PoC-in-GitHub/2021/CVE-2021-44228.json

2392 lines
83 KiB
JSON
Raw Normal View History

2024-06-26 08:47:13 +02:00
[
{
"id": 436666301,
"name": "CVE-2021-44228-Apache-Log4j-Rce",
"full_name": "tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
"owner": {
"login": "tangxiaofeng7",
"id": 45926593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/tangxiaofeng7",
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
"html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
"description": "Apache Log4j 远程代码执行",
"fork": false,
"created_at": "2021-12-09T15:27:38Z",
2024-10-18 14:31:14 +02:00
"updated_at": "2024-10-18T08:19:01Z",
2024-06-26 08:47:13 +02:00
"pushed_at": "2023-05-14T04:54:32Z",
2024-10-18 14:31:14 +02:00
"stargazers_count": 74,
"watchers_count": 74,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-28 13:31:57 +01:00
"forks_count": 26,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-28 13:31:57 +01:00
"forks": 26,
2024-10-18 14:31:14 +02:00
"watchers": 74,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 2
},
{
"id": 436771097,
"name": "Healer",
"full_name": "Glease\/Healer",
"owner": {
"login": "Glease",
"id": 4586901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4586901?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/Glease",
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
"html_url": "https:\/\/github.com\/Glease\/Healer",
"description": "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2",
"fork": false,
"created_at": "2021-12-09T21:49:33Z",
"updated_at": "2024-05-01T13:07:39Z",
"pushed_at": "2023-01-27T17:34:36Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},
{
"id": 436881928,
"name": "CVE-2021-44228",
"full_name": "dbgee\/CVE-2021-44228",
"owner": {
"login": "dbgee",
"id": 46910972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46910972?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/dbgee",
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
"html_url": "https:\/\/github.com\/dbgee\/CVE-2021-44228",
"description": "Apache Log4j 2 a remote code execution vulnerability via the ldap JNDI parser.",
"fork": false,
"created_at": "2021-12-10T06:59:10Z",
"updated_at": "2022-11-09T18:14:39Z",
"pushed_at": "2022-01-19T09:58:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 436918458,
"name": "Log4jPatcher",
"full_name": "CreeperHost\/Log4jPatcher",
"owner": {
"login": "CreeperHost",
"id": 7502613,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7502613?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/CreeperHost",
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
"html_url": "https:\/\/github.com\/CreeperHost\/Log4jPatcher",
"description": "A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)",
"fork": false,
"created_at": "2021-12-10T09:16:46Z",
2024-06-28 14:29:11 +02:00
"updated_at": "2024-06-28T10:26:36Z",
2024-06-26 08:47:13 +02:00
"pushed_at": "2022-11-10T11:16:17Z",
2024-06-28 14:29:11 +02:00
"stargazers_count": 47,
"watchers_count": 47,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"log4j",
"log4j2",
"log4shell"
],
"visibility": "public",
"forks": 6,
2024-06-28 14:29:11 +02:00
"watchers": 47,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 3
},
{
"id": 436974241,
"name": "log4shell-vulnerable-app",
"full_name": "christophetd\/log4shell-vulnerable-app",
"owner": {
"login": "christophetd",
"id": 136675,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/christophetd",
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
"html_url": "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app",
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
2024-10-12 02:29:57 +02:00
"updated_at": "2024-10-11T18:48:29Z",
2024-06-26 08:47:13 +02:00
"pushed_at": "2024-04-26T03:16:26Z",
2024-10-12 02:29:57 +02:00
"stargazers_count": 1106,
"watchers_count": 1106,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-17 02:30:00 +02:00
"forks_count": 532,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"log4shell"
],
"visibility": "public",
2024-10-17 02:30:00 +02:00
"forks": 532,
2024-10-12 02:29:57 +02:00
"watchers": 1106,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 23
},
{
2024-10-29 13:30:55 +01:00
"id": 437124793,
"name": "log4noshell",
"full_name": "winnpixie\/log4noshell",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "winnpixie",
"id": 31022473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4",
"html_url": "https:\/\/github.com\/winnpixie",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/winnpixie\/log4noshell",
"description": "A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 (\"Log4Shell\").",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-10T21:59:31Z",
"updated_at": "2024-08-12T20:18:44Z",
"pushed_at": "2024-05-15T11:27:40Z",
"stargazers_count": 5,
"watchers_count": 5,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 1,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
2024-10-29 13:30:55 +01:00
"apache",
"cve",
2024-06-26 08:47:13 +02:00
"log4j",
2024-10-29 13:30:55 +01:00
"patch",
"security",
"vulnerability"
2024-06-26 08:47:13 +02:00
],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 1,
"watchers": 5,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 1
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437139341,
"name": "log4j-shell-poc",
"full_name": "kozmer\/log4j-shell-poc",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "kozmer",
"id": 87979263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4",
"html_url": "https:\/\/github.com\/kozmer",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/kozmer\/log4j-shell-poc",
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-10-25T17:35:59Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1801,
"watchers_count": 1801,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 525,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"cve-2021-44228",
"java",
"log4j",
"security"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 525,
"watchers": 1801,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 27
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437142312,
"name": "CVE-2021-44228",
"full_name": "racoon-rac\/CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "racoon-rac",
"id": 64579294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4",
"html_url": "https:\/\/github.com\/racoon-rac",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228",
"description": null,
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-10T23:37:55Z",
"updated_at": "2021-12-11T01:11:19Z",
"pushed_at": "2023-08-29T19:02:35Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 0,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 0,
"watchers": 0,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 1
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437215271,
"name": "log4j2burpscanner",
"full_name": "f0ng\/log4j2burpscanner",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "f0ng",
"id": 48286013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4",
"html_url": "https:\/\/github.com\/f0ng",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/f0ng\/log4j2burpscanner",
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-10-14T09:21:30Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 799,
"watchers_count": 799,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 111,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
2024-10-29 13:30:55 +01:00
"burp-extensions",
"burp-plugin",
2024-06-26 08:47:13 +02:00
