2024-06-26 08:47:13 +02:00
[
{
"id" : 436666301 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce" ,
"full_name" : "tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce" ,
"owner" : {
"login" : "tangxiaofeng7" ,
"id" : 45926593 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/tangxiaofeng7" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce" ,
"description" : "Apache Log4j 远程代码执行" ,
"fork" : false ,
"created_at" : "2021-12-09T15:27:38Z" ,
2024-10-18 14:31:14 +02:00
"updated_at" : "2024-10-18T08:19:01Z" ,
2024-06-26 08:47:13 +02:00
"pushed_at" : "2023-05-14T04:54:32Z" ,
2024-10-18 14:31:14 +02:00
"stargazers_count" : 74 ,
"watchers_count" : 74 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-28 13:31:57 +01:00
"forks_count" : 26 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-28 13:31:57 +01:00
"forks" : 26 ,
2024-10-18 14:31:14 +02:00
"watchers" : 74 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 436771097 ,
"name" : "Healer" ,
"full_name" : "Glease\/Healer" ,
"owner" : {
"login" : "Glease" ,
"id" : 4586901 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4586901?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/Glease" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/Glease\/Healer" ,
"description" : "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2" ,
"fork" : false ,
"created_at" : "2021-12-09T21:49:33Z" ,
"updated_at" : "2024-05-01T13:07:39Z" ,
"pushed_at" : "2023-01-27T17:34:36Z" ,
"stargazers_count" : 18 ,
"watchers_count" : 18 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 18 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 436881928 ,
"name" : "CVE-2021-44228" ,
"full_name" : "dbgee\/CVE-2021-44228" ,
"owner" : {
"login" : "dbgee" ,
"id" : 46910972 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46910972?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/dbgee" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/dbgee\/CVE-2021-44228" ,
"description" : "Apache Log4j 2 a remote code execution vulnerability via the ldap JNDI parser." ,
"fork" : false ,
"created_at" : "2021-12-10T06:59:10Z" ,
"updated_at" : "2022-11-09T18:14:39Z" ,
"pushed_at" : "2022-01-19T09:58:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 436918458 ,
"name" : "Log4jPatcher" ,
"full_name" : "CreeperHost\/Log4jPatcher" ,
"owner" : {
"login" : "CreeperHost" ,
"id" : 7502613 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7502613?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/CreeperHost" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/CreeperHost\/Log4jPatcher" ,
"description" : "A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)" ,
"fork" : false ,
"created_at" : "2021-12-10T09:16:46Z" ,
2024-06-28 14:29:11 +02:00
"updated_at" : "2024-06-28T10:26:36Z" ,
2024-06-26 08:47:13 +02:00
"pushed_at" : "2022-11-10T11:16:17Z" ,
2024-06-28 14:29:11 +02:00
"stargazers_count" : 47 ,
"watchers_count" : 47 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4j2" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 6 ,
2024-06-28 14:29:11 +02:00
"watchers" : 47 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 436974241 ,
"name" : "log4shell-vulnerable-app" ,
"full_name" : "christophetd\/log4shell-vulnerable-app" ,
"owner" : {
"login" : "christophetd" ,
"id" : 136675 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/christophetd" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app" ,
"description" : "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228)." ,
"fork" : false ,
"created_at" : "2021-12-10T12:38:20Z" ,
2024-10-12 02:29:57 +02:00
"updated_at" : "2024-10-11T18:48:29Z" ,
2024-06-26 08:47:13 +02:00
"pushed_at" : "2024-04-26T03:16:26Z" ,
2024-10-12 02:29:57 +02:00
"stargazers_count" : 1106 ,
"watchers_count" : 1106 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-17 02:30:00 +02:00
"forks_count" : 532 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"log4shell"
] ,
"visibility" : "public" ,
2024-10-17 02:30:00 +02:00
"forks" : 532 ,
2024-10-12 02:29:57 +02:00
"watchers" : 1106 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 23
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437124793 ,
"name" : "log4noshell" ,
"full_name" : "winnpixie\/log4noshell" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "winnpixie" ,
"id" : 31022473 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4" ,
"html_url" : "https:\/\/github.com\/winnpixie" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/winnpixie\/log4noshell" ,
"description" : "A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 (\"Log4Shell\")." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-10T21:59:31Z" ,
"updated_at" : "2024-08-12T20:18:44Z" ,
"pushed_at" : "2024-05-15T11:27:40Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 1 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
2024-10-29 13:30:55 +01:00
"apache" ,
"cve" ,
2024-06-26 08:47:13 +02:00
"log4j" ,
2024-10-29 13:30:55 +01:00
"patch" ,
"security" ,
"vulnerability"
2024-06-26 08:47:13 +02:00
] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 1 ,
"watchers" : 5 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 1
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437139341 ,
"name" : "log4j-shell-poc" ,
"full_name" : "kozmer\/log4j-shell-poc" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "kozmer" ,
"id" : 87979263 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4" ,
"html_url" : "https:\/\/github.com\/kozmer" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/kozmer\/log4j-shell-poc" ,
"description" : "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. " ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-10T23:19:28Z" ,
"updated_at" : "2024-10-25T17:35:59Z" ,
"pushed_at" : "2024-02-12T22:37:25Z" ,
"stargazers_count" : 1801 ,
"watchers_count" : 1801 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 525 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"cve-2021-44228" ,
"java" ,
"log4j" ,
"security"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 525 ,
"watchers" : 1801 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 27
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437142312 ,
"name" : "CVE-2021-44228" ,
"full_name" : "racoon-rac\/CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "racoon-rac" ,
"id" : 64579294 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4" ,
"html_url" : "https:\/\/github.com\/racoon-rac" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/racoon-rac\/CVE-2021-44228" ,
"description" : null ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-10T23:37:55Z" ,
"updated_at" : "2021-12-11T01:11:19Z" ,
"pushed_at" : "2023-08-29T19:02:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 0 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [ ] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 0 ,
"watchers" : 0 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 1
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437215271 ,
"name" : "log4j2burpscanner" ,
"full_name" : "f0ng\/log4j2burpscanner" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "f0ng" ,
"id" : 48286013 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4" ,
"html_url" : "https:\/\/github.com\/f0ng" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/f0ng\/log4j2burpscanner" ,
"description" : "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-11T07:19:11Z" ,
"updated_at" : "2024-10-14T09:21:30Z" ,
"pushed_at" : "2023-06-13T09:17:54Z" ,
"stargazers_count" : 799 ,
"watchers_count" : 799 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 111 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
2024-10-29 13:30:55 +01:00
