2024-11-28 19:31:51 +01:00
[
{
"id" : 436666301 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce" ,
"full_name" : "tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce" ,
"owner" : {
"login" : "tangxiaofeng7" ,
"id" : 45926593 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4" ,
"html_url" : "https:\/\/github.com\/tangxiaofeng7" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce" ,
"description" : "Apache Log4j 远程代码执行" ,
"fork" : false ,
"created_at" : "2021-12-09T15:27:38Z" ,
"updated_at" : "2024-11-02T09:32:11Z" ,
"pushed_at" : "2023-05-14T04:54:32Z" ,
"stargazers_count" : 75 ,
"watchers_count" : 75 ,
"has_discussions" : false ,
"forks_count" : 27 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 27 ,
"watchers" : 75 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 436771097 ,
"name" : "Healer" ,
"full_name" : "Glease\/Healer" ,
"owner" : {
"login" : "Glease" ,
"id" : 4586901 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4586901?v=4" ,
"html_url" : "https:\/\/github.com\/Glease" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Glease\/Healer" ,
"description" : "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2" ,
"fork" : false ,
"created_at" : "2021-12-09T21:49:33Z" ,
"updated_at" : "2024-11-07T13:23:14Z" ,
"pushed_at" : "2023-01-27T17:34:36Z" ,
"stargazers_count" : 17 ,
"watchers_count" : 17 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 17 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 436798675 ,
"name" : "L4J-Vuln-Patch" ,
"full_name" : "jacobtread\/L4J-Vuln-Patch" ,
"owner" : {
"login" : "jacobtread" ,
"id" : 33708767 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33708767?v=4" ,
"html_url" : "https:\/\/github.com\/jacobtread" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jacobtread\/L4J-Vuln-Patch" ,
"description" : "This tool patches the CVE-2021-44228 Log4J vulnerability present in all minecraft versions NOTE THIS TOOL MUST BE RE-RUN after downloading or updating versions of minecraft as its not a perminent patch" ,
"fork" : false ,
"created_at" : "2021-12-10T00:14:06Z" ,
"updated_at" : "2023-08-17T23:00:04Z" ,
"pushed_at" : "2021-12-15T03:10:47Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 436860437 ,
"name" : "Log4j2-CVE-2021-44228" ,
"full_name" : "jas502n\/Log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/Log4j2-CVE-2021-44228" ,
"description" : "Remote Code Injection In Log4j" ,
"fork" : false ,
"created_at" : "2021-12-10T05:23:44Z" ,
2024-12-08 13:31:42 +01:00
"updated_at" : "2024-12-08T07:27:57Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2022-01-18T12:01:52Z" ,
2024-12-08 13:31:42 +01:00
"stargazers_count" : 460 ,
"watchers_count" : 460 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 124 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 124 ,
2024-12-08 13:31:42 +01:00
"watchers" : 460 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 8
} ,
{
"id" : 436871682 ,
"name" : "Log4J-RCE-Proof-Of-Concept" ,
"full_name" : "HyCraftHD\/Log4J-RCE-Proof-Of-Concept" ,
"owner" : {
"login" : "HyCraftHD" ,
"id" : 7681220 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7681220?v=4" ,
"html_url" : "https:\/\/github.com\/HyCraftHD" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/HyCraftHD\/Log4J-RCE-Proof-Of-Concept" ,
"description" : "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information" ,
"fork" : false ,
"created_at" : "2021-12-10T06:15:38Z" ,
"updated_at" : "2024-08-12T20:18:43Z" ,
"pushed_at" : "2021-12-16T01:33:48Z" ,
"stargazers_count" : 179 ,
"watchers_count" : 179 ,
"has_discussions" : false ,
"forks_count" : 31 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2021-44228" ,
"cves" ,
"exploit" ,
"log4j" ,
"log4j2" ,
"minecraft"
] ,
"visibility" : "public" ,
"forks" : 31 ,
"watchers" : 179 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 436877979 ,
"name" : "cloudrasp-log4j2" ,
"full_name" : "boundaryx\/cloudrasp-log4j2" ,
"owner" : {
"login" : "boundaryx" ,
"id" : 95878655 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/95878655?v=4" ,
"html_url" : "https:\/\/github.com\/boundaryx" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/boundaryx\/cloudrasp-log4j2" ,
