ,
2021-12-13 21:13:34 +09:00
"java" ,
2021-12-14 09:13:41 +09:00
"log4j" ,
2021-12-13 21:13:34 +09:00
"log4j2" ,
"security"
] ,
2021-12-13 09:13:18 +09:00
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 09:13:41 +09:00
"watchers" : 2 ,
2021-12-13 09:13:18 +09:00
"score" : 0
} ,
{
"id" : 437685288 ,
"name" : "log4j2-CVE-2021-44228" ,
"full_name" : "maxant\/log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "maxant" ,
"id" : 1108507 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1108507?v=4" ,
"html_url" : "https:\/\/github.com\/maxant"
} ,
"html_url" : "https:\/\/github.com\/maxant\/log4j2-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T00:02:54Z" ,
"updated_at" : "2021-12-13T00:09:37Z" ,
"pushed_at" : "2021-12-13T00:09:34Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-12-13 15:13:24 +09:00
} ,
{
"id" : 437687048 ,
"name" : "fail2ban-log4j" ,
"full_name" : "atnetws\/fail2ban-log4j" ,
"owner" : {
"login" : "atnetws" ,
"id" : 44603839 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44603839?v=4" ,
"html_url" : "https:\/\/github.com\/atnetws"
} ,
"html_url" : "https:\/\/github.com\/atnetws\/fail2ban-log4j" ,
"description" : "fail2ban filter that catches attacks againts log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T00:14:31Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T13:20:41Z" ,
"pushed_at" : "2021-12-13T13:31:35Z" ,
2021-12-13 15:13:24 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437687082 ,
"name" : "cve-2021-44228" ,
"full_name" : "kimobu\/cve-2021-44228" ,
"owner" : {
"login" : "kimobu" ,
"id" : 18669130 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18669130?v=4" ,
"html_url" : "https:\/\/github.com\/kimobu"
} ,
"html_url" : "https:\/\/github.com\/kimobu\/cve-2021-44228" ,
"description" : "Some files for red team\/blue team investigations into CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T00:14:45Z" ,
"updated_at" : "2021-12-13T00:23:01Z" ,
"pushed_at" : "2021-12-13T00:22:58Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437688500 ,
"name" : "anti-jndi" ,
"full_name" : "KainsRache\/anti-jndi" ,
"owner" : {
"login" : "KainsRache" ,
"id" : 1352675 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1352675?v=4" ,
"html_url" : "https:\/\/github.com\/KainsRache"
} ,
"html_url" : "https:\/\/github.com\/KainsRache\/anti-jndi" ,
"description" : "Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers." ,
"fork" : false ,
"created_at" : "2021-12-13T00:23:20Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:21:20Z" ,
"pushed_at" : "2021-12-13T22:21:17Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-12-13 15:13:24 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 03:13:40 +09:00
"watchers" : 2 ,
2021-12-13 15:13:24 +09:00
"score" : 0
} ,
{
"id" : 437692169 ,
"name" : "log4j-win-quick" ,
"full_name" : "lwsnz\/log4j-win-quick" ,
"owner" : {
"login" : "lwsnz" ,
"id" : 24641464 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24641464?v=4" ,
"html_url" : "https:\/\/github.com\/lwsnz"
} ,
"html_url" : "https:\/\/github.com\/lwsnz\/log4j-win-quick" ,
"description" : "CVE-2021-44228. Quick find and mitigate action for Windows OS." ,
"fork" : false ,
"created_at" : "2021-12-13T00:45:48Z" ,
"updated_at" : "2021-12-13T00:52:01Z" ,
"pushed_at" : "2021-12-13T00:49:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437704633 ,
"name" : "Log4j-check" ,
"full_name" : "bigsizeme\/Log4j-check" ,
"owner" : {
"login" : "bigsizeme" ,
"id" : 17845094 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4" ,
"html_url" : "https:\/\/github.com\/bigsizeme"
} ,
"html_url" : "https:\/\/github.com\/bigsizeme\/Log4j-check" ,
"description" : "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload" ,
"fork" : false ,
"created_at" : "2021-12-13T01:55:51Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:23:23Z" ,
2021-12-13 21:13:34 +09:00
"pushed_at" : "2021-12-13T09:18:19Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
2021-12-13 21:13:34 +09:00
"forks_count" : 6 ,
2021-12-13 15:13:24 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-13 21:13:34 +09:00
"forks" : 6 ,
2021-12-14 15:13:39 +09:00
"watchers" : 16 ,
2021-12-13 15:13:24 +09:00
"score" : 0
} ,
{
"id" : 437709337 ,
"name" : "exploit-CVE-2021-44228" ,
"full_name" : "pedrohavay\/exploit-CVE-2021-44228" ,
"owner" : {
"login" : "pedrohavay" ,
"id" : 18234370 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4" ,
"html_url" : "https:\/\/github.com\/pedrohavay"
} ,
"html_url" : "https:\/\/github.com\/pedrohavay\/exploit-CVE-2021-44228" ,
"description" : "This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228)." ,
"fork" : false ,
"created_at" : "2021-12-13T02:18:57Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T16:36:01Z" ,
"pushed_at" : "2021-12-13T16:35:58Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2021-12-13 15:13:24 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 03:13:40 +09:00
"watchers" : 6 ,
2021-12-13 15:13:24 +09:00
"score" : 0
} ,
{
"id" : 437721429 ,
"name" : "log4j-nullroute" ,
"full_name" : "0xRyan\/log4j-nullroute" ,
"owner" : {
"login" : "0xRyan" ,
"id" : 87556614 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87556614?v=4" ,
"html_url" : "https:\/\/github.com\/0xRyan"
} ,
"html_url" : "https:\/\/github.com\/0xRyan\/log4j-nullroute" ,
"description" : "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes" ,
"fork" : false ,
"created_at" : "2021-12-13T03:15:42Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:58:54Z" ,
"pushed_at" : "2021-12-13T21:34:53Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
2021-12-13 15:13:24 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 1 ,
"watchers" : 2 ,
2021-12-13 15:13:24 +09:00
"score" : 0
} ,
{
"id" : 437729534 ,
"name" : "CVE-2021-44228" ,
"full_name" : "fireeye\/CVE-2021-44228" ,
"owner" : {
"login" : "fireeye" ,
"id" : 4984788 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4984788?v=4" ,