"burp-extensions" ,
"burp-plugin" ,
2024-06-26 08:47:13 +02:00
"log4j2" ,
2024-10-29 13:30:55 +01:00
"log4jshell"
2024-06-26 08:47:13 +02:00
] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 111 ,
"watchers" : 799 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 11
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437261211 ,
"name" : "CVE-2021-44228-Scanner" ,
"full_name" : "logpresso\/CVE-2021-44228-Scanner" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "logpresso" ,
"id" : 14171714 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14171714?v=4" ,
"html_url" : "https:\/\/github.com\/logpresso" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner" ,
"description" : "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-11T11:18:46Z" ,
"updated_at" : "2024-10-09T15:12:43Z" ,
"pushed_at" : "2022-04-07T14:47:03Z" ,
"stargazers_count" : 851 ,
"watchers_count" : 851 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 175 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
2024-10-29 13:30:55 +01:00
"cve-2021-4104" ,
"cve-2021-42550" ,
2024-06-26 08:47:13 +02:00
"cve-2021-44228" ,
2024-10-29 13:30:55 +01:00
"cve-2021-44832" ,
"cve-2021-45046" ,
"cve-2021-45105" ,
"cve-2022-23302" ,
"cve-2022-23305" ,
"cve-2022-23307" ,
"log4j2" ,
"patch" ,
"scanner"
2024-06-26 08:47:13 +02:00
] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 175 ,
"watchers" : 851 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 33
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437265194 ,
"name" : "Log4j_CVE-2021-44228" ,
"full_name" : "vorburger\/Log4j_CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "vorburger" ,
"id" : 298598 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/298598?v=4" ,
"html_url" : "https:\/\/github.com\/vorburger" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/vorburger\/Log4j_CVE-2021-44228" ,
"description" : null ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-11T11:38:16Z" ,
"updated_at" : "2024-08-12T20:18:46Z" ,
"pushed_at" : "2022-02-16T21:58:54Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : true ,
"forks_count" : 1 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 1 ,
"watchers" : 3 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 3
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437273514 ,
"name" : "CVE-2021-44228-playground" ,
"full_name" : "b-abderrahmane\/CVE-2021-44228-playground" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "b-abderrahmane" ,
"id" : 10504574 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10504574?v=4" ,
"html_url" : "https:\/\/github.com\/b-abderrahmane" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/b-abderrahmane\/CVE-2021-44228-playground" ,
"description" : null ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-11T12:16:45Z" ,
"updated_at" : "2024-04-29T17:48:37Z" ,
"pushed_at" : "2024-10-24T01:49:11Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 2 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 2 ,
"watchers" : 2 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 3
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437323133 ,
"name" : "JndiRemover" ,
"full_name" : "LemonCraftRu\/JndiRemover" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "LemonCraftRu" ,
"id" : 73554117 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73554117?v=4" ,
"html_url" : "https:\/\/github.com\/LemonCraftRu" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/LemonCraftRu\/JndiRemover" ,
"description" : "Небольшой мод направленный на устранение уязвимости CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-11T15:48:03Z" ,
"updated_at" : "2022-01-08T19:26:15Z" ,
"pushed_at" : "2022-02-07T20:44:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
2024-10-29 13:30:55 +01:00
"jndi-exploit" ,
"log4j" ,
"minecraft-mod"
2024-06-26 08:47:13 +02:00
] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-10-29 13:30:55 +01:00
"watchers" : 0 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437419010 ,
"name" : "log4j-detector" ,
"full_name" : "mergebase\/log4j-detector" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "mergebase" ,
"id" : 73667397 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4" ,
"html_url" : "https:\/\/github.com\/mergebase" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/mergebase\/log4j-detector" ,
"description" : "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-12T00:29:03Z" ,
"updated_at" : "2024-10-29T01:23:00Z" ,
"pushed_at" : "2022-03-10T18:44:50Z" ,
"stargazers_count" : 636 ,
"watchers_count" : 636 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 98 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"cve-2021-45105" ,
"cybersecurity" ,
"detector" ,
"log4j" ,
"log4shell" ,
"pentest" ,
"sca" ,
"scanner" ,
"vulnerability-scanner"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 98 ,
"watchers" : 636 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 28
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437426386 ,
"name" : "hotpatch-for-apache-log4j2" ,
"full_name" : "corretto\/hotpatch-for-apache-log4j2" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "corretto" ,
"id" : 44104058 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44104058?v=4" ,
"html_url" : "https:\/\/github.com\/corretto" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/corretto\/hotpatch-for-apache-log4j2" ,
"description" : "An agent to hotpatch the log4j RCE from CVE-2021-44228." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-12T01:24:51Z" ,
"updated_at" : "2024-09-16T19:54:17Z" ,
"pushed_at" : "2022-10-24T02:25:53Z" ,
"stargazers_count" : 493 ,
"watchers_count" : 493 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 72 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 72 ,
"watchers" : 493 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 25
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437526168 ,
"name" : "Log4JShell-Bytecode-Detector" ,
"full_name" : "CodeShield-Security\/Log4JShell-Bytecode-Detector" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "CodeShield-Security" ,
"id" : 60257643 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60257643?v=4" ,
"html_url" : "https:\/\/github.com\/CodeShield-Security" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/CodeShield-Security\/Log4JShell-Bytecode-Detector" ,
"description" : "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-12T11:28:34Z" ,
"updated_at" : "2023-05-10T20:58:01Z" ,
"pushed_at" : "2022-02-23T19:10:53Z" ,
"stargazers_count" : 50 ,
"watchers_count" : 50 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 9 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"bytecode" ,
"cve-2021-44228" ,
"log4j2" ,
"log4jshell" ,
"log4shell" ,
"scanner" ,
"security"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 9 ,
"watchers" : 50 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 8
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437567489 ,
"name" : "CVE-2021-44228_IoCs" ,
"full_name" : "guardicode\/CVE-2021-44228_IoCs" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "guardicode" ,
"id" : 64462782 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64462782?v=4" ,
"html_url" : "https:\/\/github.com\/guardicode" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/guardicode\/CVE-2021-44228_IoCs" ,
"description" : "Known IoCs for log4j framework vulnerability " ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-12T14:27:28Z" ,
"updated_at" : "2022-01-02T08:53:49Z" ,
"pushed_at" : "2022-01-18T13:34:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 3 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 3 ,