"log4j2",
2024-10-29 13:30:55 +01:00
"log4jshell"
2024-06-26 08:47:13 +02:00
],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 111,
"watchers": 799,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 11
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437261211,
"name": "CVE-2021-44228-Scanner",
"full_name": "logpresso\/CVE-2021-44228-Scanner",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "logpresso",
"id": 14171714,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14171714?v=4",
"html_url": "https:\/\/github.com\/logpresso",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner",
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2024-10-09T15:12:43Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 851,
"watchers_count": 851,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 175,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
2024-10-29 13:30:55 +01:00
"cve-2021-4104",
"cve-2021-42550",
2024-06-26 08:47:13 +02:00
"cve-2021-44228",
2024-10-29 13:30:55 +01:00
"cve-2021-44832",
"cve-2021-45046",
"cve-2021-45105",
"cve-2022-23302",
"cve-2022-23305",
"cve-2022-23307",
"log4j2",
"patch",
"scanner"
2024-06-26 08:47:13 +02:00
],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 175,
"watchers": 851,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 33
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437265194,
"name": "Log4j_CVE-2021-44228",
"full_name": "vorburger\/Log4j_CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "vorburger",
"id": 298598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/298598?v=4",
"html_url": "https:\/\/github.com\/vorburger",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/vorburger\/Log4j_CVE-2021-44228",
"description": null,
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-11T11:38:16Z",
"updated_at": "2024-08-12T20:18:46Z",
"pushed_at": "2022-02-16T21:58:54Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": true,
"forks_count": 1,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 1,
"watchers": 3,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 3
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437273514,
"name": "CVE-2021-44228-playground",
"full_name": "b-abderrahmane\/CVE-2021-44228-playground",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "b-abderrahmane",
"id": 10504574,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10504574?v=4",
"html_url": "https:\/\/github.com\/b-abderrahmane",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/b-abderrahmane\/CVE-2021-44228-playground",
"description": null,
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2024-04-29T17:48:37Z",
"pushed_at": "2024-10-24T01:49:11Z",
"stargazers_count": 2,
"watchers_count": 2,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 2,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 2,
"watchers": 2,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 3
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437323133,
"name": "JndiRemover",
"full_name": "LemonCraftRu\/JndiRemover",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "LemonCraftRu",
"id": 73554117,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73554117?v=4",
"html_url": "https:\/\/github.com\/LemonCraftRu",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/LemonCraftRu\/JndiRemover",
"description": "Небольшой мод направленный на устранение уязвимости CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-11T15:48:03Z",
"updated_at": "2022-01-08T19:26:15Z",
"pushed_at": "2022-02-07T20:44:48Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
2024-10-29 13:30:55 +01:00
"jndi-exploit",
"log4j",
"minecraft-mod"
2024-06-26 08:47:13 +02:00
],
"visibility": "public",
"forks": 0,
2024-10-29 13:30:55 +01:00
"watchers": 0,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 2
},
{
2024-10-29 13:30:55 +01:00
"id": 437419010,
"name": "log4j-detector",
"full_name": "mergebase\/log4j-detector",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "mergebase",
"id": 73667397,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4",
"html_url": "https:\/\/github.com\/mergebase",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/mergebase\/log4j-detector",
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2024-10-29T01:23:00Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 636,
"watchers_count": 636,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 98,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"cve-2021-44228",
"cve-2021-45046",
"cve-2021-45105",
"cybersecurity",
"detector",
"log4j",
"log4shell",
"pentest",
"sca",
"scanner",
"vulnerability-scanner"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 98,
"watchers": 636,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 28
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437426386,
"name": "hotpatch-for-apache-log4j2",
"full_name": "corretto\/hotpatch-for-apache-log4j2",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "corretto",
"id": 44104058,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44104058?v=4",
"html_url": "https:\/\/github.com\/corretto",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/corretto\/hotpatch-for-apache-log4j2",
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-12T01:24:51Z",
"updated_at": "2024-09-16T19:54:17Z",
"pushed_at": "2022-10-24T02:25:53Z",
"stargazers_count": 493,
"watchers_count": 493,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 72,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 72,
"watchers": 493,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 25
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437526168,
"name": "Log4JShell-Bytecode-Detector",
"full_name": "CodeShield-Security\/Log4JShell-Bytecode-Detector",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "CodeShield-Security",
"id": 60257643,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60257643?v=4",
"html_url": "https:\/\/github.com\/CodeShield-Security",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/CodeShield-Security\/Log4JShell-Bytecode-Detector",
"description": "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-12T11:28:34Z",
"updated_at": "2023-05-10T20:58:01Z",
"pushed_at": "2022-02-23T19:10:53Z",
"stargazers_count": 50,
"watchers_count": 50,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 9,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"bytecode",
"cve-2021-44228",
"log4j2",
"log4jshell",
"log4shell",
"scanner",
"security"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 9,
"watchers": 50,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 8
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437567489,
"name": "CVE-2021-44228_IoCs",
"full_name": "guardicode\/CVE-2021-44228_IoCs",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "guardicode",
"id": 64462782,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64462782?v=4",
"html_url": "https:\/\/github.com\/guardicode",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/guardicode\/CVE-2021-44228_IoCs",
"description": "Known IoCs for log4j framework vulnerability ",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-12T14:27:28Z",
"updated_at": "2022-01-02T08:53:49Z",
"pushed_at": "2022-01-18T13:34:54Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 3,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 3,
"watchers": 0,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 4
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437583301,