"html_url" : "https:\/\/github.com\/fireeye"
} ,
"html_url" : "https:\/\/github.com\/fireeye\/CVE-2021-44228" ,
"description" : "OpenIOC rules to facilitate hunting for indicators of compromise" ,
"fork" : false ,
"created_at" : "2021-12-13T03:55:32Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T01:06:33Z" ,
"pushed_at" : "2021-12-14T01:06:33Z" ,
2021-12-13 15:13:24 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437729997 ,
"name" : "log4j-scan" ,
"full_name" : "fullhunt\/log4j-scan" ,
"owner" : {
"login" : "fullhunt" ,
"id" : 34830403 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/34830403?v=4" ,
"html_url" : "https:\/\/github.com\/fullhunt"
} ,
"html_url" : "https:\/\/github.com\/fullhunt\/log4j-scan" ,
"description" : "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 " ,
"fork" : false ,
"created_at" : "2021-12-13T03:57:50Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T06:12:45Z" ,
"pushed_at" : "2021-12-14T04:45:54Z" ,
"stargazers_count" : 679 ,
"watchers_count" : 679 ,
"forks_count" : 155 ,
2021-12-13 15:13:24 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 155 ,
"watchers" : 679 ,
2021-12-13 15:13:24 +09:00
"score" : 0
} ,
{
"id" : 437733080 ,
"name" : "log4j_checker_beta" ,
"full_name" : "rubo77\/log4j_checker_beta" ,
"owner" : {
"login" : "rubo77" ,
"id" : 1591563 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1591563?v=4" ,
"html_url" : "https:\/\/github.com\/rubo77"
} ,
"html_url" : "https:\/\/github.com\/rubo77\/log4j_checker_beta" ,
"description" : "a fast check, if your server could be vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T04:14:18Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T00:45:18Z" ,
2021-12-14 09:13:41 +09:00
"pushed_at" : "2021-12-13T22:56:26Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"forks_count" : 6 ,
2021-12-13 15:13:24 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 6 ,
"watchers" : 6 ,
2021-12-13 15:13:24 +09:00
"score" : 0
2021-12-13 21:13:34 +09:00
} ,
{
"id" : 437756128 ,
"name" : "scan4log4shell" ,
"full_name" : "hupe1980\/scan4log4shell" ,
"owner" : {
"login" : "hupe1980" ,
"id" : 24973437 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24973437?v=4" ,
"html_url" : "https:\/\/github.com\/hupe1980"
} ,
"html_url" : "https:\/\/github.com\/hupe1980\/scan4log4shell" ,
"description" : "Scanner to send specially crafted requests and catch callbacks of systems that are impacted by Log4J Log4Shell vulnerability (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-13T06:09:04Z" ,
"updated_at" : "2021-12-13T11:28:05Z" ,
"pushed_at" : "2021-12-13T06:44:17Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell" ,
"rce" ,
"scanner" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 437766799 ,
"name" : "Log4j-RCE-Exploiter" ,
"full_name" : "thecyberneh\/Log4j-RCE-Exploiter" ,
"owner" : {
"login" : "thecyberneh" ,
"id" : 75005384 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75005384?v=4" ,
"html_url" : "https:\/\/github.com\/thecyberneh"
} ,
"html_url" : "https:\/\/github.com\/thecyberneh\/Log4j-RCE-Exploiter" ,
"description" : "Scanner for Log4j RCE CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T06:53:01Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T14:47:15Z" ,
"pushed_at" : "2021-12-13T13:39:01Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-13 21:13:34 +09:00
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2021-12-14 03:13:40 +09:00
"watchers" : 1 ,
2021-12-13 21:13:34 +09:00
"score" : 0
} ,
{
"id" : 437769581 ,
"name" : "log4j2" ,
"full_name" : "halibobor\/log4j2" ,
"owner" : {
"login" : "halibobor" ,
"id" : 96046545 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96046545?v=4" ,
"html_url" : "https:\/\/github.com\/halibobor"
} ,
"html_url" : "https:\/\/github.com\/halibobor\/log4j2" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T07:03:50Z" ,
"updated_at" : "2021-12-13T09:39:44Z" ,
"pushed_at" : "2021-12-13T09:30:28Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"jmi" ,
"log4j2"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
} ,
2021-12-14 09:13:41 +09:00
{
"id" : 437771197 ,
"name" : "log4j-cve-code-search-resources" ,
"full_name" : "sourcegraph\/log4j-cve-code-search-resources" ,
"owner" : {
"login" : "sourcegraph" ,
"id" : 3979584 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3979584?v=4" ,
"html_url" : "https:\/\/github.com\/sourcegraph"
} ,
"html_url" : "https:\/\/github.com\/sourcegraph\/log4j-cve-code-search-resources" ,
"description" : "Using code search to help fix\/mitigate log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T07:10:11Z" ,
"updated_at" : "2021-12-13T20:15:51Z" ,
"pushed_at" : "2021-12-13T17:49:43Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-12-13 21:13:34 +09:00
{
"id" : 437774679 ,
"name" : "Log4J-CVE-2021-44228-Mitigation-Cheat-Sheet" ,
"full_name" : "thedevappsecguy\/Log4J-CVE-2021-44228-Mitigation-Cheat-Sheet" ,
"owner" : {
"login" : "thedevappsecguy" ,
"id" : 27088213 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/27088213?v=4" ,
"html_url" : "https:\/\/github.com\/thedevappsecguy"
} ,
"html_url" : "https:\/\/github.com\/thedevappsecguy\/Log4J-CVE-2021-44228-Mitigation-Cheat-Sheet" ,
"description" : "Log4J CVE-2021-44228 : Mitigation Cheat Sheet" ,
"fork" : false ,
"created_at" : "2021-12-13T07:24:02Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T04:48:14Z" ,
"pushed_at" : "2021-12-14T04:48:11Z" ,
2021-12-13 21:13:34 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437781188 ,
"name" : "CVE-2021-44228" ,
"full_name" : "helsecert\/CVE-2021-44228" ,
"owner" : {
"login" : "helsecert" ,
"id" : 2202200 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4" ,
"html_url" : "https:\/\/github.com\/helsecert"
} ,
"html_url" : "https:\/\/github.com\/helsecert\/CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T07:48:49Z" ,
"updated_at" : "2021-12-13T12:07:07Z" ,