"watchers" : 0 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 4
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437583301 ,
"name" : "cve-2021-44228-qingteng-online-patch" ,
"full_name" : "qingtengyun\/cve-2021-44228-qingteng-online-patch" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "qingtengyun" ,
"id" : 18526503 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4" ,
"html_url" : "https:\/\/github.com\/qingtengyun" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-online-patch" ,
"description" : "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-12T15:30:55Z" ,
"updated_at" : "2022-11-09T18:14:43Z" ,
"pushed_at" : "2022-01-19T09:07:14Z" ,
"stargazers_count" : 26 ,
"watchers_count" : 26 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 4 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"log4j" ,
2024-10-29 13:30:55 +01:00
"log4jshell"
2024-06-26 08:47:13 +02:00
] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 4 ,
"watchers" : 26 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 2
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437586734 ,
"name" : "horrors-log4shell" ,
"full_name" : "tasooshi\/horrors-log4shell" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "tasooshi" ,
"id" : 44586478 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44586478?v=4" ,
"html_url" : "https:\/\/github.com\/tasooshi" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/tasooshi\/horrors-log4shell" ,
"description" : "A micro lab for CVE-2021-44228 (log4j)" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-12T15:44:49Z" ,
"updated_at" : "2022-03-15T19:14:39Z" ,
"pushed_at" : "2022-02-22T00:27:58Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 2 ,
2024-10-29 13:30:55 +01:00
"watchers_count" : 2 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
"forks" : 1 ,
2024-10-29 13:30:55 +01:00
"watchers" : 2 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 3
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437663314 ,
"name" : "log4j-poc" ,
"full_name" : "cyberxml\/log4j-poc" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "cyberxml" ,
"id" : 10391872 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10391872?v=4" ,
"html_url" : "https:\/\/github.com\/cyberxml" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/cyberxml\/log4j-poc" ,
"description" : "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-12T21:45:33Z" ,
"updated_at" : "2024-08-12T20:18:50Z" ,
"pushed_at" : "2022-12-21T21:11:58Z" ,
"stargazers_count" : 68 ,
"watchers_count" : 68 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 34 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
2024-10-29 13:30:55 +01:00
"exploit" ,
"log4j" ,
2024-06-26 08:47:13 +02:00
"log4shell" ,
2024-10-29 13:30:55 +01:00
"poc"
2024-06-26 08:47:13 +02:00
] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 34 ,
"watchers" : 68 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 4
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437729997 ,
"name" : "log4j-scan" ,
"full_name" : "fullhunt\/log4j-scan" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "fullhunt" ,
"id" : 34830403 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/34830403?v=4" ,
"html_url" : "https:\/\/github.com\/fullhunt" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/fullhunt\/log4j-scan" ,
"description" : "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 " ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T03:57:50Z" ,
"updated_at" : "2024-10-28T12:27:06Z" ,
"pushed_at" : "2022-11-23T18:23:24Z" ,
"stargazers_count" : 3403 ,
"watchers_count" : 3403 ,
"has_discussions" : true ,
"forks_count" : 742 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 742 ,
"watchers" : 3403 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 55
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437733080 ,
"name" : "log4j_checker_beta" ,
"full_name" : "rubo77\/log4j_checker_beta" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "rubo77" ,
"id" : 1591563 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1591563?v=4" ,
"html_url" : "https:\/\/github.com\/rubo77" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/rubo77\/log4j_checker_beta" ,
"description" : "a fast check, if your server could be vulnerable to CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T04:14:18Z" ,
"updated_at" : "2024-10-12T16:42:12Z" ,
"pushed_at" : "2022-01-21T11:43:49Z" ,
"stargazers_count" : 250 ,
"watchers_count" : 250 ,
"has_discussions" : true ,
"forks_count" : 90 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [ ] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 90 ,
"watchers" : 250 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 8
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437766799 ,
"name" : "Log4j-RCE-Exploiter" ,
"full_name" : "thecyberneh\/Log4j-RCE-Exploiter" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "thecyberneh" ,
"id" : 75005384 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75005384?v=4" ,
"html_url" : "https:\/\/github.com\/thecyberneh" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/thecyberneh\/Log4j-RCE-Exploiter" ,
"description" : "Scanner for Log4j RCE CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T06:53:01Z" ,
"updated_at" : "2024-08-12T20:18:51Z" ,
"pushed_at" : "2022-07-06T00:37:55Z" ,
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 5 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 5 ,
"watchers" : 11 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437771197 ,
"name" : "log4j-cve-code-search-resources" ,
"full_name" : "sourcegraph\/log4j-cve-code-search-resources" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "sourcegraph" ,
"id" : 3979584 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3979584?v=4" ,
"html_url" : "https:\/\/github.com\/sourcegraph" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/sourcegraph\/log4j-cve-code-search-resources" ,
"description" : "Using code search to help fix\/mitigate log4j CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T07:10:11Z" ,
"updated_at" : "2022-11-09T18:14:44Z" ,
"pushed_at" : "2024-04-01T21:00:27Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 4 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 4 ,
2024-06-26 08:47:13 +02:00
"watchers" : 1 ,
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 40
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437797971 ,
"name" : "Sitecore.Solr-log4j-mitigation" ,
"full_name" : "avwolferen\/Sitecore.Solr-log4j-mitigation" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "avwolferen" ,
"id" : 11447968 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11447968?v=4" ,
"html_url" : "https:\/\/github.com\/avwolferen" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/avwolferen\/Sitecore.Solr-log4j-mitigation" ,
"description" : "This repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T08:46:41Z" ,
"updated_at" : "2022-01-05T17:02:45Z" ,
"pushed_at" : "2022-10-19T14:57:20Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 2 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 2 ,
2024-06-26 08:47:13 +02:00
"watchers" : 2 ,
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 3
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437847140 ,
"name" : "Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228" ,
"full_name" : "LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "LutziGoz" ,
"id" : 45577616 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45577616?v=4" ,
"html_url" : "https:\/\/github.com\/LutziGoz" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228" ,
"description" : null ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T11:29:57Z" ,