"description" : "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense." ,
"fork" : false ,
"created_at" : "2021-12-10T06:42:37Z" ,
"updated_at" : "2024-10-15T07:29:44Z" ,
"pushed_at" : "2021-12-11T02:49:41Z" ,
"stargazers_count" : 122 ,
"watchers_count" : 122 ,
"has_discussions" : false ,
"forks_count" : 20 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"defense" ,
"hardening" ,
"java" ,
"log4j" ,
"log4j2" ,
"protection" ,
"rasp" ,
"rce" ,
"security" ,
"security-tools" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 20 ,
"watchers" : 122 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 436881928 ,
"name" : "CVE-2021-44228" ,
"full_name" : "dbgee\/CVE-2021-44228" ,
"owner" : {
"login" : "dbgee" ,
"id" : 46910972 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46910972?v=4" ,
"html_url" : "https:\/\/github.com\/dbgee" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dbgee\/CVE-2021-44228" ,
"description" : "Apache Log4j 2 a remote code execution vulnerability via the ldap JNDI parser." ,
"fork" : false ,
"created_at" : "2021-12-10T06:59:10Z" ,
"updated_at" : "2022-11-09T18:14:39Z" ,
"pushed_at" : "2022-01-19T09:58:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 436918458 ,
"name" : "Log4jPatcher" ,
"full_name" : "CreeperHost\/Log4jPatcher" ,
"owner" : {
"login" : "CreeperHost" ,
"id" : 7502613 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7502613?v=4" ,
"html_url" : "https:\/\/github.com\/CreeperHost" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/CreeperHost\/Log4jPatcher" ,
"description" : "A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)" ,
"fork" : false ,
"created_at" : "2021-12-10T09:16:46Z" ,
"updated_at" : "2024-06-28T10:26:36Z" ,
"pushed_at" : "2022-11-10T11:16:17Z" ,
"stargazers_count" : 47 ,
"watchers_count" : 47 ,
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4j2" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 47 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 436919597 ,
"name" : "RCE" ,
"full_name" : "DragonSurvivalEU\/RCE" ,
"owner" : {
"login" : "DragonSurvivalEU" ,
"id" : 92676019 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92676019?v=4" ,
"html_url" : "https:\/\/github.com\/DragonSurvivalEU" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/DragonSurvivalEU\/RCE" ,
"description" : "CVE-2021-44228 fix" ,
"fork" : false ,
"created_at" : "2021-12-10T09:20:40Z" ,
"updated_at" : "2024-08-12T20:18:43Z" ,
"pushed_at" : "2021-12-20T00:38:10Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 436933689 ,
"name" : "Log4jPatch" ,
"full_name" : "simonis\/Log4jPatch" ,
"owner" : {
"login" : "simonis" ,
"id" : 3178197 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3178197?v=4" ,
"html_url" : "https:\/\/github.com\/simonis" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/simonis\/Log4jPatch" ,
"description" : "Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process" ,
"fork" : false ,
"created_at" : "2021-12-10T10:10:19Z" ,
"updated_at" : "2024-06-06T03:59:54Z" ,
"pushed_at" : "2021-12-12T10:33:02Z" ,
"stargazers_count" : 108 ,
"watchers_count" : 108 ,
"has_discussions" : false ,
"forks_count" : 13 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 13 ,
"watchers" : 108 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 436973468 ,
"name" : "CVE-2021-44228-Test-Server" ,
"full_name" : "zlepper\/CVE-2021-44228-Test-Server" ,
"owner" : {
"login" : "zlepper" ,
"id" : 1499810 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1499810?v=4" ,
"html_url" : "https:\/\/github.com\/zlepper" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/zlepper\/CVE-2021-44228-Test-Server" ,
"description" : "A small server for verifing if a given java program is succeptibel to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-10T12:35:30Z" ,
"updated_at" : "2023-08-04T05:22:46Z" ,
"pushed_at" : "2021-12-10T12:39:25Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 436974241 ,
"name" : "log4shell-vulnerable-app" ,
"full_name" : "christophetd\/log4shell-vulnerable-app" ,
"owner" : {
"login" : "christophetd" ,
"id" : 136675 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4" ,
"html_url" : "https:\/\/github.com\/christophetd" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app" ,