"pushed_at" : "2021-12-13T12:07:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437784907 ,
"name" : "aws-log4j-mitigations" ,
"full_name" : "markuman\/aws-log4j-mitigations" ,
"owner" : {
"login" : "markuman" ,
"id" : 3920157 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4" ,
"html_url" : "https:\/\/github.com\/markuman"
} ,
"html_url" : "https:\/\/github.com\/markuman\/aws-log4j-mitigations" ,
"description" : "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible" ,
"fork" : false ,
"created_at" : "2021-12-13T08:01:55Z" ,
"updated_at" : "2021-12-13T08:05:42Z" ,
"pushed_at" : "2021-12-13T08:03:50Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"ansible" ,
"aws" ,
"cve-2021-44228" ,
"log4j" ,
"mitigation" ,
"waf"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437788180 ,
"name" : "Log4shell" ,
"full_name" : "tuyenee\/Log4shell" ,
"owner" : {
"login" : "tuyenee" ,
"id" : 29719729 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29719729?v=4" ,
"html_url" : "https:\/\/github.com\/tuyenee"
} ,
"html_url" : "https:\/\/github.com\/tuyenee\/Log4shell" ,
"description" : "A lab for playing around with the Log4J CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T08:13:07Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:42:03Z" ,
2021-12-13 21:13:34 +09:00
"pushed_at" : "2021-12-13T09:26:24Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2021-12-13 21:13:34 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 09:13:41 +09:00
"forks" : 1 ,
"watchers" : 1 ,
2021-12-13 21:13:34 +09:00
"score" : 0
} ,
{
"id" : 437795998 ,
"name" : "Log4j-CVE-2021-44228" ,
"full_name" : "JiuBanSec\/Log4j-CVE-2021-44228" ,
"owner" : {
"login" : "JiuBanSec" ,
"id" : 57030243 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4" ,
"html_url" : "https:\/\/github.com\/JiuBanSec"
} ,
"html_url" : "https:\/\/github.com\/JiuBanSec\/Log4j-CVE-2021-44228" ,
"description" : "Log4j Remote Code Injection (Apache Log4j 2.x < 2.15.0-rc2)" ,
"fork" : false ,
"created_at" : "2021-12-13T08:40:13Z" ,
"updated_at" : "2021-12-13T10:29:05Z" ,
"pushed_at" : "2021-12-13T12:01:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437797086 ,
"name" : "Log4Shell-CVE-2021-44228-ENV" ,
"full_name" : "ycdxsb\/Log4Shell-CVE-2021-44228-ENV" ,
"owner" : {
"login" : "ycdxsb" ,
"id" : 32149596 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4" ,
"html_url" : "https:\/\/github.com\/ycdxsb"
} ,
"html_url" : "https:\/\/github.com\/ycdxsb\/Log4Shell-CVE-2021-44228-ENV" ,
"description" : "Log4Shell Docker Env" ,
"fork" : false ,
"created_at" : "2021-12-13T08:43:45Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T02:55:13Z" ,
"pushed_at" : "2021-12-14T02:54:48Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-12-13 21:13:34 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 15:13:39 +09:00
"watchers" : 2 ,
2021-12-13 21:13:34 +09:00
"score" : 0
} ,
{
"id" : 437797971 ,
"name" : "Sitecore.Solr-log4j-mitigation" ,
"full_name" : "avwolferen\/Sitecore.Solr-log4j-mitigation" ,
"owner" : {
"login" : "avwolferen" ,
"id" : 11447968 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11447968?v=4" ,
"html_url" : "https:\/\/github.com\/avwolferen"
} ,
"html_url" : "https:\/\/github.com\/avwolferen\/Sitecore.Solr-log4j-mitigation" ,
"description" : "This repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T08:46:41Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T16:01:49Z" ,
"pushed_at" : "2021-12-13T16:01:46Z" ,
2021-12-13 21:13:34 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-12-14 15:13:39 +09:00
"forks_count" : 1 ,
2021-12-13 21:13:34 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 1 ,
2021-12-13 21:13:34 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437799663 ,
"name" : "log4j-scanner-CVE-2021-44228" ,
"full_name" : "kek-Sec\/log4j-scanner-CVE-2021-44228" ,
"owner" : {
"login" : "kek-Sec" ,
"id" : 28791067 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28791067?v=4" ,
"html_url" : "https:\/\/github.com\/kek-Sec"
} ,
"html_url" : "https:\/\/github.com\/kek-Sec\/log4j-scanner-CVE-2021-44228" ,
"description" : "Simple tool for scanning entire directories for attempts of CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T08:51:56Z" ,
"updated_at" : "2021-12-13T09:05:41Z" ,
"pushed_at" : "2021-12-13T09:05:38Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437816961 ,
"name" : "log4shell-spring-framework-research" ,
"full_name" : "Camphul\/log4shell-spring-framework-research" ,
"owner" : {
"login" : "Camphul" ,
"id" : 23475815 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23475815?v=4" ,
"html_url" : "https:\/\/github.com\/Camphul"
} ,
"html_url" : "https:\/\/github.com\/Camphul\/log4shell-spring-framework-research" ,
"description" : "Research into the implications of CVE-2021-44228 in Spring based applications." ,
"fork" : false ,
"created_at" : "2021-12-13T09:48:04Z" ,
"updated_at" : "2021-12-13T10:33:41Z" ,
"pushed_at" : "2021-12-13T10:33:38Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437820134 ,
"name" : "cve-2021-44228-log4j-exploits" ,
"full_name" : "lov3r\/cve-2021-44228-log4j-exploits" ,
"owner" : {
"login" : "lov3r" ,
"id" : 33676682 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33676682?v=4" ,
"html_url" : "https:\/\/github.com\/lov3r"
} ,
"html_url" : "https:\/\/github.com\/lov3r\/cve-2021-44228-log4j-exploits" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T09:58:11Z" ,
"updated_at" : "2021-12-13T10:22:19Z" ,
"pushed_at" : "2021-12-13T10:22:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437838249 ,
"name" : "log4jScan" ,
"full_name" : "sinakeshmiri\/log4jScan" ,
"owner" : {
"login" : "sinakeshmiri" ,
"id" : 72389059 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/72389059?v=4" ,
"html_url" : "https:\/\/github.com\/sinakeshmiri"
} ,
"html_url" : "https:\/\/github.com\/sinakeshmiri\/log4jScan" ,