"updated_at" : "2022-08-14T12:05:18Z" ,
"pushed_at" : "2022-02-22T00:21:04Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437848570 ,
"name" : "Log4Shell" ,
"full_name" : "0xsyr0\/Log4Shell" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "0xsyr0" ,
"id" : 67317571 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/67317571?v=4" ,
"html_url" : "https:\/\/github.com\/0xsyr0" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/0xsyr0\/Log4Shell" ,
"description" : "This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T11:34:54Z" ,
"updated_at" : "2024-01-17T16:03:44Z" ,
"pushed_at" : "2024-02-21T15:47:36Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
2024-10-29 13:30:55 +01:00
"cve" ,
"cve-2021-44228" ,
"log4j" ,
"log4shell"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 2 ,
"watchers" : 8 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 4
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437888133 ,
"name" : "f5-waf-quick-patch-cve-2021-44228" ,
"full_name" : "irgoncalves\/f5-waf-quick-patch-cve-2021-44228" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "irgoncalves" ,
"id" : 23459099 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4" ,
"html_url" : "https:\/\/github.com\/irgoncalves" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/irgoncalves\/f5-waf-quick-patch-cve-2021-44228" ,
"description" : "This tool creates a custom signature set on F5 WAF and apply to policies in blocking mode" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T13:41:39Z" ,
"updated_at" : "2023-02-11T20:16:19Z" ,
"pushed_at" : "2022-05-04T23:49:03Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 4 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 4 ,
"watchers" : 3 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 1
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437937629 ,
"name" : "log4j-CVE-2021-44228" ,
"full_name" : "tobiasoed\/log4j-CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "tobiasoed" ,
"id" : 12912943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12912943?v=4" ,
"html_url" : "https:\/\/github.com\/tobiasoed" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/tobiasoed\/log4j-CVE-2021-44228" ,
"description" : null ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T16:04:54Z" ,
"updated_at" : "2021-12-21T02:30:06Z" ,
"pushed_at" : "2022-02-21T23:45:03Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 437963154 ,
"name" : "cve-2021-44228" ,
"full_name" : "corelight\/cve-2021-44228" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4" ,
"html_url" : "https:\/\/github.com\/corelight" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/corelight\/cve-2021-44228" ,
"description" : "Log4j Exploit Detection Logic for Zeek" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T17:25:52Z" ,
"updated_at" : "2024-10-12T10:55:49Z" ,
"pushed_at" : "2024-05-04T18:38:58Z" ,
"stargazers_count" : 19 ,
"watchers_count" : 19 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 8 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"cve-2021-44228" ,
"zeek"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 8 ,
"watchers" : 19 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 12
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438034703 ,
"name" : "log4shell-tools" ,
"full_name" : "alexbakker\/log4shell-tools" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "alexbakker" ,
"id" : 2387841 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4" ,
"html_url" : "https:\/\/github.com\/alexbakker" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/alexbakker\/log4shell-tools" ,
"description" : "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-13T21:47:41Z" ,
"updated_at" : "2024-10-28T07:04:55Z" ,
"pushed_at" : "2024-04-07T22:45:53Z" ,
"stargazers_count" : 86 ,
"watchers_count" : 86 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 16 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"dns" ,
"jndi" ,
"ldap" ,
"log4j" ,
"log4shell"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 16 ,
"watchers" : 86 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 4
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438144746 ,
"name" : "LogMePwn" ,
"full_name" : "0xInfection\/LogMePwn" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "0xInfection" ,
"id" : 39941993 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39941993?v=4" ,
"html_url" : "https:\/\/github.com\/0xInfection" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/0xInfection\/LogMePwn" ,
"description" : "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-14T06:37:59Z" ,
"updated_at" : "2024-10-16T21:23:22Z" ,
"pushed_at" : "2024-04-24T05:35:26Z" ,
"stargazers_count" : 385 ,
"watchers_count" : 385 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 52 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"cve-2021-44228" ,
"internet-scanning" ,
"log4j" ,
"rce-scanner" ,
"vulnerability-scanners"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 52 ,
"watchers" : 385 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 12
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438203240 ,
"name" : "log4j-finder" ,
"full_name" : "fox-it\/log4j-finder" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "fox-it" ,
"id" : 468621 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/468621?v=4" ,
"html_url" : "https:\/\/github.com\/fox-it" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/fox-it\/log4j-finder" ,
"description" : "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-14T10:04:42Z" ,
"updated_at" : "2024-10-03T05:15:58Z" ,
"pushed_at" : "2022-12-27T17:57:19Z" ,
"stargazers_count" : 435 ,
"watchers_count" : 435 ,
"has_discussions" : true ,
"forks_count" : 97 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
2024-10-29 13:30:55 +01:00
"cve-2021-45046" ,
"cve-2021-45105" ,
"log4j" ,
"log4j-finder" ,
2024-06-26 08:47:13 +02:00
"log4j2" ,
2024-10-29 13:30:55 +01:00
"log4shell" ,
"python"
2024-06-26 08:47:13 +02:00
] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 97 ,
"watchers" : 435 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 21
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438409343 ,
"name" : "log4j-remediation-tools" ,
"full_name" : "stripe\/log4j-remediation-tools" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "stripe" ,
"id" : 856813 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/856813?v=4" ,
"html_url" : "https:\/\/github.com\/stripe" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/stripe\/log4j-remediation-tools" ,
"description" : "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-14T21:47:04Z" ,
"updated_at" : "2024-08-18T16:13:22Z" ,
"pushed_at" : "2023-03-21T09:51:33Z" ,
"stargazers_count" : 41 ,
"watchers_count" : 41 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 9 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"log4j2" ,
"remediation" ,
"tools"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 9 ,
"watchers" : 41 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 9
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438418716 ,
"name" : "log4shell-finder" ,
"full_name" : "HynekPetrak\/log4shell-finder" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "HynekPetrak" ,
"id" : 8593983 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8593983?v=4" ,
"html_url" : "https:\/\/github.com\/HynekPetrak" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/HynekPetrak\/log4shell-finder" ,
"description" : "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-14T22:27:14Z" ,
"updated_at" : "2024-09-10T05:00:03Z" ,
"pushed_at" : "2023-06-21T11:37:03Z" ,
"stargazers_count" : 38 ,