"name": "cve-2021-44228-qingteng-online-patch",
"full_name": "qingtengyun\/cve-2021-44228-qingteng-online-patch",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "qingtengyun",
"id": 18526503,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4",
"html_url": "https:\/\/github.com\/qingtengyun",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-online-patch",
"description": "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-12T15:30:55Z",
"updated_at": "2022-11-09T18:14:43Z",
"pushed_at": "2022-01-19T09:07:14Z",
"stargazers_count": 26,
"watchers_count": 26,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 4,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"log4j",
2024-10-29 13:30:55 +01:00
"log4jshell"
2024-06-26 08:47:13 +02:00
],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 4,
"watchers": 26,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 2
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437586734,
"name": "horrors-log4shell",
"full_name": "tasooshi\/horrors-log4shell",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "tasooshi",
"id": 44586478,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44586478?v=4",
"html_url": "https:\/\/github.com\/tasooshi",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/tasooshi\/horrors-log4shell",
"description": "A micro lab for CVE-2021-44228 (log4j)",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-12T15:44:49Z",
"updated_at": "2022-03-15T19:14:39Z",
"pushed_at": "2022-02-22T00:27:58Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 2,
2024-10-29 13:30:55 +01:00
"watchers_count": 2,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"cve-2021-44228",
"log4j",
"log4shell"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
"forks": 1,
2024-10-29 13:30:55 +01:00
"watchers": 2,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 3
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437663314,
"name": "log4j-poc",
"full_name": "cyberxml\/log4j-poc",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "cyberxml",
"id": 10391872,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10391872?v=4",
"html_url": "https:\/\/github.com\/cyberxml",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/cyberxml\/log4j-poc",
"description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-12T21:45:33Z",
"updated_at": "2024-08-12T20:18:50Z",
"pushed_at": "2022-12-21T21:11:58Z",
"stargazers_count": 68,
"watchers_count": 68,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 34,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
2024-10-29 13:30:55 +01:00
"exploit",
"log4j",
2024-06-26 08:47:13 +02:00
"log4shell",
2024-10-29 13:30:55 +01:00
"poc"
2024-06-26 08:47:13 +02:00
],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 34,
"watchers": 68,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 4
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437729997,
"name": "log4j-scan",
"full_name": "fullhunt\/log4j-scan",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "fullhunt",
"id": 34830403,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34830403?v=4",
"html_url": "https:\/\/github.com\/fullhunt",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/fullhunt\/log4j-scan",
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-10-28T12:27:06Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3403,
"watchers_count": 3403,
"has_discussions": true,
"forks_count": 742,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 742,
"watchers": 3403,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 55
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437733080,
"name": "log4j_checker_beta",
"full_name": "rubo77\/log4j_checker_beta",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "rubo77",
"id": 1591563,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1591563?v=4",
"html_url": "https:\/\/github.com\/rubo77",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/rubo77\/log4j_checker_beta",
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T04:14:18Z",
"updated_at": "2024-10-12T16:42:12Z",
"pushed_at": "2022-01-21T11:43:49Z",
"stargazers_count": 250,
"watchers_count": 250,
"has_discussions": true,
"forks_count": 90,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 90,
"watchers": 250,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 8
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437766799,
"name": "Log4j-RCE-Exploiter",
"full_name": "thecyberneh\/Log4j-RCE-Exploiter",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "thecyberneh",
"id": 75005384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75005384?v=4",
"html_url": "https:\/\/github.com\/thecyberneh",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/thecyberneh\/Log4j-RCE-Exploiter",
"description": "Scanner for Log4j RCE CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T06:53:01Z",
"updated_at": "2024-08-12T20:18:51Z",
"pushed_at": "2022-07-06T00:37:55Z",
"stargazers_count": 11,
"watchers_count": 11,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 5,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 5,
"watchers": 11,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 2
},
{
2024-10-29 13:30:55 +01:00
"id": 437771197,
"name": "log4j-cve-code-search-resources",
"full_name": "sourcegraph\/log4j-cve-code-search-resources",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "sourcegraph",
"id": 3979584,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3979584?v=4",
"html_url": "https:\/\/github.com\/sourcegraph",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/sourcegraph\/log4j-cve-code-search-resources",
"description": "Using code search to help fix\/mitigate log4j CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T07:10:11Z",
"updated_at": "2022-11-09T18:14:44Z",
"pushed_at": "2024-04-01T21:00:27Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 4,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 4,
2024-06-26 08:47:13 +02:00
"watchers": 1,
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 40
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437797971,
"name": "Sitecore.Solr-log4j-mitigation",
"full_name": "avwolferen\/Sitecore.Solr-log4j-mitigation",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "avwolferen",
"id": 11447968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11447968?v=4",
"html_url": "https:\/\/github.com\/avwolferen",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/avwolferen\/Sitecore.Solr-log4j-mitigation",
"description": "This repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T08:46:41Z",
"updated_at": "2022-01-05T17:02:45Z",
"pushed_at": "2022-10-19T14:57:20Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 2,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 2,
2024-06-26 08:47:13 +02:00
"watchers": 2,
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 3
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437847140,
"name": "Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228",
"full_name": "LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "LutziGoz",
"id": 45577616,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45577616?v=4",
"html_url": "https:\/\/github.com\/LutziGoz",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228",
"description": null,
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T11:29:57Z",
"updated_at": "2022-08-14T12:05:18Z",
"pushed_at": "2022-02-22T00:21:04Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 437848570,