"description" : "simple python scanner to check if your network is vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T10:59:50Z" ,
2021-12-14 03:13:40 +09:00
"updated_at" : "2021-12-13T12:16:06Z" ,
"pushed_at" : "2021-12-13T12:16:03Z" ,
2021-12-13 21:13:34 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437840280 ,
"name" : "Log4J-Scanner" ,
"full_name" : "0xDexter0us\/Log4J-Scanner" ,
"owner" : {
"login" : "0xDexter0us" ,
"id" : 76158271 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76158271?v=4" ,
"html_url" : "https:\/\/github.com\/0xDexter0us"
} ,
"html_url" : "https:\/\/github.com\/0xDexter0us\/Log4J-Scanner" ,
"description" : "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth." ,
"fork" : false ,
"created_at" : "2021-12-13T11:06:46Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:19:19Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T13:09:58Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 24 ,
"watchers_count" : 24 ,
"forks_count" : 6 ,
2021-12-14 03:13:40 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 6 ,
"watchers" : 24 ,
2021-12-14 03:13:40 +09:00
"score" : 0
} ,
{
"id" : 437847140 ,
"name" : "Log4Shell_Exploitation-Vulnerabiliy__CVE-2021-44228" ,
"full_name" : "LutziGoz\/Log4Shell_Exploitation-Vulnerabiliy__CVE-2021-44228" ,
"owner" : {
"login" : "LutziGoz" ,
"id" : 45577616 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45577616?v=4" ,
"html_url" : "https:\/\/github.com\/LutziGoz"
} ,
"html_url" : "https:\/\/github.com\/LutziGoz\/Log4Shell_Exploitation-Vulnerabiliy__CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T11:29:57Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:39:24Z" ,
"pushed_at" : "2021-12-14T05:39:21Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-13 21:13:34 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 03:13:40 +09:00
"watchers" : 1 ,
2021-12-13 21:13:34 +09:00
"score" : 0
} ,
{
"id" : 437848570 ,
"name" : "CVE-2021-44228-log4j-log4shell-Security-Research-Summary" ,
"full_name" : "0xsyr0\/CVE-2021-44228-log4j-log4shell-Security-Research-Summary" ,
"owner" : {
"login" : "0xsyr0" ,
"id" : 67317571 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/67317571?v=4" ,
"html_url" : "https:\/\/github.com\/0xsyr0"
} ,
"html_url" : "https:\/\/github.com\/0xsyr0\/CVE-2021-44228-log4j-log4shell-Security-Research-Summary" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T11:34:54Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T21:41:44Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T17:09:24Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-12-13 21:13:34 +09:00
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2021-12-14 09:13:41 +09:00
"watchers" : 3 ,
2021-12-13 21:13:34 +09:00
"score" : 0
2021-12-14 03:13:40 +09:00
} ,
{
"id" : 437864729 ,
"name" : "CVE-2021-44228-podman" ,
"full_name" : "ahmad4fifz\/CVE-2021-44228-podman" ,
"owner" : {
"login" : "ahmad4fifz" ,
"id" : 45918058 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45918058?v=4" ,
"html_url" : "https:\/\/github.com\/ahmad4fifz"
} ,
"html_url" : "https:\/\/github.com\/ahmad4fifz\/CVE-2021-44228-podman" ,
"description" : "CVE-2021-44228 on Podman" ,
"fork" : false ,
"created_at" : "2021-12-13T12:30:11Z" ,
"updated_at" : "2021-12-13T13:39:10Z" ,
"pushed_at" : "2021-12-13T13:39:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve" ,
"cve-2021-44228" ,
"log4j2" ,
"podman"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437866496 ,
"name" : "log4j-rce-test" ,
"full_name" : "jeffli1024\/log4j-rce-test" ,
"owner" : {
"login" : "jeffli1024" ,
"id" : 33046602 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33046602?v=4" ,
"html_url" : "https:\/\/github.com\/jeffli1024"
} ,
"html_url" : "https:\/\/github.com\/jeffli1024\/log4j-rce-test" ,
"description" : "CVE-2021-44228 - Apache log4j RCE quick test" ,
"fork" : false ,
"created_at" : "2021-12-13T12:35:39Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T22:22:08Z" ,
"pushed_at" : "2021-12-13T21:53:39Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-12-14 03:13:40 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 09:13:41 +09:00
"watchers" : 2 ,
2021-12-14 03:13:40 +09:00
"score" : 0
} ,
{
"id" : 437876264 ,
2021-12-14 09:13:41 +09:00
"name" : "Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service" ,
"full_name" : "zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service" ,
2021-12-14 03:13:40 +09:00
"owner" : {
"login" : "zsolt-halo" ,
"id" : 2437516 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2437516?v=4" ,
"html_url" : "https:\/\/github.com\/zsolt-halo"
} ,
2021-12-14 09:13:41 +09:00
"html_url" : "https:\/\/github.com\/zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service" ,
2021-12-14 03:13:40 +09:00
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T13:05:26Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T05:51:48Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T13:26:11Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
2021-12-14 03:13:40 +09:00
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2021-12-14 15:13:39 +09:00
"watchers" : 9 ,
2021-12-14 03:13:40 +09:00
"score" : 0
} ,
{
"id" : 437877109 ,
"name" : "log4j-cve-2021-44228" ,
"full_name" : "manuel-alvarez-alvarez\/log4j-cve-2021-44228" ,
"owner" : {
"login" : "manuel-alvarez-alvarez" ,
"id" : 4885539 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4885539?v=4" ,
"html_url" : "https:\/\/github.com\/manuel-alvarez-alvarez"
} ,
"html_url" : "https:\/\/github.com\/manuel-alvarez-alvarez\/log4j-cve-2021-44228" ,
"description" : "Log4j CVE-2021-44228 examples: Remote Code Execution (through LDAP, RMI, ...), Forced DNS queries, ..." ,
"fork" : false ,
"created_at" : "2021-12-13T13:08:03Z" ,
"updated_at" : "2021-12-13T14:06:06Z" ,
"pushed_at" : "2021-12-13T14:01:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437882599 ,
"name" : "CVE-2021-44228" ,
"full_name" : "VNYui\/CVE-2021-44228" ,
"owner" : {