"watchers_count" : 38 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 14 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
2024-10-29 13:30:55 +01:00
"cve-2017-5645" ,
"cve-2019-17571" ,
"cve-2020-9488" ,
"cve-2021-4104" ,
"cve-2021-42550" ,
2024-06-26 08:47:13 +02:00
"cve-2021-44228" ,
2024-10-29 13:30:55 +01:00
"cve-2021-44832" ,
2024-06-26 08:47:13 +02:00
"cve-2021-45046" ,
2024-10-29 13:30:55 +01:00
"cve-2021-45105" ,
"cve-2022-23302" ,
"cve-2022-23305" ,
"cve-2022-23307" ,
2024-06-26 08:47:13 +02:00
"log4j" ,
2024-10-29 13:30:55 +01:00
"log4j2" ,
2024-06-26 08:47:13 +02:00
"log4shell" ,
2024-10-29 13:30:55 +01:00
"scanner" ,
"security" ,
"vulnerability"
2024-06-26 08:47:13 +02:00
] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 14 ,
"watchers" : 38 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 5
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438432868 ,
"name" : "CVE-2021-44228_scanner" ,
"full_name" : "CERTCC\/CVE-2021-44228_scanner" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "CERTCC" ,
"id" : 37221555 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37221555?v=4" ,
"html_url" : "https:\/\/github.com\/CERTCC" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/CERTCC\/CVE-2021-44228_scanner" ,
"description" : "Scanners for Jar files that may be vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T23:33:51Z" ,
"updated_at" : "2024-10-15T07:29:40Z" ,
"pushed_at" : "2022-03-23T18:12:51Z" ,
"stargazers_count" : 344 ,
"watchers_count" : 344 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 89 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 89 ,
"watchers" : 344 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 35
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438504265 ,
"name" : "log4j-vul" ,
"full_name" : "bhprin\/log4j-vul" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "bhprin" ,
"id" : 1876456 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1876456?v=4" ,
"html_url" : "https:\/\/github.com\/bhprin" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/bhprin\/log4j-vul" ,
"description" : "This project is just to show Apache Log4j2 Vulnerability - aka CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-15T05:19:13Z" ,
"updated_at" : "2021-12-22T04:39:30Z" ,
"pushed_at" : "2023-01-31T08:17:43Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438664340 ,
"name" : "log4j-vuln-coverage-check" ,
"full_name" : "MeterianHQ\/log4j-vuln-coverage-check" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "MeterianHQ" ,
"id" : 28596672 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28596672?v=4" ,
"html_url" : "https:\/\/github.com\/MeterianHQ" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/MeterianHQ\/log4j-vuln-coverage-check" ,
"description" : "A simple project to check coverage of Log4J vuln CVE-2021-44228 (and related)" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-15T14:44:14Z" ,
"updated_at" : "2021-12-16T14:00:05Z" ,
"pushed_at" : "2022-12-01T09:18:05Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 1 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 1 ,
"watchers" : 0 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 3
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438689577 ,
"name" : "Log4j" ,
"full_name" : "isuruwa\/Log4j" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "isuruwa" ,
"id" : 72663288 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/72663288?v=4" ,
"html_url" : "https:\/\/github.com\/isuruwa" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/isuruwa\/Log4j" ,
"description" : "A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228 " ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-15T16:01:36Z" ,
"updated_at" : "2024-08-12T20:18:56Z" ,
"pushed_at" : "2022-08-06T15:26:04Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 2 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"cve-2021-44228" ,
"java" ,
"log4j"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 2 ,
"watchers" : 6 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438695688 ,
"name" : "checkmk-log4j-scanner" ,
"full_name" : "inettgmbh\/checkmk-log4j-scanner" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "inettgmbh" ,
"id" : 12827152 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12827152?v=4" ,
"html_url" : "https:\/\/github.com\/inettgmbh" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/inettgmbh\/checkmk-log4j-scanner" ,
"description" : "Scans for Log4j versions effected by CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-15T16:21:26Z" ,
"updated_at" : "2024-05-13T12:42:03Z" ,
"pushed_at" : "2024-05-13T12:44:51Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 2 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
2024-10-29 13:30:55 +01:00
"checkmk" ,
"log4j"
2024-06-26 08:47:13 +02:00
] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 2 ,
"watchers" : 4 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 4
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438761150 ,
"name" : "kubernetes-log4j-cve-2021-44228-node-agent" ,
"full_name" : "aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "aws-samples" ,
"id" : 8931462 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8931462?v=4" ,
"html_url" : "https:\/\/github.com\/aws-samples" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent" ,
"description" : null ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-15T20:17:41Z" ,
"updated_at" : "2023-10-19T15:47:11Z" ,
"pushed_at" : "2022-08-26T14:56:01Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 18 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 18 ,
"watchers" : 2 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 7
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438773632 ,
"name" : "Log4Shell-Honeypot" ,
"full_name" : "michaelsanford\/Log4Shell-Honeypot" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "michaelsanford" ,
"id" : 1800499 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1800499?v=4" ,
"html_url" : "https:\/\/github.com\/michaelsanford" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/michaelsanford\/Log4Shell-Honeypot" ,
"description" : "Dockerized honeypot for CVE-2021-44228." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-15T21:09:00Z" ,
"updated_at" : "2023-06-22T04:46:02Z" ,
"pushed_at" : "2024-10-03T11:20:08Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"cve-2021-44228" ,
"docker" ,
"honeypot" ,
"python"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
"forks" : 0 ,
2024-10-29 13:30:55 +01:00
"watchers" : 4 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 3
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438791130 ,
"name" : "Log4Pot" ,
"full_name" : "thomaspatzke\/Log4Pot" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "thomaspatzke" ,
"id" : 1845601 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1845601?v=4" ,
"html_url" : "https:\/\/github.com\/thomaspatzke" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/thomaspatzke\/Log4Pot" ,
"description" : "A honeypot for the Log4Shell vulnerability (CVE-2021-44228)." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-15T22:30:34Z" ,
"updated_at" : "2024-09-21T11:37:46Z" ,
"pushed_at" : "2022-04-26T14:30:54Z" ,
"stargazers_count" : 90 ,
"watchers_count" : 90 ,
"has_discussions" : true ,
"forks_count" : 27 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 27 ,
"watchers" : 90 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 7
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438940454 ,
"name" : "log4j-Scan-Burpsuite" ,
"full_name" : "snow0715\/log4j-Scan-Burpsuite" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "snow0715" ,