"description" : "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228)." ,
"fork" : false ,
"created_at" : "2021-12-10T12:38:20Z" ,
2024-12-16 07:32:16 +01:00
"updated_at" : "2024-12-16T02:53:18Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2024-04-26T03:16:26Z" ,
2024-12-16 07:32:16 +01:00
"stargazers_count" : 1108 ,
"watchers_count" : 1108 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 536 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 536 ,
2024-12-16 07:32:16 +01:00
"watchers" : 1108 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 23
} ,
{
"id" : 437005376 ,
"name" : "log4jcheck" ,
"full_name" : "NorthwaveSecurity\/log4jcheck" ,
"owner" : {
"login" : "NorthwaveSecurity" ,
"id" : 44571169 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44571169?v=4" ,
"html_url" : "https:\/\/github.com\/NorthwaveSecurity" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/NorthwaveSecurity\/log4jcheck" ,
"description" : "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers." ,
"fork" : false ,
"created_at" : "2021-12-10T14:22:49Z" ,
"updated_at" : "2024-11-22T12:39:18Z" ,
"pushed_at" : "2021-12-14T15:16:15Z" ,
"stargazers_count" : 125 ,
"watchers_count" : 125 ,
"has_discussions" : false ,
"forks_count" : 26 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"checker" ,
"cve-2021-44228" ,
"log4j" ,
"log4shell" ,
"rce" ,
"scanner"
] ,
"visibility" : "public" ,
"forks" : 26 ,
"watchers" : 125 ,
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 437026730 ,
"name" : "VictimApp" ,
"full_name" : "nkoneko\/VictimApp" ,
"owner" : {
"login" : "nkoneko" ,
"id" : 1922341 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4" ,
"html_url" : "https:\/\/github.com\/nkoneko" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/nkoneko\/VictimApp" ,
"description" : "Vulnerable to CVE-2021-44228. trustURLCodebase is not required." ,
"fork" : false ,
"created_at" : "2021-12-10T15:32:03Z" ,
"updated_at" : "2022-11-09T18:14:41Z" ,
"pushed_at" : "2021-12-10T22:40:15Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437031223 ,
"name" : "pulsar-docker-images-patch-CVE-2021-44228" ,
"full_name" : "lhotari\/pulsar-docker-images-patch-CVE-2021-44228" ,
"owner" : {
"login" : "lhotari" ,
"id" : 66864 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4" ,
"html_url" : "https:\/\/github.com\/lhotari" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lhotari\/pulsar-docker-images-patch-CVE-2021-44228" ,
"description" : "Patch Pulsar Docker images with Log4J 2.17.1 update to mitigate Apache Log4J Security Vulnerabilities including Log4Shell" ,
"fork" : false ,
"created_at" : "2021-12-10T15:46:49Z" ,
"updated_at" : "2024-08-24T16:05:13Z" ,
"pushed_at" : "2022-01-13T06:40:43Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"docker" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437034295 ,
"name" : "Apache-Log4j2-RCE" ,
"full_name" : "1in9e\/Apache-Log4j2-RCE" ,
"owner" : {
"login" : "1in9e" ,
"id" : 15817052 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15817052?v=4" ,
"html_url" : "https:\/\/github.com\/1in9e" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/1in9e\/Apache-Log4j2-RCE" ,
"description" : "Apache Log4j2 RCE( CVE-2021-44228)验证环境" ,
"fork" : false ,
"created_at" : "2021-12-10T15:57:14Z" ,
"updated_at" : "2024-08-12T20:18:44Z" ,
"pushed_at" : "2021-12-10T15:58:25Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"apache" ,
"bugbounty" ,
"cve-2021-44228" ,
"java" ,
"log4j2" ,
"rce" ,
"security"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437056774 ,
"name" : "CVE-2021-44228-example" ,
"full_name" : "KosmX\/CVE-2021-44228-example" ,
"owner" : {
"login" : "KosmX" ,
"id" : 15692868 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15692868?v=4" ,
"html_url" : "https:\/\/github.com\/KosmX" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/KosmX\/CVE-2021-44228-example" ,
"description" : "vulnerability POC" ,
"fork" : false ,
"created_at" : "2021-12-10T17:13:18Z" ,
"updated_at" : "2023-08-15T12:50:54Z" ,
"pushed_at" : "2021-12-17T17:16:30Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2021-44228" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437060009 ,