"login" : "VNYui" ,
"id" : 14999242 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14999242?v=4" ,
"html_url" : "https:\/\/github.com\/VNYui"
} ,
"html_url" : "https:\/\/github.com\/VNYui\/CVE-2021-44228" ,
"description" : "Mass recognition tool for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T13:25:19Z" ,
"updated_at" : "2021-12-13T13:37:39Z" ,
"pushed_at" : "2021-12-13T13:37:36Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437883625 ,
"name" : "Scan-CVE-2021-44228" ,
"full_name" : "flxhaas\/Scan-CVE-2021-44228" ,
"owner" : {
"login" : "flxhaas" ,
"id" : 5561099 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5561099?v=4" ,
"html_url" : "https:\/\/github.com\/flxhaas"
} ,
"html_url" : "https:\/\/github.com\/flxhaas\/Scan-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T13:28:26Z" ,
"updated_at" : "2021-12-13T13:28:26Z" ,
"pushed_at" : "2021-12-13T13:28:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437884471 ,
"name" : "Log4j-CVE-2021-44228" ,
"full_name" : "justakazh\/Log4j-CVE-2021-44228" ,
"owner" : {
"login" : "justakazh" ,
"id" : 36891477 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4" ,
"html_url" : "https:\/\/github.com\/justakazh"
} ,
"html_url" : "https:\/\/github.com\/justakazh\/Log4j-CVE-2021-44228" ,
"description" : "Mass Check Vulnerable Log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T13:30:57Z" ,
"updated_at" : "2021-12-13T17:34:51Z" ,
"pushed_at" : "2021-12-13T14:17:59Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 437888133 ,
"name" : "f5-waf-quick-patch-cve-2021-44228" ,
"full_name" : "irgoncalves\/f5-waf-quick-patch-cve-2021-44228" ,
"owner" : {
"login" : "irgoncalves" ,
"id" : 23459099 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4" ,
"html_url" : "https:\/\/github.com\/irgoncalves"
} ,
"html_url" : "https:\/\/github.com\/irgoncalves\/f5-waf-quick-patch-cve-2021-44228" ,
"description" : "This tool creates a custom signature set on F5 WAF and apply to policies in blocking mode" ,
"fork" : false ,
"created_at" : "2021-12-13T13:41:39Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T20:57:17Z" ,
"pushed_at" : "2021-12-13T22:42:51Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-12-14 15:13:39 +09:00
"forks_count" : 2 ,
2021-12-14 03:13:40 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 2 ,
2021-12-14 03:13:40 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437898574 ,
"name" : "check-log4j-vulnerability" ,
"full_name" : "AdriDevelopsThings\/check-log4j-vulnerability" ,
"owner" : {
"login" : "AdriDevelopsThings" ,
"id" : 45321107 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45321107?v=4" ,
"html_url" : "https:\/\/github.com\/AdriDevelopsThings"
} ,
"html_url" : "https:\/\/github.com\/AdriDevelopsThings\/check-log4j-vulnerability" ,
"description" : "Check if your server is vulnerable to the CVE-2021-44228. (node)" ,
"fork" : false ,
"created_at" : "2021-12-13T14:10:43Z" ,
"updated_at" : "2021-12-13T16:20:51Z" ,
"pushed_at" : "2021-12-13T14:13:39Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 437902732 ,
"name" : "JndiLookup" ,
"full_name" : "madCdan\/JndiLookup" ,
"owner" : {
"login" : "madCdan" ,
"id" : 10784600 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10784600?v=4" ,
"html_url" : "https:\/\/github.com\/madCdan"
} ,
"html_url" : "https:\/\/github.com\/madCdan\/JndiLookup" ,
"description" : "Some tools to help mitigating Apache Log4j 2 CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T14:22:34Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T00:18:39Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T17:07:42Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-14 03:13:40 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 15:13:39 +09:00
"watchers" : 1 ,
2021-12-14 03:13:40 +09:00
"score" : 0
} ,
2021-12-14 09:13:41 +09:00
{
"id" : 437904012 ,
"name" : "MC-Log4j-Patcher" ,
"full_name" : "Koupah\/MC-Log4j-Patcher" ,
"owner" : {
"login" : "Koupah" ,
"id" : 25888315 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25888315?v=4" ,
"html_url" : "https:\/\/github.com\/Koupah"
} ,
"html_url" : "https:\/\/github.com\/Koupah\/MC-Log4j-Patcher" ,
"description" : "A singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228)." ,
"fork" : false ,
"created_at" : "2021-12-13T14:26:24Z" ,
"updated_at" : "2021-12-13T22:44:40Z" ,
"pushed_at" : "2021-12-13T22:44:37Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
2021-12-14 03:13:40 +09:00
{
"id" : 437917354 ,
"name" : "Fix-CVE-2021-44228" ,
"full_name" : "AlexandreHeroux\/Fix-CVE-2021-44228" ,
"owner" : {
"login" : "AlexandreHeroux" ,
"id" : 28022186 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28022186?v=4" ,
"html_url" : "https:\/\/github.com\/AlexandreHeroux"
} ,
"html_url" : "https:\/\/github.com\/AlexandreHeroux\/Fix-CVE-2021-44228" ,
"description" : "Apply class remove process from ear\/war\/jar\/zip archive, see https:\/\/logging.apache.org\/log4j\/2.x\/" ,
"fork" : false ,
"created_at" : "2021-12-13T15:04:31Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T21:41:42Z" ,
"pushed_at" : "2021-12-13T21:41:39Z" ,
2021-12-14 03:13:40 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 437919806 ,
"name" : "log4j-CVE-2021-44228-test" ,
"full_name" : "kossatzd\/log4j-CVE-2021-44228-test" ,
"owner" : {
"login" : "kossatzd" ,
"id" : 3578287 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3578287?v=4" ,
"html_url" : "https:\/\/github.com\/kossatzd"
} ,
"html_url" : "https:\/\/github.com\/kossatzd\/log4j-CVE-2021-44228-test" ,
"description" : "demo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-13T15:11:15Z" ,
"updated_at" : "2021-12-13T15:11:19Z" ,
"pushed_at" : "2021-12-13T15:11:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437937629 ,
"name" : "log4j-CVE-2021-44228" ,
"full_name" : "tobiasoed\/log4j-CVE-2021-44228" ,
"owner" : {
"login" : "tobiasoed" ,
"id" : 12912943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12912943?v=4" ,