"id" : 54879520 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54879520?v=4" ,
"html_url" : "https:\/\/github.com\/snow0715" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/snow0715\/log4j-Scan-Burpsuite" ,
"description" : "Log4j漏洞( CVE-2021-44228) 的Burpsuite检测插件" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-16T09:58:02Z" ,
"updated_at" : "2024-04-07T08:54:48Z" ,
"pushed_at" : "2022-01-26T03:51:30Z" ,
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2024-10-29 13:30:55 +01:00
"watchers" : 13 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438951347 ,
"name" : "Log4j-Windows-Scanner" ,
"full_name" : "Joefreedy\/Log4j-Windows-Scanner" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "Joefreedy" ,
"id" : 47759132 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47759132?v=4" ,
"html_url" : "https:\/\/github.com\/Joefreedy" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/Joefreedy\/Log4j-Windows-Scanner" ,
"description" : "CVE-2021-44228 vulnerability in Apache Log4j library | Log4j vulnerability scanner on Windows machines." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-16T10:37:16Z" ,
"updated_at" : "2022-03-29T19:51:54Z" ,
"pushed_at" : "2022-10-05T11:18:26Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-10-29 13:30:55 +01:00
"watchers" : 3 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 3
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 438985997 ,
"name" : "log4shell-demo" ,
"full_name" : "korteke\/log4shell-demo" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "korteke" ,
"id" : 2558348 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2558348?v=4" ,
"html_url" : "https:\/\/github.com\/korteke" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/korteke\/log4shell-demo" ,
"description" : "Simple webapp that is vulnerable to Log4Shell (CVE-2021-44228)" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-16T12:44:24Z" ,
"updated_at" : "2021-12-22T12:14:02Z" ,
"pushed_at" : "2023-02-13T22:30:21Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 5 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 5 ,
2024-06-26 08:47:13 +02:00
"watchers" : 1 ,
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 2
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 439018822 ,
"name" : "log4j-filescan" ,
"full_name" : "andalik\/log4j-filescan" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "andalik" ,
"id" : 12278569 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12278569?v=4" ,
"html_url" : "https:\/\/github.com\/andalik" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/andalik\/log4j-filescan" ,
"description" : "Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-16T14:29:05Z" ,
"updated_at" : "2022-03-05T22:52:28Z" ,
"pushed_at" : "2022-03-05T23:01:15Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 2
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 439129728 ,
"name" : "CVE-2021-44228" ,
"full_name" : "Kr0ff\/CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "Kr0ff" ,
"id" : 35173514 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4" ,
"html_url" : "https:\/\/github.com\/Kr0ff" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/Kr0ff\/CVE-2021-44228" ,
"description" : "Log4Shell Proof of Concept (CVE-2021-44228)" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-16T21:19:17Z" ,
"updated_at" : "2023-08-15T12:51:08Z" ,
"pushed_at" : "2022-04-21T13:23:40Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-10-29 13:30:55 +01:00
"watchers" : 4 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 439430099 ,
"name" : "CVE-2021-44228-VULN-APP" ,
"full_name" : "nu11secur1ty\/CVE-2021-44228-VULN-APP" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "nu11secur1ty" ,
"id" : 3677559 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3677559?v=4" ,
"html_url" : "https:\/\/github.com\/nu11secur1ty" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/nu11secur1ty\/CVE-2021-44228-VULN-APP" ,
"description" : null ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-17T18:45:19Z" ,
"updated_at" : "2024-08-12T20:18:58Z" ,
"pushed_at" : "2023-02-22T12:12:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 4 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [ ] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 4 ,
"watchers" : 0 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 439496578 ,
"name" : "PowerShell-Log4J-Scanner" ,
"full_name" : "DANSI\/PowerShell-Log4J-Scanner" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "DANSI" ,
"id" : 4057240 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4057240?v=4" ,
"html_url" : "https:\/\/github.com\/DANSI" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/DANSI\/PowerShell-Log4J-Scanner" ,
"description" : "can find, analyse and patch Log4J files because of CVE-2021-44228, CVE-2021-45046" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-18T00:51:46Z" ,
"updated_at" : "2021-12-31T13:32:41Z" ,
"pushed_at" : "2022-03-29T21:43:32Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [ ] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
"forks" : 0 ,
2024-10-29 13:30:55 +01:00
"watchers" : 0 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 439712818 ,
"name" : "log4j-2021-vulnerability-study" ,
"full_name" : "otaviokr\/log4j-2021-vulnerability-study" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "otaviokr" ,
"id" : 3641421 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3641421?v=4" ,
"html_url" : "https:\/\/github.com\/otaviokr" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/otaviokr\/log4j-2021-vulnerability-study" ,
"description" : "This is a showcase how the Log4J vulnerability (CVE-2021-44228) could be explored. This code is safe to run, but understand what it does and how it works!" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-18T20:53:06Z" ,
"updated_at" : "2022-01-22T01:46:53Z" ,
"pushed_at" : "2022-01-22T01:46:50Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [ ] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
"forks" : 0 ,
2024-10-29 13:30:55 +01:00
"watchers" : 0 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 2
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 440009725 ,
"name" : "f-for-java" ,
"full_name" : "TotallyNotAHaxxer\/f-for-java" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "TotallyNotAHaxxer" ,
"id" : 87203697 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87203697?v=4" ,
"html_url" : "https:\/\/github.com\/TotallyNotAHaxxer" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/TotallyNotAHaxxer\/f-for-java" ,
"description" : "a project written in go and java i abandoned for CVE-2021-44228 try to fix it if you can XD" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-20T01:31:06Z" ,
"updated_at" : "2021-12-24T18:06:45Z" ,
"pushed_at" : "2022-12-16T03:57:25Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 440216413 ,
"name" : "Log4j-Scanner-Exploit" ,
"full_name" : "julian911015\/Log4j-Scanner-Exploit" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "julian911015" ,
"id" : 26369589 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26369589?v=4" ,
"html_url" : "https:\/\/github.com\/julian911015" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/julian911015\/Log4j-Scanner-Exploit" ,
"description" : "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-20T15:22:50Z" ,
"updated_at" : "2024-09-19T08:09:04Z" ,
"pushed_at" : "2024-09-03T15:22:31Z" ,
"stargazers_count" : 29 ,
"watchers_count" : 29 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 5 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 5 ,