"name" : "CVE-2021-44228" ,
"full_name" : "greymd\/CVE-2021-44228" ,
"owner" : {
"login" : "greymd" ,
"id" : 3874767 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4" ,
"html_url" : "https:\/\/github.com\/greymd" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/greymd\/CVE-2021-44228" ,
"description" : "Vulnerability CVE-2021-44228 checker" ,
"fork" : false ,
"created_at" : "2021-12-10T17:24:47Z" ,
"updated_at" : "2024-08-12T20:18:44Z" ,
"pushed_at" : "2021-12-13T15:16:23Z" ,
"stargazers_count" : 35 ,
"watchers_count" : 35 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 35 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437071396 ,
"name" : "CVE-2021-44228-Log4Shell-Hashes" ,
"full_name" : "mubix\/CVE-2021-44228-Log4Shell-Hashes" ,
"owner" : {
"login" : "mubix" ,
"id" : 679319 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/679319?v=4" ,
"html_url" : "https:\/\/github.com\/mubix" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mubix\/CVE-2021-44228-Log4Shell-Hashes" ,
"description" : "Hashes for vulnerable LOG4J versions" ,
"fork" : false ,
"created_at" : "2021-12-10T18:06:06Z" ,
"updated_at" : "2024-08-12T20:18:44Z" ,
"pushed_at" : "2021-12-17T17:02:24Z" ,
"stargazers_count" : 154 ,
"watchers_count" : 154 ,
"has_discussions" : false ,
"forks_count" : 35 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 35 ,
"watchers" : 154 ,
"score" : 0 ,
"subscribers_count" : 14
} ,
{
"id" : 437091396 ,
"name" : "mc-log4j-patcher" ,
"full_name" : "OopsieWoopsie\/mc-log4j-patcher" ,
"owner" : {
"login" : "OopsieWoopsie" ,
"id" : 15069175 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15069175?v=4" ,
"html_url" : "https:\/\/github.com\/OopsieWoopsie" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/OopsieWoopsie\/mc-log4j-patcher" ,
"description" : "CVE-2021-44228 server-side fix for minecraft servers." ,
"fork" : false ,
"created_at" : "2021-12-10T19:25:31Z" ,
"updated_at" : "2023-11-08T22:32:59Z" ,
"pushed_at" : "2021-12-10T19:47:45Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
2024-12-17 07:32:16 +01:00
"forks_count" : 1 ,
2024-11-28 19:31:51 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"fix" ,
"log4j2" ,
"minecraft" ,
"paper" ,
"spigot"
] ,
"visibility" : "public" ,
2024-12-17 07:32:16 +01:00
"forks" : 1 ,
2024-11-28 19:31:51 +01:00
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437097787 ,
"name" : "CVE-2021-44228-kusto" ,
"full_name" : "wheez-y\/CVE-2021-44228-kusto" ,
"owner" : {
"login" : "wheez-y" ,
"id" : 77060088 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/77060088?v=4" ,
"html_url" : "https:\/\/github.com\/wheez-y" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/wheez-y\/CVE-2021-44228-kusto" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-10T19:53:32Z" ,
"updated_at" : "2021-12-10T19:55:16Z" ,
"pushed_at" : "2021-12-10T19:55:14Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437108119 ,
"name" : "log4shell-mitigation" ,
"full_name" : "izzyacademy\/log4shell-mitigation" ,
"owner" : {
"login" : "izzyacademy" ,
"id" : 44282278 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44282278?v=4" ,
"html_url" : "https:\/\/github.com\/izzyacademy" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/izzyacademy\/log4shell-mitigation" ,
"description" : "Mitigation for Log4Shell Security Vulnerability CVE-2021-44228 " ,
"fork" : false ,
"created_at" : "2021-12-10T20:39:56Z" ,
"updated_at" : "2021-12-11T16:21:03Z" ,
"pushed_at" : "2021-12-11T16:21:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437116864 ,
"name" : "CVE-2021-44228-poc" ,
"full_name" : "Kadantte\/CVE-2021-44228-poc" ,
"owner" : {
"login" : "Kadantte" ,
"id" : 11579313 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11579313?v=4" ,
"html_url" : "https:\/\/github.com\/Kadantte" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Kadantte\/CVE-2021-44228-poc" ,
"description" : "log4shell sample application (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-10T21:20:05Z" ,
"updated_at" : "2021-12-10T21:20:06Z" ,
"pushed_at" : "2021-12-10T21:15:23Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437122153 ,
"name" : "log4j-detect" ,
"full_name" : "takito1812\/log4j-detect" ,