"html_url" : "https:\/\/github.com\/tobiasoed"
} ,
"html_url" : "https:\/\/github.com\/tobiasoed\/log4j-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T16:04:54Z" ,
"updated_at" : "2021-12-13T16:47:23Z" ,
"pushed_at" : "2021-12-13T16:47:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437948858 ,
"name" : "log4j-1.2.15-mod" ,
"full_name" : "p3dr16k\/log4j-1.2.15-mod" ,
"owner" : {
"login" : "p3dr16k" ,
"id" : 9317261 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9317261?v=4" ,
"html_url" : "https:\/\/github.com\/p3dr16k"
} ,
"html_url" : "https:\/\/github.com\/p3dr16k\/log4j-1.2.15-mod" ,
"description" : "log4j version 1 with a patch for CVE-2021-44228 vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-13T16:40:14Z" ,
"updated_at" : "2021-12-13T16:40:57Z" ,
"pushed_at" : "2021-12-13T16:40:15Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437949273 ,
"name" : "ansible-role-log4shell" ,
"full_name" : "claranet\/ansible-role-log4shell" ,
"owner" : {
"login" : "claranet" ,
"id" : 7526691 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7526691?v=4" ,
"html_url" : "https:\/\/github.com\/claranet"
} ,
"html_url" : "https:\/\/github.com\/claranet\/ansible-role-log4shell" ,
"description" : "Find Log4Shell CVE-2021-44228 on your system" ,
"fork" : false ,
"created_at" : "2021-12-13T16:41:31Z" ,
2021-12-14 09:13:41 +09:00
"updated_at" : "2021-12-13T18:57:36Z" ,
2021-12-14 03:13:40 +09:00
"pushed_at" : "2021-12-13T17:12:00Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-14 03:13:40 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"ansible" ,
"claranet" ,
"log4j" ,
"log4shell" ,
"role"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2021-12-14 09:13:41 +09:00
"watchers" : 1 ,
2021-12-14 03:13:40 +09:00
"score" : 0
} ,
{
"id" : 437960695 ,
"name" : "CVE-2021-44228" ,
"full_name" : "taurusxin\/CVE-2021-44228" ,
"owner" : {
"login" : "taurusxin" ,
"id" : 17809960 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17809960?v=4" ,
"html_url" : "https:\/\/github.com\/taurusxin"
} ,
"html_url" : "https:\/\/github.com\/taurusxin\/CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T17:17:37Z" ,
"updated_at" : "2021-12-13T17:22:22Z" ,
"pushed_at" : "2021-12-13T17:22:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437963459 ,
"name" : "ftp_over_log4j" ,
"full_name" : "Chelsea486MHz\/ftp_over_log4j" ,
"owner" : {
"login" : "Chelsea486MHz" ,
"id" : 12125422 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12125422?v=4" ,
"html_url" : "https:\/\/github.com\/Chelsea486MHz"
} ,
"html_url" : "https:\/\/github.com\/Chelsea486MHz\/ftp_over_log4j" ,
"description" : "File transfers using the log4shell vulnerability (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-13T17:26:49Z" ,
"updated_at" : "2021-12-13T18:01:11Z" ,
"pushed_at" : "2021-12-13T18:01:08Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-12-14 09:13:41 +09:00
{
"id" : 437965181 ,
"name" : "log4j2-prosecutor" ,
"full_name" : "trevalkov\/log4j2-prosecutor" ,
"owner" : {
"login" : "trevalkov" ,
"id" : 52704508 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52704508?v=4" ,
"html_url" : "https:\/\/github.com\/trevalkov"
} ,
"html_url" : "https:\/\/github.com\/trevalkov\/log4j2-prosecutor" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T17:32:26Z" ,
"updated_at" : "2021-12-13T19:01:07Z" ,
"pushed_at" : "2021-12-13T19:01:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-12-14 03:13:40 +09:00
{
"id" : 437968616 ,
"name" : "CVE-2021-44228_Log4Shell" ,
"full_name" : "yanghaoi\/CVE-2021-44228_Log4Shell" ,
"owner" : {
"login" : "yanghaoi" ,
"id" : 21354684 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4" ,
"html_url" : "https:\/\/github.com\/yanghaoi"
} ,
"html_url" : "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell" ,
"description" : "Log4Shell A test for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T17:44:01Z" ,
"updated_at" : "2021-12-13T18:03:51Z" ,
"pushed_at" : "2021-12-13T18:06:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-12-14 09:13:41 +09:00
} ,
{
"id" : 437983994 ,
"name" : "log4j_checker" ,
"full_name" : "lfama\/log4j_checker" ,
"owner" : {
"login" : "lfama" ,
"id" : 14056990 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14056990?v=4" ,
"html_url" : "https:\/\/github.com\/lfama"
} ,
"html_url" : "https:\/\/github.com\/lfama\/log4j_checker" ,
"description" : "Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines." ,
"fork" : false ,
"created_at" : "2021-12-13T18:35:16Z" ,
"updated_at" : "2021-12-13T23:11:50Z" ,
"pushed_at" : "2021-12-13T23:11:47Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"exploit" ,
"log4j" ,
"log4jshell" ,
"log4shell" ,
"python" ,
"python3" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 437988861 ,
"name" : "Log4j-IOCs" ,
"full_name" : "threatmonit\/Log4j-IOCs" ,
"owner" : {
"login" : "threatmonit" ,
"id" : 90388073 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4" ,
"html_url" : "https:\/\/github.com\/threatmonit"
} ,
"html_url" : "https:\/\/github.com\/threatmonit\/Log4j-IOCs" ,
"description" : "Public IOCs about log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T18:52:19Z" ,
"updated_at" : "2021-12-13T19:11:33Z" ,
"pushed_at" : "2021-12-13T19:11:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437989921 ,
"name" : "fix-cve-2021-44228" ,
"full_name" : "mcedica\/fix-cve-2021-44228" ,
"owner" : {
"login" : "mcedica" ,
"id" : 647898 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/647898?v=4" ,
"html_url" : "https:\/\/github.com\/mcedica"
} ,
"html_url" : "https:\/\/github.com\/mcedica\/fix-cve-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T18:55:55Z" ,
"updated_at" : "2021-12-13T18:55:55Z" ,
"pushed_at" : "2021-12-13T18:55:56Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 437995131 ,
"name" : "l4j-info" ,
"full_name" : "ben-smash\/l4j-info" ,