"name": "Log4Shell",
"full_name": "0xsyr0\/Log4Shell",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "0xsyr0",
"id": 67317571,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67317571?v=4",
"html_url": "https:\/\/github.com\/0xsyr0",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/0xsyr0\/Log4Shell",
"description": "This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T11:34:54Z",
"updated_at": "2024-01-17T16:03:44Z",
"pushed_at": "2024-02-21T15:47:36Z",
"stargazers_count": 8,
"watchers_count": 8,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
2024-10-29 13:30:55 +01:00
"cve",
"cve-2021-44228",
"log4j",
"log4shell"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 2,
"watchers": 8,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 4
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437888133,
"name": "f5-waf-quick-patch-cve-2021-44228",
"full_name": "irgoncalves\/f5-waf-quick-patch-cve-2021-44228",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "irgoncalves",
"id": 23459099,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4",
"html_url": "https:\/\/github.com\/irgoncalves",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/irgoncalves\/f5-waf-quick-patch-cve-2021-44228",
"description": "This tool creates a custom signature set on F5 WAF and apply to policies in blocking mode",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T13:41:39Z",
"updated_at": "2023-02-11T20:16:19Z",
"pushed_at": "2022-05-04T23:49:03Z",
"stargazers_count": 3,
"watchers_count": 3,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 4,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 4,
"watchers": 3,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 1
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 437937629,
"name": "log4j-CVE-2021-44228",
"full_name": "tobiasoed\/log4j-CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "tobiasoed",
"id": 12912943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12912943?v=4",
"html_url": "https:\/\/github.com\/tobiasoed",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/tobiasoed\/log4j-CVE-2021-44228",
"description": null,
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T16:04:54Z",
"updated_at": "2021-12-21T02:30:06Z",
"pushed_at": "2022-02-21T23:45:03Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 437963154,
"name": "cve-2021-44228",
"full_name": "corelight\/cve-2021-44228",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/corelight\/cve-2021-44228",
"description": "Log4j Exploit Detection Logic for Zeek",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T17:25:52Z",
"updated_at": "2024-10-12T10:55:49Z",
"pushed_at": "2024-05-04T18:38:58Z",
"stargazers_count": 19,
"watchers_count": 19,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 8,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"cve-2021-44228",
"zeek"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 8,
"watchers": 19,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 12
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438034703,
"name": "log4shell-tools",
"full_name": "alexbakker\/log4shell-tools",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "alexbakker",
"id": 2387841,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4",
"html_url": "https:\/\/github.com\/alexbakker",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/alexbakker\/log4shell-tools",
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-13T21:47:41Z",
"updated_at": "2024-10-28T07:04:55Z",
"pushed_at": "2024-04-07T22:45:53Z",
"stargazers_count": 86,
"watchers_count": 86,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 16,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"cve-2021-44228",
"cve-2021-45046",
"dns",
"jndi",
"ldap",
"log4j",
"log4shell"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 16,
"watchers": 86,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 4
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438144746,
"name": "LogMePwn",
"full_name": "0xInfection\/LogMePwn",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "0xInfection",
"id": 39941993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39941993?v=4",
"html_url": "https:\/\/github.com\/0xInfection",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/0xInfection\/LogMePwn",
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2024-10-16T21:23:22Z",
"pushed_at": "2024-04-24T05:35:26Z",
"stargazers_count": 385,
"watchers_count": 385,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 52,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"cve-2021-44228",
"internet-scanning",
"log4j",
"rce-scanner",
"vulnerability-scanners"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 52,
"watchers": 385,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 12
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438203240,
"name": "log4j-finder",
"full_name": "fox-it\/log4j-finder",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "fox-it",
"id": 468621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/468621?v=4",
"html_url": "https:\/\/github.com\/fox-it",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/fox-it\/log4j-finder",
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2024-10-03T05:15:58Z",
"pushed_at": "2022-12-27T17:57:19Z",
"stargazers_count": 435,
"watchers_count": 435,
"has_discussions": true,
"forks_count": 97,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
2024-10-29 13:30:55 +01:00
"cve-2021-45046",
"cve-2021-45105",
"log4j",
"log4j-finder",
2024-06-26 08:47:13 +02:00
"log4j2",
2024-10-29 13:30:55 +01:00
"log4shell",
"python"
2024-06-26 08:47:13 +02:00
],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 97,
"watchers": 435,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 21
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438409343,
"name": "log4j-remediation-tools",
"full_name": "stripe\/log4j-remediation-tools",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "stripe",
"id": 856813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/856813?v=4",
"html_url": "https:\/\/github.com\/stripe",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/stripe\/log4j-remediation-tools",
"description": "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-14T21:47:04Z",
"updated_at": "2024-08-18T16:13:22Z",
"pushed_at": "2023-03-21T09:51:33Z",
"stargazers_count": 41,
"watchers_count": 41,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 9,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"log4j2",
"remediation",
"tools"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 9,
"watchers": 41,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 9
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438418716,
"name": "log4shell-finder",
"full_name": "HynekPetrak\/log4shell-finder",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "HynekPetrak",
"id": 8593983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8593983?v=4",
"html_url": "https:\/\/github.com\/HynekPetrak",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/HynekPetrak\/log4shell-finder",
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2024-09-10T05:00:03Z",
"pushed_at": "2023-06-21T11:37:03Z",
"stargazers_count": 38,
"watchers_count": 38,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 14,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
2024-10-29 13:30:55 +01:00
"cve-2017-5645",
"cve-2019-17571",
"cve-2020-9488",
"cve-2021-4104",
"cve-2021-42550",