"watchers" : 29 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 2
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 440220972 ,
"name" : "CVE-2021-44228---detection-with-PowerShell" ,
"full_name" : "intel-xeon\/CVE-2021-44228---detection-with-PowerShell" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "intel-xeon" ,
"id" : 37773731 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37773731?v=4" ,
"html_url" : "https:\/\/github.com\/intel-xeon" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/intel-xeon\/CVE-2021-44228---detection-with-PowerShell" ,
"description" : null ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-20T15:38:07Z" ,
"updated_at" : "2021-12-23T13:23:27Z" ,
"pushed_at" : "2022-06-24T08:00:16Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 440261792 ,
"name" : "TekiumLog4jApp" ,
"full_name" : "erickrr-bd\/TekiumLog4jApp" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "erickrr-bd" ,
"id" : 77643346 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/77643346?v=4" ,
"html_url" : "https:\/\/github.com\/erickrr-bd" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/erickrr-bd\/TekiumLog4jApp" ,
"description" : "Java application vulnerable to CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-20T17:59:56Z" ,
"updated_at" : "2022-02-15T20:16:38Z" ,
"pushed_at" : "2022-03-01T00:00:00Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"app" ,
"cve-2021-44228" ,
"docker" ,
"exploitation" ,
"java" ,
"jndi" ,
"log4j2" ,
"security" ,
"vulnerability"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 1
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 440373235 ,
"name" : "loguccino" ,
"full_name" : "sassoftware\/loguccino" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "sassoftware" ,
"id" : 5289877 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5289877?v=4" ,
"html_url" : "https:\/\/github.com\/sassoftware" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/sassoftware\/loguccino" ,
"description" : "Scan and patch tool for CVE-2021-44228 and related log4j concerns. " ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-21T03:01:36Z" ,
"updated_at" : "2024-05-15T16:42:25Z" ,
"pushed_at" : "2022-01-24T16:43:41Z" ,
"stargazers_count" : 34 ,
"watchers_count" : 34 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 5 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [ ] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 5 ,
"watchers" : 34 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 16
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 440601926 ,
"name" : "log4j2-hack-springboot" ,
"full_name" : "rejupillai\/log4j2-hack-springboot" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "rejupillai" ,
"id" : 15153045 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15153045?v=4" ,
"html_url" : "https:\/\/github.com\/rejupillai" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/rejupillai\/log4j2-hack-springboot" ,
"description" : "Log4j2 CVE-2021-44228 hack demo for a springboot app" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-21T17:40:02Z" ,
"updated_at" : "2021-12-21T19:26:23Z" ,
"pushed_at" : "2023-03-22T05:52:51Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 0 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [ ] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 0 ,
2024-06-26 08:47:13 +02:00
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 440722343 ,
"name" : "Log4Shell-CVE-2021-44228-Demo" ,
"full_name" : "BabooPan\/Log4Shell-CVE-2021-44228-Demo" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "BabooPan" ,
"id" : 16317991 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16317991?v=4" ,
"html_url" : "https:\/\/github.com\/BabooPan" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/BabooPan\/Log4Shell-CVE-2021-44228-Demo" ,
"description" : "Log4Shell Demo with AWS" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-22T03:34:40Z" ,
"updated_at" : "2024-03-12T11:31:53Z" ,
"pushed_at" : "2022-03-28T06:49:06Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 1 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 1 ,
"watchers" : 2 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 1
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 441470836 ,
"name" : "Log4jUnifi" ,
"full_name" : "puzzlepeaches\/Log4jUnifi" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "puzzlepeaches" ,
"id" : 8538866 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4" ,
"html_url" : "https:\/\/github.com\/puzzlepeaches" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/puzzlepeaches\/Log4jUnifi" ,
"description" : "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-24T13:18:49Z" ,
"updated_at" : "2024-10-01T02:26:33Z" ,
"pushed_at" : "2024-01-04T17:12:05Z" ,
"stargazers_count" : 142 ,
"watchers_count" : 142 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 29 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 29 ,
"watchers" : 142 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 6
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 441540913 ,
"name" : "CVE-2021-44228" ,
"full_name" : "marcourbano\/CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "marcourbano" ,
"id" : 22402683 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22402683?v=4" ,
"html_url" : "https:\/\/github.com\/marcourbano" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/marcourbano\/CVE-2021-44228" ,
"description" : "PoC for CVE-2021-44228." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-24T19:26:36Z" ,
"updated_at" : "2024-04-19T14:48:49Z" ,
"pushed_at" : "2022-09-22T19:16:07Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 6 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 6 ,
"watchers" : 6 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 441545718 ,
"name" : "log4shell-vulnerable-app" ,
"full_name" : "bsigouin\/log4shell-vulnerable-app" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "bsigouin" ,
"id" : 48130586 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48130586?v=4" ,
"html_url" : "https:\/\/github.com\/bsigouin" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/bsigouin\/log4shell-vulnerable-app" ,
"description" : "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-24T20:00:12Z" ,
"updated_at" : "2022-01-06T13:31:29Z" ,
"pushed_at" : "2023-01-20T17:03:41Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 0
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 442033629 ,
"name" : "ModSec-log4j2" ,
"full_name" : "felipe8398\/ModSec-log4j2" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "felipe8398" ,
"id" : 24979677 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24979677?v=4" ,
"html_url" : "https:\/\/github.com\/felipe8398" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/felipe8398\/ModSec-log4j2" ,
"description" : "Regra ModSec para proteção log4j2 - CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-27T02:53:24Z" ,
"updated_at" : "2022-06-19T02:08:13Z" ,
"pushed_at" : "2022-03-10T22:09:11Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"docker"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 442073643 ,
"name" : "log4j-vulnerability" ,
"full_name" : "mazhar-hassan\/log4j-vulnerability" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "mazhar-hassan" ,
"id" : 32394814 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32394814?v=4" ,
"html_url" : "https:\/\/github.com\/mazhar-hassan" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/mazhar-hassan\/log4j-vulnerability" ,
"description" : "Log4Shell (CVE-2021-44228) is a zero-day vulnerability in Log4j" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-27T06:39:40Z" ,
"updated_at" : "2021-12-27T09:33:39Z" ,