"owner" : {
"login" : "ben-smash" ,
"id" : 95368649 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4" ,
"html_url" : "https:\/\/github.com\/ben-smash"
} ,
"html_url" : "https:\/\/github.com\/ben-smash\/l4j-info" ,
"description" : "Compiling links of value i find regarding CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T19:14:23Z" ,
"updated_at" : "2021-12-13T21:11:09Z" ,
"pushed_at" : "2021-12-13T21:11:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438003225 ,
"name" : "log4j-test" ,
"full_name" : "strawhatasif\/log4j-test" ,
"owner" : {
"login" : "strawhatasif" ,
"id" : 10750101 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4" ,
"html_url" : "https:\/\/github.com\/strawhatasif"
} ,
"html_url" : "https:\/\/github.com\/strawhatasif\/log4j-test" ,
"description" : "Demonstration of CVE-2021-44228 with a possible strategic fix." ,
"fork" : false ,
"created_at" : "2021-12-13T19:43:01Z" ,
"updated_at" : "2021-12-13T20:26:40Z" ,
"pushed_at" : "2021-12-13T20:26:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438012376 ,
"name" : "nmap-log4shell" ,
"full_name" : "giterlizzi\/nmap-log4shell" ,
"owner" : {
"login" : "giterlizzi" ,
"id" : 1824717 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1824717?v=4" ,
"html_url" : "https:\/\/github.com\/giterlizzi"
} ,
"html_url" : "https:\/\/github.com\/giterlizzi\/nmap-log4shell" ,
"description" : "Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-13T20:17:14Z" ,
"updated_at" : "2021-12-13T21:51:29Z" ,
"pushed_at" : "2021-12-13T20:51:02Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell" ,
"nmap" ,
"nmap-scripts" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 438013062 ,
"name" : "Siem-queries-for-CVE-2021-44228" ,
"full_name" : "tica506\/Siem-queries-for-CVE-2021-44228" ,
"owner" : {
"login" : "tica506" ,
"id" : 93236626 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4" ,
"html_url" : "https:\/\/github.com\/tica506"
} ,
"html_url" : "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T20:19:57Z" ,
"updated_at" : "2021-12-13T20:56:54Z" ,
"pushed_at" : "2021-12-13T20:56:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438028657 ,
"name" : "log4j2-CVE-2021-44228-poc-local" ,
"full_name" : "snatalius\/log4j2-CVE-2021-44228-poc-local" ,
"owner" : {
"login" : "snatalius" ,
"id" : 22771118 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4" ,
"html_url" : "https:\/\/github.com\/snatalius"
} ,
"html_url" : "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local" ,
"description" : "Just a personal proof of concept of CVE-2021-44228 on log4j2" ,
"fork" : false ,
"created_at" : "2021-12-13T21:21:53Z" ,
"updated_at" : "2021-12-13T21:21:56Z" ,
"pushed_at" : "2021-12-13T21:21:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438032780 ,
"name" : "CVE-2021-44228" ,
"full_name" : "Contrast-Security-OSS\/CVE-2021-44228" ,
"owner" : {
"login" : "Contrast-Security-OSS" ,
"id" : 5577345 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5577345?v=4" ,
"html_url" : "https:\/\/github.com\/Contrast-Security-OSS"
} ,
"html_url" : "https:\/\/github.com\/Contrast-Security-OSS\/CVE-2021-44228" ,
"description" : "Professional Service scripts to aid in the identification of affected Java applications in TeamServer" ,
"fork" : false ,
"created_at" : "2021-12-13T21:39:39Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T01:40:19Z" ,
"pushed_at" : "2021-12-14T01:40:16Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438032826 ,
"name" : "log4shell-rex" ,
"full_name" : "back2root\/log4shell-rex" ,
"owner" : {
"login" : "back2root" ,
"id" : 9200239 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9200239?v=4" ,
"html_url" : "https:\/\/github.com\/back2root"
} ,
"html_url" : "https:\/\/github.com\/back2root\/log4shell-rex" ,
"description" : "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs" ,
"fork" : false ,
"created_at" : "2021-12-13T21:39:51Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T00:40:35Z" ,
"pushed_at" : "2021-12-14T00:40:32Z" ,
2021-12-14 09:13:41 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438034703 ,
"name" : "log4shell-tools" ,
"full_name" : "alexbakker\/log4shell-tools" ,
"owner" : {
"login" : "alexbakker" ,
"id" : 2387841 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4" ,
"html_url" : "https:\/\/github.com\/alexbakker"
} ,
"html_url" : "https:\/\/github.com\/alexbakker\/log4shell-tools" ,
"description" : "Tool to check whether one of your applications is affected by a vulnerability in log4j: CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T21:47:41Z" ,
2021-12-14 15:13:39 +09:00
"updated_at" : "2021-12-14T02:51:13Z" ,
2021-12-14 09:13:41 +09:00
"pushed_at" : "2021-12-13T23:23:34Z" ,
2021-12-14 15:13:39 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 1 ,
2021-12-14 09:13:41 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell"
] ,
"visibility" : "public" ,
2021-12-14 15:13:39 +09:00
"forks" : 1 ,
"watchers" : 3 ,
2021-12-14 09:13:41 +09:00
"score" : 0
} ,
{
"id" : 438037117 ,
"name" : "cve-2021-44228-code-scan" ,
"full_name" : "benarculus\/cve-2021-44228-code-scan" ,
"owner" : {
"login" : "benarculus" ,
"id" : 39167894 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39167894?v=4" ,
"html_url" : "https:\/\/github.com\/benarculus"
} ,
"html_url" : "https:\/\/github.com\/benarculus\/cve-2021-44228-code-scan" ,
"description" : "GitHub CodeQL Action to scan for CVE-2021– 44228" ,
"fork" : false ,
"created_at" : "2021-12-13T21:57:58Z" ,
"updated_at" : "2021-12-13T21:58:01Z" ,
"pushed_at" : "2021-12-13T21:57:58Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438040118 ,
"name" : "log4j-scanner" ,
"full_name" : "name\/log4j-scanner" ,
"owner" : {
"login" : "name" ,
"id" : 39627038 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39627038?v=4" ,
"html_url" : "https:\/\/github.com\/name"
} ,
"html_url" : "https:\/\/github.com\/name\/log4j-scanner" ,