"owner" : {
"login" : "takito1812" ,
"id" : 56491288 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56491288?v=4" ,
"html_url" : "https:\/\/github.com\/takito1812" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/takito1812\/log4j-detect" ,
"description" : "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading" ,
"fork" : false ,
"created_at" : "2021-12-10T21:46:18Z" ,
"updated_at" : "2024-10-27T02:07:47Z" ,
"pushed_at" : "2021-12-13T22:27:25Z" ,
"stargazers_count" : 195 ,
"watchers_count" : 195 ,
"has_discussions" : false ,
"forks_count" : 57 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 57 ,
"watchers" : 195 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 437124793 ,
"name" : "log4noshell" ,
"full_name" : "winnpixie\/log4noshell" ,
"owner" : {
"login" : "winnpixie" ,
"id" : 31022473 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4" ,
"html_url" : "https:\/\/github.com\/winnpixie" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/winnpixie\/log4noshell" ,
"description" : "A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 (\"Log4Shell\")." ,
"fork" : false ,
"created_at" : "2021-12-10T21:59:31Z" ,
"updated_at" : "2024-10-30T09:59:36Z" ,
"pushed_at" : "2024-10-30T09:59:33Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"apache" ,
"cve" ,
"log4j" ,
"patch" ,
"security" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437128632 ,
"name" : "CVE-2021-44228-DFIR-Notes" ,
"full_name" : "Azeemering\/CVE-2021-44228-DFIR-Notes" ,
"owner" : {
"login" : "Azeemering" ,
"id" : 31852867 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31852867?v=4" ,
"html_url" : "https:\/\/github.com\/Azeemering" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Azeemering\/CVE-2021-44228-DFIR-Notes" ,
"description" : "CVE-2021-44228 DFIR Notes" ,
"fork" : false ,
"created_at" : "2021-12-10T22:19:16Z" ,
"updated_at" : "2024-08-12T20:18:45Z" ,
"pushed_at" : "2021-12-14T12:15:16Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437131550 ,
"name" : "CVE-2021-44228-PoC-log4j-bypass-words" ,
"full_name" : "Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words" ,
"owner" : {
"login" : "Puliczek" ,
"id" : 12344862 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12344862?v=4" ,
"html_url" : "https:\/\/github.com\/Puliczek" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words" ,
"description" : "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks" ,
"fork" : false ,
"created_at" : "2021-12-10T22:35:00Z" ,
2024-12-05 19:32:32 +01:00
"updated_at" : "2024-12-05T15:40:08Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2022-01-15T16:18:44Z" ,
2024-12-05 19:32:32 +01:00
"stargazers_count" : 935 ,
"watchers_count" : 935 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 142 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"bugbounttips" ,
"bugbounty" ,
"bugbounty-writeups" ,
"cve" ,
"cve-2021-44228" ,
"cve-2021-45046" ,
"cve-2021-45105" ,
"cybersecurity" ,
"exploit" ,
"hacking" ,
"log4j" ,
"payload" ,
"pentest" ,
"pentesting" ,
"poc" ,
"red-team" ,
"security" ,
"security-writeups" ,
"writeups"
] ,
"visibility" : "public" ,
"forks" : 142 ,
2024-12-05 19:32:32 +01:00
"watchers" : 935 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 25
} ,
{
"id" : 437139341 ,
"name" : "log4j-shell-poc" ,
"full_name" : "kozmer\/log4j-shell-poc" ,
"owner" : {
"login" : "kozmer" ,
"id" : 87979263 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4" ,
"html_url" : "https:\/\/github.com\/kozmer" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kozmer\/log4j-shell-poc" ,
"description" : "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. " ,
"fork" : false ,
"created_at" : "2021-12-10T23:19:28Z" ,
2024-12-17 19:33:22 +01:00
"updated_at" : "2024-12-17T15:04:44Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2024-02-12T22:37:25Z" ,
2024-12-17 19:33:22 +01:00
"stargazers_count" : 1809 ,
"watchers_count" : 1809 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
2024-12-08 07:31:39 +01:00
"forks_count" : 529 ,
2024-11-28 19:31:51 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"java" ,
"log4j" ,
"security"
] ,
"visibility" : "public" ,
2024-12-08 07:31:39 +01:00
"forks" : 529 ,