"pushed_at" : "2022-08-23T13:47:26Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 442217104 ,
"name" : "l4s_poc" ,
"full_name" : "s-retlaw\/l4s_poc" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "s-retlaw" ,
"id" : 73955369 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4" ,
"html_url" : "https:\/\/github.com\/s-retlaw" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/s-retlaw\/l4s_poc" ,
"description" : "Log4Shell (Cve-2021-44228) Proof Of Concept" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-27T16:45:58Z" ,
"updated_at" : "2022-01-04T14:50:09Z" ,
"pushed_at" : "2023-07-25T20:05:40Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 0 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 0 ,
"watchers" : 0 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 2
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 442317732 ,
"name" : "Vm4J" ,
"full_name" : "NS-Sp4ce\/Vm4J" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "NS-Sp4ce" ,
"id" : 33349032 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4" ,
"html_url" : "https:\/\/github.com\/NS-Sp4ce" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/NS-Sp4ce\/Vm4J" ,
"description" : "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-28T01:37:20Z" ,
"updated_at" : "2024-10-24T12:12:26Z" ,
"pushed_at" : "2022-01-24T05:37:34Z" ,
"stargazers_count" : 204 ,
"watchers_count" : 204 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 13:30:55 +01:00
"forks_count" : 39 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-10-29 13:30:55 +01:00
"topics" : [
"cve-2021-44228" ,
"log4j2-exp" ,
"log4shell" ,
"vmsa-2021-0028"
] ,
2024-06-26 08:47:13 +02:00
"visibility" : "public" ,
2024-10-29 13:30:55 +01:00
"forks" : 39 ,
"watchers" : 204 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 5
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 443422203 ,
"name" : "log4shell-vulnerable-app" ,
"full_name" : "romanutti\/log4shell-vulnerable-app" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "romanutti" ,
"id" : 36601005 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36601005?v=4" ,
"html_url" : "https:\/\/github.com\/romanutti" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/romanutti\/log4shell-vulnerable-app" ,
"description" : "This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as log4shell." ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2021-12-31T20:39:44Z" ,
"updated_at" : "2022-01-01T10:57:33Z" ,
"pushed_at" : "2022-05-10T17:20:17Z" ,
2024-06-26 08:47:13 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-10-29 13:30:55 +01:00
"subscribers_count" : 2
2024-06-26 08:47:13 +02:00
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 563424783 ,
"name" : "CVE-2021-44228" ,
"full_name" : "srcporter\/CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "srcporter" ,
"id" : 42175824 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42175824?v=4" ,
"html_url" : "https:\/\/github.com\/srcporter" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/srcporter\/CVE-2021-44228" ,
"description" : "DO NOT USE FOR ANYTHING REAL. Simple springboot sample app with vulnerability CVE-2021-44228 aka \"Log4Shell\" " ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2022-11-08T15:29:42Z" ,
"updated_at" : "2024-08-22T18:40:38Z" ,
"pushed_at" : "2024-08-22T18:40:35Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-10-29 13:30:55 +01:00
"watchers" : 1 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
2024-10-29 13:30:55 +01:00
"id" : 725731160 ,
"name" : "log4shell_lab" ,
"full_name" : "ShlomiRex\/log4shell_lab" ,
2024-06-26 08:47:13 +02:00
"owner" : {
2024-10-29 13:30:55 +01:00
"login" : "ShlomiRex" ,
"id" : 17744127 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17744127?v=4" ,
"html_url" : "https:\/\/github.com\/ShlomiRex" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
2024-10-29 13:30:55 +01:00
"html_url" : "https:\/\/github.com\/ShlomiRex\/log4shell_lab" ,
"description" : "CVE-2021-44228" ,
2024-06-26 08:47:13 +02:00
"fork" : false ,
2024-10-29 13:30:55 +01:00
"created_at" : "2023-11-30T18:55:40Z" ,
"updated_at" : "2024-07-15T07:35:10Z" ,
"pushed_at" : "2024-07-15T07:35:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-10-29 13:30:55 +01:00
"watchers" : 0 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 1
2024-07-27 02:29:42 +02:00
} ,
{
"id" : 834267924 ,
"name" : "CVE-2021-44228" ,
"full_name" : "asd58584388\/CVE-2021-44228" ,
"owner" : {
"login" : "asd58584388" ,
"id" : 43491476 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43491476?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/asd58584388" ,
"user_view_type" : "public"
2024-07-27 02:29:42 +02:00
} ,
"html_url" : "https:\/\/github.com\/asd58584388\/CVE-2021-44228" ,
"description" : "CVE-2021-44228 vulnerability study" ,
"fork" : false ,
"created_at" : "2024-07-26T19:59:47Z" ,
"updated_at" : "2024-07-26T20:57:53Z" ,
"pushed_at" : "2024-07-26T20:57:47Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-08-10 02:31:37 +02:00
"subscribers_count" : 1
2024-09-11 08:30:05 +02:00
} ,
{
"id" : 855503144 ,
"name" : "CVE-2021-44228-Log4Shell-" ,
"full_name" : "OtisSymbos\/CVE-2021-44228-Log4Shell-" ,
"owner" : {
"login" : "OtisSymbos" ,
"id" : 78093502 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/78093502?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/OtisSymbos" ,
"user_view_type" : "public"
2024-09-11 08:30:05 +02:00
} ,
"html_url" : "https:\/\/github.com\/OtisSymbos\/CVE-2021-44228-Log4Shell-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-09-11T01:13:35Z" ,
"updated_at" : "2024-09-11T01:20:42Z" ,
"pushed_at" : "2024-09-11T01:14:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-09-12 08:29:43 +02:00
"subscribers_count" : 1
2024-09-11 08:30:05 +02:00
} ,
{
"id" : 855573158 ,
"name" : "log4j-shell-poc" ,
"full_name" : "safeer-accuknox\/log4j-shell-poc" ,
"owner" : {
"login" : "safeer-accuknox" ,
"id" : 180378107 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/safeer-accuknox" ,
"user_view_type" : "public"
2024-09-11 08:30:05 +02:00
} ,
"html_url" : "https:\/\/github.com\/safeer-accuknox\/log4j-shell-poc" ,
"description" : "Log4J exploit CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2024-09-11T05:06:50Z" ,
2024-09-11 14:30:33 +02:00
"updated_at" : "2024-09-11T09:39:58Z" ,
"pushed_at" : "2024-09-11T09:39:55Z" ,
2024-09-11 08:30:05 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-09-12 08:29:43 +02:00
"subscribers_count" : 1
2024-10-08 20:31:24 +02:00
} ,
{
"id" : 869690102 ,
"name" : "TPASLog4ShellPoC" ,
"full_name" : "Carlos-Mesquita\/TPASLog4ShellPoC" ,
"owner" : {
"login" : "Carlos-Mesquita" ,
"id" : 75860783 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75860783?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/Carlos-Mesquita" ,
"user_view_type" : "public"
2024-10-08 20:31:24 +02:00
} ,
"html_url" : "https:\/\/github.com\/Carlos-Mesquita\/TPASLog4ShellPoC" ,
"description" : "Proof of Concept (PoC) for the Log4Shell vulnerability (CVE-2021-44228), developed as part of the coursework for the curricular unit TPAS in the Master's degree in Information Security at FCUP." ,
"fork" : false ,
"created_at" : "2024-10-08T18:07:21Z" ,
2024-10-10 20:30:32 +02:00
"updated_at" : "2024-10-10T14:53:56Z" ,
2024-10-09 02:30:25 +02:00
"pushed_at" : "2024-10-08T18:19:15Z" ,
2024-10-10 20:30:32 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2024-10-08 20:31:24 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-10-10 20:30:32 +02:00
"watchers" : 1 ,
2024-10-08 20:31:24 +02:00
"score" : 0 ,
2024-10-09 02:30:25 +02:00
"subscribers_count" : 1
2024-06-26 08:47:13 +02:00
}
]