"description" : "Log4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS" ,
"fork" : false ,
"created_at" : "2021-12-13T22:11:15Z" ,
"updated_at" : "2021-12-13T22:31:19Z" ,
"pushed_at" : "2021-12-13T22:31:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438043313 ,
"name" : "find-log4j" ,
"full_name" : "perryflynn\/find-log4j" ,
"owner" : {
"login" : "perryflynn" ,
"id" : 1693988 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1693988?v=4" ,
"html_url" : "https:\/\/github.com\/perryflynn"
} ,
"html_url" : "https:\/\/github.com\/perryflynn\/find-log4j" ,
"description" : "Find log4j for CVE-2021-44228 on some places * Log4Shell" ,
"fork" : false ,
"created_at" : "2021-12-13T22:26:04Z" ,
"updated_at" : "2021-12-13T23:00:19Z" ,
"pushed_at" : "2021-12-13T23:00:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4j2" ,
"log4jshell"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438053954 ,
"name" : "log4jpoc" ,
"full_name" : "igoritos22\/log4jpoc" ,
"owner" : {
"login" : "igoritos22" ,
"id" : 73206099 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73206099?v=4" ,
"html_url" : "https:\/\/github.com\/igoritos22"
} ,
"html_url" : "https:\/\/github.com\/igoritos22\/log4jpoc" ,
"description" : "Prova de conceito da vulnerabulidade CVE-2021-44228." ,
"fork" : false ,
"created_at" : "2021-12-13T23:19:41Z" ,
"updated_at" : "2021-12-13T23:19:45Z" ,
"pushed_at" : "2021-12-13T23:19:42Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-12-14 15:13:39 +09:00
} ,
{
"id" : 438090697 ,
"name" : "log4j-cve-2021-44228-sample" ,
"full_name" : "alpacamybags118\/log4j-cve-2021-44228-sample" ,
"owner" : {
"login" : "alpacamybags118" ,
"id" : 16386559 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16386559?v=4" ,
"html_url" : "https:\/\/github.com\/alpacamybags118"
} ,
"html_url" : "https:\/\/github.com\/alpacamybags118\/log4j-cve-2021-44228-sample" ,
"description" : "Sample docker-compose setup to show how this exploit works" ,
"fork" : false ,
"created_at" : "2021-12-14T02:26:52Z" ,
"updated_at" : "2021-12-14T02:55:18Z" ,
"pushed_at" : "2021-12-14T02:49:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438090719 ,
"name" : "log4j2-issue-check" ,
"full_name" : "sandarenu\/log4j2-issue-check" ,
"owner" : {
"login" : "sandarenu" ,
"id" : 808954 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/808954?v=4" ,
"html_url" : "https:\/\/github.com\/sandarenu"
} ,
"html_url" : "https:\/\/github.com\/sandarenu\/log4j2-issue-check" ,
"description" : "Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T02:26:56Z" ,
"updated_at" : "2021-12-14T03:53:41Z" ,
"pushed_at" : "2021-12-14T03:53:38Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438108150 ,
"name" : "cve-2021-44228" ,
"full_name" : "eR072391\/cve-2021-44228" ,
"owner" : {
"login" : "eR072391" ,
"id" : 76501872 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76501872?v=4" ,
"html_url" : "https:\/\/github.com\/eR072391"
} ,
"html_url" : "https:\/\/github.com\/eR072391\/cve-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-14T03:45:48Z" ,
"updated_at" : "2021-12-14T03:56:05Z" ,
"pushed_at" : "2021-12-14T03:56:02Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438112808 ,
"name" : "CVE-2021-44228-Demo" ,
"full_name" : "roticagas\/CVE-2021-44228-Demo" ,
"owner" : {
"login" : "roticagas" ,
"id" : 17757134 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17757134?v=4" ,
"html_url" : "https:\/\/github.com\/roticagas"
} ,
"html_url" : "https:\/\/github.com\/roticagas\/CVE-2021-44228-Demo" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-14T04:09:02Z" ,
"updated_at" : "2021-12-14T04:11:40Z" ,
"pushed_at" : "2021-12-14T04:10:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438115863 ,
"name" : "cve-2021-44228-log4j" ,
"full_name" : "archongum\/cve-2021-44228-log4j" ,
"owner" : {
"login" : "archongum" ,
"id" : 20929338 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20929338?v=4" ,
"html_url" : "https:\/\/github.com\/archongum"
} ,
"html_url" : "https:\/\/github.com\/archongum\/cve-2021-44228-log4j" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-14T04:25:13Z" ,
"updated_at" : "2021-12-14T05:51:10Z" ,
"pushed_at" : "2021-12-14T05:51:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438118026 ,
"name" : "log4j-urlscanner" ,
"full_name" : "Woahd\/log4j-urlscanner" ,
"owner" : {
"login" : "Woahd" ,
"id" : 91861246 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/91861246?v=4" ,
"html_url" : "https:\/\/github.com\/Woahd"
} ,
"html_url" : "https:\/\/github.com\/Woahd\/log4j-urlscanner" ,
"description" : "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading" ,
"fork" : false ,
"created_at" : "2021-12-14T04:35:20Z" ,
"updated_at" : "2021-12-14T05:24:08Z" ,
"pushed_at" : "2021-12-14T05:23:29Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438133157 ,
"name" : "CVE-2021-44228" ,
"full_name" : "zjx\/CVE-2021-44228" ,
"owner" : {
"login" : "zjx" ,
"id" : 1483965 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1483965?v=4" ,
"html_url" : "https:\/\/github.com\/zjx"
} ,
"html_url" : "https:\/\/github.com\/zjx\/CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-14T05:48:49Z" ,
"updated_at" : "2021-12-14T05:48:53Z" ,
"pushed_at" : "2021-12-14T05:48:50Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 438135281 ,
"name" : "chk_log4j" ,
"full_name" : "gcmurphy\/chk_log4j" ,
"owner" : {
"login" : "gcmurphy" ,
"id" : 222833 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/222833?v=4" ,
"html_url" : "https:\/\/github.com\/gcmurphy"
} ,
"html_url" : "https:\/\/github.com\/gcmurphy\/chk_log4j" ,
"description" : "Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T05:58:28Z" ,
"updated_at" : "2021-12-14T06:00:30Z" ,
"pushed_at" : "2021-12-14T05:59:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-44228" ,
"jar" ,
"log4j" ,
"log4shell" ,
"rust"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-12-10 15:14:52 +09:00
}
]