2024-06-26 08:47:13 +02:00
"cve-2021-44228",
2024-10-29 13:30:55 +01:00
"cve-2021-44832",
2024-06-26 08:47:13 +02:00
"cve-2021-45046",
2024-10-29 13:30:55 +01:00
"cve-2021-45105",
"cve-2022-23302",
"cve-2022-23305",
"cve-2022-23307",
2024-06-26 08:47:13 +02:00
"log4j",
2024-10-29 13:30:55 +01:00
"log4j2",
2024-06-26 08:47:13 +02:00
"log4shell",
2024-10-29 13:30:55 +01:00
"scanner",
"security",
"vulnerability"
2024-06-26 08:47:13 +02:00
],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 14,
"watchers": 38,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 5
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438432868,
"name": "CVE-2021-44228_scanner",
"full_name": "CERTCC\/CVE-2021-44228_scanner",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "CERTCC",
"id": 37221555,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37221555?v=4",
"html_url": "https:\/\/github.com\/CERTCC",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/CERTCC\/CVE-2021-44228_scanner",
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
"updated_at": "2024-10-15T07:29:40Z",
"pushed_at": "2022-03-23T18:12:51Z",
"stargazers_count": 344,
"watchers_count": 344,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 89,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 89,
"watchers": 344,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 35
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438504265,
"name": "log4j-vul",
"full_name": "bhprin\/log4j-vul",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "bhprin",
"id": 1876456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1876456?v=4",
"html_url": "https:\/\/github.com\/bhprin",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/bhprin\/log4j-vul",
"description": "This project is just to show Apache Log4j2 Vulnerability - aka CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-15T05:19:13Z",
"updated_at": "2021-12-22T04:39:30Z",
"pushed_at": "2023-01-31T08:17:43Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 438664340,
"name": "log4j-vuln-coverage-check",
"full_name": "MeterianHQ\/log4j-vuln-coverage-check",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "MeterianHQ",
"id": 28596672,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28596672?v=4",
"html_url": "https:\/\/github.com\/MeterianHQ",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/MeterianHQ\/log4j-vuln-coverage-check",
"description": "A simple project to check coverage of Log4J vuln CVE-2021-44228 (and related)",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-15T14:44:14Z",
"updated_at": "2021-12-16T14:00:05Z",
"pushed_at": "2022-12-01T09:18:05Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 1,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 1,
"watchers": 0,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 3
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438689577,
"name": "Log4j",
"full_name": "isuruwa\/Log4j",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "isuruwa",
"id": 72663288,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72663288?v=4",
"html_url": "https:\/\/github.com\/isuruwa",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/isuruwa\/Log4j",
"description": "A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228 ",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-15T16:01:36Z",
"updated_at": "2024-08-12T20:18:56Z",
"pushed_at": "2022-08-06T15:26:04Z",
"stargazers_count": 6,
"watchers_count": 6,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 2,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"cve-2021-44228",
"java",
"log4j"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 2,
"watchers": 6,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 2
},
{
2024-10-29 13:30:55 +01:00
"id": 438695688,
"name": "checkmk-log4j-scanner",
"full_name": "inettgmbh\/checkmk-log4j-scanner",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "inettgmbh",
"id": 12827152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12827152?v=4",
"html_url": "https:\/\/github.com\/inettgmbh",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/inettgmbh\/checkmk-log4j-scanner",
"description": "Scans for Log4j versions effected by CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-15T16:21:26Z",
"updated_at": "2024-05-13T12:42:03Z",
"pushed_at": "2024-05-13T12:44:51Z",
"stargazers_count": 4,
"watchers_count": 4,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 2,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
2024-10-29 13:30:55 +01:00
"checkmk",
"log4j"
2024-06-26 08:47:13 +02:00
],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 2,
"watchers": 4,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 4
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438761150,
"name": "kubernetes-log4j-cve-2021-44228-node-agent",
"full_name": "aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "aws-samples",
"id": 8931462,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931462?v=4",
"html_url": "https:\/\/github.com\/aws-samples",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent",
"description": null,
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-15T20:17:41Z",
"updated_at": "2023-10-19T15:47:11Z",
"pushed_at": "2022-08-26T14:56:01Z",
"stargazers_count": 2,
"watchers_count": 2,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 18,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 18,
"watchers": 2,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 7
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438773632,
"name": "Log4Shell-Honeypot",
"full_name": "michaelsanford\/Log4Shell-Honeypot",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "michaelsanford",
"id": 1800499,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1800499?v=4",
"html_url": "https:\/\/github.com\/michaelsanford",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/michaelsanford\/Log4Shell-Honeypot",
"description": "Dockerized honeypot for CVE-2021-44228.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-15T21:09:00Z",
"updated_at": "2023-06-22T04:46:02Z",
"pushed_at": "2024-10-03T11:20:08Z",
"stargazers_count": 4,
"watchers_count": 4,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"cve-2021-44228",
"docker",
"honeypot",
"python"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
"forks": 0,
2024-10-29 13:30:55 +01:00
"watchers": 4,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 3
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438791130,
"name": "Log4Pot",
"full_name": "thomaspatzke\/Log4Pot",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "thomaspatzke",
"id": 1845601,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1845601?v=4",
"html_url": "https:\/\/github.com\/thomaspatzke",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/thomaspatzke\/Log4Pot",
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-15T22:30:34Z",
"updated_at": "2024-09-21T11:37:46Z",
"pushed_at": "2022-04-26T14:30:54Z",
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": true,
"forks_count": 27,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 27,
"watchers": 90,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 7
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438940454,
"name": "log4j-Scan-Burpsuite",
"full_name": "snow0715\/log4j-Scan-Burpsuite",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "snow0715",
"id": 54879520,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54879520?v=4",