2024-12-17 19:33:22 +01:00
"watchers" : 1809 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 26
} ,
{
"id" : 437141854 ,
"name" : "cve-2021-44228-workaround-buildpack" ,
"full_name" : "alexandreroman\/cve-2021-44228-workaround-buildpack" ,
"owner" : {
"login" : "alexandreroman" ,
"id" : 665131 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/665131?v=4" ,
"html_url" : "https:\/\/github.com\/alexandreroman" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/alexandreroman\/cve-2021-44228-workaround-buildpack" ,
"description" : "Buildpack providing a workaround for CVE-2021-44228 (Log4j RCE exploit)" ,
"fork" : false ,
"created_at" : "2021-12-10T23:34:52Z" ,
"updated_at" : "2022-10-06T19:08:01Z" ,
"pushed_at" : "2021-12-10T23:47:14Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437141974 ,
"name" : "minecraft-log4j-honeypot" ,
"full_name" : "Adikso\/minecraft-log4j-honeypot" ,
"owner" : {
"login" : "Adikso" ,
"id" : 1407751 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1407751?v=4" ,
"html_url" : "https:\/\/github.com\/Adikso" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Adikso\/minecraft-log4j-honeypot" ,
"description" : "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam" ,
"fork" : false ,
"created_at" : "2021-12-10T23:35:31Z" ,
"updated_at" : "2024-09-02T19:21:15Z" ,
"pushed_at" : "2021-12-14T13:43:35Z" ,
"stargazers_count" : 101 ,
"watchers_count" : 101 ,
"has_discussions" : false ,
"forks_count" : 20 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"exploit" ,
"log4j" ,
"minecraft"
] ,
"visibility" : "public" ,
"forks" : 20 ,
"watchers" : 101 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437142312 ,
"name" : "CVE-2021-44228" ,
"full_name" : "racoon-rac\/CVE-2021-44228" ,
"owner" : {
"login" : "racoon-rac" ,
"id" : 64579294 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4" ,
"html_url" : "https:\/\/github.com\/racoon-rac" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/racoon-rac\/CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-10T23:37:55Z" ,
"updated_at" : "2021-12-11T01:11:19Z" ,
"pushed_at" : "2023-08-29T19:02:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437142703 ,
"name" : "CVE-2021-44228-PoC" ,
"full_name" : "TheArqsz\/CVE-2021-44228-PoC" ,
"owner" : {
"login" : "TheArqsz" ,
"id" : 38382850 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38382850?v=4" ,
"html_url" : "https:\/\/github.com\/TheArqsz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/TheArqsz\/CVE-2021-44228-PoC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-10T23:40:39Z" ,
"updated_at" : "2021-12-17T15:29:24Z" ,
"pushed_at" : "2021-12-17T15:29:08Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437155858 ,
"name" : "log4shelldetect" ,
"full_name" : "1lann\/log4shelldetect" ,
"owner" : {
"login" : "1lann" ,
"id" : 804919 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/804919?v=4" ,
"html_url" : "https:\/\/github.com\/1lann" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/1lann\/log4shelldetect" ,
"description" : "Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or \"that Log4j JNDI exploit\" by inspecting the class paths inside files" ,
"fork" : false ,
"created_at" : "2021-12-11T01:08:00Z" ,
"updated_at" : "2024-11-15T10:28:16Z" ,
"pushed_at" : "2022-01-05T23:07:50Z" ,
"stargazers_count" : 45 ,
"watchers_count" : 45 ,
"has_discussions" : false ,
"forks_count" : 8 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"log4j" ,
"log4j2" ,
"log4shell" ,
"scanner" ,
"vulnerability-scanners"
] ,
"visibility" : "public" ,
"forks" : 8 ,
"watchers" : 45 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 437164940 ,
"name" : "Log4j2-RCE" ,
"full_name" : "binganao\/Log4j2-RCE" ,
"owner" : {
"login" : "binganao" ,
"id" : 70050083 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4" ,
"html_url" : "https:\/\/github.com\/binganao" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/binganao\/Log4j2-RCE" ,
"description" : "Log4j2 CVE-2021-44228 复现和回显利用" ,
"fork" : false ,
"created_at" : "2021-12-11T02:08:41Z" ,
"updated_at" : "2021-12-27T05:55:01Z" ,
"pushed_at" : "2021-12-11T03:38:03Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437170557 ,