"html_url": "https:\/\/github.com\/snow0715",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/snow0715\/log4j-Scan-Burpsuite",
"description": "Log4j漏洞CVE-2021-44228的Burpsuite检测插件",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-16T09:58:02Z",
"updated_at": "2024-04-07T08:54:48Z",
"pushed_at": "2022-01-26T03:51:30Z",
"stargazers_count": 13,
"watchers_count": 13,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
2024-10-29 13:30:55 +01:00
"watchers": 13,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 438951347,
"name": "Log4j-Windows-Scanner",
"full_name": "Joefreedy\/Log4j-Windows-Scanner",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "Joefreedy",
"id": 47759132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47759132?v=4",
"html_url": "https:\/\/github.com\/Joefreedy",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/Joefreedy\/Log4j-Windows-Scanner",
"description": "CVE-2021-44228 vulnerability in Apache Log4j library | Log4j vulnerability scanner on Windows machines.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-16T10:37:16Z",
"updated_at": "2022-03-29T19:51:54Z",
"pushed_at": "2022-10-05T11:18:26Z",
"stargazers_count": 3,
"watchers_count": 3,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-10-29 13:30:55 +01:00
"watchers": 3,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 3
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 438985997,
"name": "log4shell-demo",
"full_name": "korteke\/log4shell-demo",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "korteke",
"id": 2558348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2558348?v=4",
"html_url": "https:\/\/github.com\/korteke",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/korteke\/log4shell-demo",
"description": "Simple webapp that is vulnerable to Log4Shell (CVE-2021-44228)",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-16T12:44:24Z",
"updated_at": "2021-12-22T12:14:02Z",
"pushed_at": "2023-02-13T22:30:21Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 5,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 5,
2024-06-26 08:47:13 +02:00
"watchers": 1,
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 2
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 439018822,
"name": "log4j-filescan",
"full_name": "andalik\/log4j-filescan",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "andalik",
"id": 12278569,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12278569?v=4",
"html_url": "https:\/\/github.com\/andalik",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/andalik\/log4j-filescan",
"description": "Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-16T14:29:05Z",
"updated_at": "2022-03-05T22:52:28Z",
"pushed_at": "2022-03-05T23:01:15Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 2
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 439129728,
"name": "CVE-2021-44228",
"full_name": "Kr0ff\/CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "Kr0ff",
"id": 35173514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4",
"html_url": "https:\/\/github.com\/Kr0ff",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/Kr0ff\/CVE-2021-44228",
"description": "Log4Shell Proof of Concept (CVE-2021-44228)",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-16T21:19:17Z",
"updated_at": "2023-08-15T12:51:08Z",
"pushed_at": "2022-04-21T13:23:40Z",
"stargazers_count": 4,
"watchers_count": 4,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-10-29 13:30:55 +01:00
"watchers": 4,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 439430099,
"name": "CVE-2021-44228-VULN-APP",
"full_name": "nu11secur1ty\/CVE-2021-44228-VULN-APP",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "nu11secur1ty",
"id": 3677559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3677559?v=4",
"html_url": "https:\/\/github.com\/nu11secur1ty",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/nu11secur1ty\/CVE-2021-44228-VULN-APP",
"description": null,
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-17T18:45:19Z",
"updated_at": "2024-08-12T20:18:58Z",
"pushed_at": "2023-02-22T12:12:51Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 4,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 4,
"watchers": 0,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 2
},
{
2024-10-29 13:30:55 +01:00
"id": 439496578,
"name": "PowerShell-Log4J-Scanner",
"full_name": "DANSI\/PowerShell-Log4J-Scanner",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "DANSI",
"id": 4057240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4057240?v=4",
"html_url": "https:\/\/github.com\/DANSI",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/DANSI\/PowerShell-Log4J-Scanner",
"description": "can find, analyse and patch Log4J files because of CVE-2021-44228, CVE-2021-45046",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-18T00:51:46Z",
"updated_at": "2021-12-31T13:32:41Z",
"pushed_at": "2022-03-29T21:43:32Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [],
2024-06-26 08:47:13 +02:00
"visibility": "public",
"forks": 0,
2024-10-29 13:30:55 +01:00
"watchers": 0,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 439712818,
"name": "log4j-2021-vulnerability-study",
"full_name": "otaviokr\/log4j-2021-vulnerability-study",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "otaviokr",
"id": 3641421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3641421?v=4",
"html_url": "https:\/\/github.com\/otaviokr",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/otaviokr\/log4j-2021-vulnerability-study",
"description": "This is a showcase how the Log4J vulnerability (CVE-2021-44228) could be explored. This code is safe to run, but understand what it does and how it works!",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-18T20:53:06Z",
"updated_at": "2022-01-22T01:46:53Z",
"pushed_at": "2022-01-22T01:46:50Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [],
2024-06-26 08:47:13 +02:00
"visibility": "public",
"forks": 0,
2024-10-29 13:30:55 +01:00
"watchers": 0,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 2
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 440009725,
"name": "f-for-java",
"full_name": "TotallyNotAHaxxer\/f-for-java",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "TotallyNotAHaxxer",
"id": 87203697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87203697?v=4",
"html_url": "https:\/\/github.com\/TotallyNotAHaxxer",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/TotallyNotAHaxxer\/f-for-java",
"description": "a project written in go and java i abandoned for CVE-2021-44228 try to fix it if you can XD",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-20T01:31:06Z",
"updated_at": "2021-12-24T18:06:45Z",
"pushed_at": "2022-12-16T03:57:25Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 440216413,
"name": "Log4j-Scanner-Exploit",
"full_name": "julian911015\/Log4j-Scanner-Exploit",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "julian911015",
"id": 26369589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26369589?v=4",
"html_url": "https:\/\/github.com\/julian911015",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/julian911015\/Log4j-Scanner-Exploit",
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-20T15:22:50Z",
"updated_at": "2024-09-19T08:09:04Z",
"pushed_at": "2024-09-03T15:22:31Z",
"stargazers_count": 29,
"watchers_count": 29,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 5,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 5,
"watchers": 29,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 2
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 440220972,
"name": "CVE-2021-44228---detection-with-PowerShell",
"full_name": "intel-xeon\/CVE-2021-44228---detection-with-PowerShell",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "intel-xeon",
"id": 37773731,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37773731?v=4",
"html_url": "https:\/\/github.com\/intel-xeon",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/intel-xeon\/CVE-2021-44228---detection-with-PowerShell",
"description": null,
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-20T15:38:07Z",
"updated_at": "2021-12-23T13:23:27Z",
"pushed_at": "2022-06-24T08:00:16Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 440261792,
"name": "TekiumLog4jApp",
"full_name": "erickrr-bd\/TekiumLog4jApp",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "erickrr-bd",
"id": 77643346,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77643346?v=4",
"html_url": "https:\/\/github.com\/erickrr-bd",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/erickrr-bd\/TekiumLog4jApp",
"description": "Java application vulnerable to CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-20T17:59:56Z",
"updated_at": "2022-02-15T20:16:38Z",
"pushed_at": "2022-03-01T00:00:00Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"app",
"cve-2021-44228",
"docker",
"exploitation",
"java",
"jndi",
"log4j2",
"security",
"vulnerability"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 1
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 440373235,
"name": "loguccino",
"full_name": "sassoftware\/loguccino",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "sassoftware",
"id": 5289877,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5289877?v=4",
"html_url": "https:\/\/github.com\/sassoftware",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/sassoftware\/loguccino",
"description": "Scan and patch tool for CVE-2021-44228 and related log4j concerns. ",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-21T03:01:36Z",
"updated_at": "2024-05-15T16:42:25Z",
"pushed_at": "2022-01-24T16:43:41Z",
"stargazers_count": 34,
"watchers_count": 34,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 5,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 5,
"watchers": 34,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 16
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 440601926,
"name": "log4j2-hack-springboot",
"full_name": "rejupillai\/log4j2-hack-springboot",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "rejupillai",
"id": 15153045,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15153045?v=4",
"html_url": "https:\/\/github.com\/rejupillai",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/rejupillai\/log4j2-hack-springboot",
"description": "Log4j2 CVE-2021-44228 hack demo for a springboot app",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-21T17:40:02Z",
"updated_at": "2021-12-21T19:26:23Z",
"pushed_at": "2023-03-22T05:52:51Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 0,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 0,
2024-06-26 08:47:13 +02:00
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
2024-10-29 13:30:55 +01:00
"id": 440722343,
"name": "Log4Shell-CVE-2021-44228-Demo",
"full_name": "BabooPan\/Log4Shell-CVE-2021-44228-Demo",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "BabooPan",
"id": 16317991,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16317991?v=4",
"html_url": "https:\/\/github.com\/BabooPan",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/BabooPan\/Log4Shell-CVE-2021-44228-Demo",
"description": "Log4Shell Demo with AWS",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-22T03:34:40Z",
"updated_at": "2024-03-12T11:31:53Z",
"pushed_at": "2022-03-28T06:49:06Z",
"stargazers_count": 2,
"watchers_count": 2,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 1,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 1,
"watchers": 2,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 1
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 441470836,
"name": "Log4jUnifi",
"full_name": "puzzlepeaches\/Log4jUnifi",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "puzzlepeaches",
"id": 8538866,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
"html_url": "https:\/\/github.com\/puzzlepeaches",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jUnifi",
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2024-10-01T02:26:33Z",
"pushed_at": "2024-01-04T17:12:05Z",
"stargazers_count": 142,
"watchers_count": 142,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 29,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 29,
"watchers": 142,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 6
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 441540913,
"name": "CVE-2021-44228",
"full_name": "marcourbano\/CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "marcourbano",
"id": 22402683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22402683?v=4",
"html_url": "https:\/\/github.com\/marcourbano",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/marcourbano\/CVE-2021-44228",
"description": "PoC for CVE-2021-44228.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-24T19:26:36Z",
"updated_at": "2024-04-19T14:48:49Z",
"pushed_at": "2022-09-22T19:16:07Z",
"stargazers_count": 6,
"watchers_count": 6,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 6,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 6,
"watchers": 6,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 441545718,
"name": "log4shell-vulnerable-app",
"full_name": "bsigouin\/log4shell-vulnerable-app",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "bsigouin",
"id": 48130586,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48130586?v=4",
"html_url": "https:\/\/github.com\/bsigouin",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/bsigouin\/log4shell-vulnerable-app",
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-24T20:00:12Z",
"updated_at": "2022-01-06T13:31:29Z",
"pushed_at": "2023-01-20T17:03:41Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 0
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 442033629,
"name": "ModSec-log4j2",
"full_name": "felipe8398\/ModSec-log4j2",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "felipe8398",
"id": 24979677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24979677?v=4",
"html_url": "https:\/\/github.com\/felipe8398",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/felipe8398\/ModSec-log4j2",
"description": "Regra ModSec para proteção log4j2 - CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-27T02:53:24Z",
"updated_at": "2022-06-19T02:08:13Z",
"pushed_at": "2022-03-10T22:09:11Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"docker"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 442073643,
"name": "log4j-vulnerability",
"full_name": "mazhar-hassan\/log4j-vulnerability",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "mazhar-hassan",
"id": 32394814,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32394814?v=4",
"html_url": "https:\/\/github.com\/mazhar-hassan",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/mazhar-hassan\/log4j-vulnerability",
"description": "Log4Shell (CVE-2021-44228) is a zero-day vulnerability in Log4j",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-27T06:39:40Z",
"updated_at": "2021-12-27T09:33:39Z",
"pushed_at": "2022-08-23T13:47:26Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 442217104,
"name": "l4s_poc",
"full_name": "s-retlaw\/l4s_poc",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "s-retlaw",
"id": 73955369,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4",
"html_url": "https:\/\/github.com\/s-retlaw",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/s-retlaw\/l4s_poc",
"description": "Log4Shell (Cve-2021-44228) Proof Of Concept",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-27T16:45:58Z",
"updated_at": "2022-01-04T14:50:09Z",
"pushed_at": "2023-07-25T20:05:40Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 0,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 0,
"watchers": 0,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 2
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 442317732,
"name": "Vm4J",
"full_name": "NS-Sp4ce\/Vm4J",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "NS-Sp4ce",
"id": 33349032,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4",
"html_url": "https:\/\/github.com\/NS-Sp4ce",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/NS-Sp4ce\/Vm4J",
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2024-10-24T12:12:26Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 204,
"watchers_count": 204,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 13:30:55 +01:00
"forks_count": 39,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-10-29 13:30:55 +01:00
"topics": [
"cve-2021-44228",
"log4j2-exp",
"log4shell",
"vmsa-2021-0028"
],
2024-06-26 08:47:13 +02:00
"visibility": "public",
2024-10-29 13:30:55 +01:00
"forks": 39,
"watchers": 204,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 5
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 443422203,
"name": "log4shell-vulnerable-app",
"full_name": "romanutti\/log4shell-vulnerable-app",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "romanutti",
"id": 36601005,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36601005?v=4",
"html_url": "https:\/\/github.com\/romanutti",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/romanutti\/log4shell-vulnerable-app",
"description": "This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as log4shell.",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2021-12-31T20:39:44Z",
"updated_at": "2022-01-01T10:57:33Z",
"pushed_at": "2022-05-10T17:20:17Z",
2024-06-26 08:47:13 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-10-29 13:30:55 +01:00
"subscribers_count": 2
2024-06-26 08:47:13 +02:00
},
{
2024-10-29 13:30:55 +01:00
"id": 563424783,
"name": "CVE-2021-44228",
"full_name": "srcporter\/CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "srcporter",
"id": 42175824,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42175824?v=4",
"html_url": "https:\/\/github.com\/srcporter",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/srcporter\/CVE-2021-44228",
"description": "DO NOT USE FOR ANYTHING REAL. Simple springboot sample app with vulnerability CVE-2021-44228 aka \"Log4Shell\" ",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2022-11-08T15:29:42Z",
"updated_at": "2024-08-22T18:40:38Z",
"pushed_at": "2024-08-22T18:40:35Z",
"stargazers_count": 1,
"watchers_count": 1,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-10-29 13:30:55 +01:00
"watchers": 1,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 1
},
{
2024-10-29 13:30:55 +01:00
"id": 725731160,
"name": "log4shell_lab",
"full_name": "ShlomiRex\/log4shell_lab",
2024-06-26 08:47:13 +02:00
"owner": {
2024-10-29 13:30:55 +01:00
"login": "ShlomiRex",
"id": 17744127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17744127?v=4",
"html_url": "https:\/\/github.com\/ShlomiRex",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
2024-10-29 13:30:55 +01:00
"html_url": "https:\/\/github.com\/ShlomiRex\/log4shell_lab",
"description": "CVE-2021-44228",
2024-06-26 08:47:13 +02:00
"fork": false,
2024-10-29 13:30:55 +01:00
"created_at": "2023-11-30T18:55:40Z",
"updated_at": "2024-07-15T07:35:10Z",
"pushed_at": "2024-07-15T07:35:07Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-10-29 13:30:55 +01:00
"watchers": 0,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 1
2024-07-27 02:29:42 +02:00
},
{
"id": 834267924,
"name": "CVE-2021-44228",
"full_name": "asd58584388\/CVE-2021-44228",
"owner": {
"login": "asd58584388",
"id": 43491476,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43491476?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/asd58584388",
"user_view_type": "public"
2024-07-27 02:29:42 +02:00
},
"html_url": "https:\/\/github.com\/asd58584388\/CVE-2021-44228",
"description": "CVE-2021-44228 vulnerability study",
"fork": false,
"created_at": "2024-07-26T19:59:47Z",
"updated_at": "2024-07-26T20:57:53Z",
"pushed_at": "2024-07-26T20:57:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-08-10 02:31:37 +02:00
"subscribers_count": 1
2024-09-11 08:30:05 +02:00
},
{
"id": 855503144,
"name": "CVE-2021-44228-Log4Shell-",
"full_name": "OtisSymbos\/CVE-2021-44228-Log4Shell-",
"owner": {
"login": "OtisSymbos",
"id": 78093502,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78093502?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/OtisSymbos",
"user_view_type": "public"
2024-09-11 08:30:05 +02:00
},
"html_url": "https:\/\/github.com\/OtisSymbos\/CVE-2021-44228-Log4Shell-",
"description": null,
"fork": false,
"created_at": "2024-09-11T01:13:35Z",
"updated_at": "2024-09-11T01:20:42Z",
"pushed_at": "2024-09-11T01:14:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-09-12 08:29:43 +02:00
"subscribers_count": 1
2024-09-11 08:30:05 +02:00
},
{
"id": 855573158,
"name": "log4j-shell-poc",
"full_name": "safeer-accuknox\/log4j-shell-poc",
"owner": {
"login": "safeer-accuknox",
"id": 180378107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/safeer-accuknox",
"user_view_type": "public"
2024-09-11 08:30:05 +02:00
},
"html_url": "https:\/\/github.com\/safeer-accuknox\/log4j-shell-poc",
"description": "Log4J exploit CVE-2021-44228",
"fork": false,
"created_at": "2024-09-11T05:06:50Z",
2024-09-11 14:30:33 +02:00
"updated_at": "2024-09-11T09:39:58Z",
"pushed_at": "2024-09-11T09:39:55Z",
2024-09-11 08:30:05 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-09-12 08:29:43 +02:00
"subscribers_count": 1
2024-10-08 20:31:24 +02:00
},
{
"id": 869690102,
"name": "TPASLog4ShellPoC",
"full_name": "Carlos-Mesquita\/TPASLog4ShellPoC",
"owner": {
"login": "Carlos-Mesquita",
"id": 75860783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75860783?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/Carlos-Mesquita",
"user_view_type": "public"
2024-10-08 20:31:24 +02:00
},
"html_url": "https:\/\/github.com\/Carlos-Mesquita\/TPASLog4ShellPoC",
"description": "Proof of Concept (PoC) for the Log4Shell vulnerability (CVE-2021-44228), developed as part of the coursework for the curricular unit TPAS in the Master's degree in Information Security at FCUP.",
"fork": false,
"created_at": "2024-10-08T18:07:21Z",
2024-10-10 20:30:32 +02:00
"updated_at": "2024-10-10T14:53:56Z",
2024-10-09 02:30:25 +02:00
"pushed_at": "2024-10-08T18:19:15Z",
2024-10-10 20:30:32 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2024-10-08 20:31:24 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-10-10 20:30:32 +02:00
"watchers": 1,
2024-10-08 20:31:24 +02:00
"score": 0,
2024-10-09 02:30:25 +02:00
"subscribers_count": 1
2024-06-26 08:47:13 +02:00
}
]