"name" : "sample-ldap-exploit" ,
"full_name" : "phoswald\/sample-ldap-exploit" ,
"owner" : {
"login" : "phoswald" ,
"id" : 12776329 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4" ,
"html_url" : "https:\/\/github.com\/phoswald" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/phoswald\/sample-ldap-exploit" ,
"description" : "A short demo of CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T02:45:39Z" ,
"updated_at" : "2024-08-12T20:18:45Z" ,
"pushed_at" : "2021-12-13T09:20:35Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437174339 ,
"name" : "jndi-ldap-test-server" ,
"full_name" : "rakutentech\/jndi-ldap-test-server" ,
"owner" : {
"login" : "rakutentech" ,
"id" : 1415441 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1415441?v=4" ,
"html_url" : "https:\/\/github.com\/rakutentech" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/rakutentech\/jndi-ldap-test-server" ,
"description" : "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228." ,
"fork" : false ,
"created_at" : "2021-12-11T03:08:14Z" ,
"updated_at" : "2024-06-11T12:40:21Z" ,
"pushed_at" : "2021-12-13T16:17:03Z" ,
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"jndi" ,
"ldap" ,
"log4j" ,
"log4j2" ,
"vulnerability-detection"
] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 11 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 437186290 ,
"name" : "cve-2021-44228--spring-hibernate" ,
"full_name" : "uint0\/cve-2021-44228--spring-hibernate" ,
"owner" : {
"login" : "uint0" ,
"id" : 11325389 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4" ,
"html_url" : "https:\/\/github.com\/uint0" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/uint0\/cve-2021-44228--spring-hibernate" ,
"description" : "CVE-2021-44228 POC - Spring \/ Hibernate" ,
"fork" : false ,
"created_at" : "2021-12-11T04:23:22Z" ,
"updated_at" : "2021-12-15T05:36:58Z" ,
"pushed_at" : "2021-12-11T06:25:12Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437214791 ,
"name" : "log4j-vulnerability-patcher-agent" ,
"full_name" : "saharNooby\/log4j-vulnerability-patcher-agent" ,
"owner" : {
"login" : "saharNooby" ,
"id" : 10616794 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10616794?v=4" ,
"html_url" : "https:\/\/github.com\/saharNooby" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/saharNooby\/log4j-vulnerability-patcher-agent" ,
"description" : "Fixes CVE-2021-44228 in log4j by patching JndiLookup class" ,
"fork" : false ,
"created_at" : "2021-12-11T07:16:21Z" ,
"updated_at" : "2023-06-19T16:50:28Z" ,
"pushed_at" : "2021-12-11T07:34:01Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"agent" ,
"bytecode" ,
"cve" ,
"fix" ,
"log4j" ,
"patch"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437215271 ,
"name" : "log4j2burpscanner" ,
"full_name" : "f0ng\/log4j2burpscanner" ,
"owner" : {
"login" : "f0ng" ,
"id" : 48286013 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4" ,
"html_url" : "https:\/\/github.com\/f0ng" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/f0ng\/log4j2burpscanner" ,
"description" : "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks" ,
"fork" : false ,
"created_at" : "2021-12-11T07:19:11Z" ,
2024-12-15 13:31:51 +01:00
"updated_at" : "2024-12-15T07:54:07Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2023-06-13T09:17:54Z" ,
2024-12-15 13:31:51 +01:00
"stargazers_count" : 803 ,
"watchers_count" : 803 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 111 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"burp-extensions" ,
"burp-plugin" ,
"log4j2" ,
"log4jshell"
] ,
"visibility" : "public" ,
"forks" : 111 ,
2024-12-15 13:31:51 +01:00
"watchers" : 803 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 11
} ,
{
"id" : 437221795 ,
"name" : "CVE-2021-44228-Log4j-lookup-Rce" ,
"full_name" : "M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce" ,
"owner" : {
"login" : "M1ngGod" ,
"id" : 81064151 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/81064151?v=4" ,
"html_url" : "https:\/\/github.com\/M1ngGod" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-11T07:55:45Z" ,
"updated_at" : "2023-08-15T12:51:02Z" ,
"pushed_at" : "2021-12-11T08:07:20Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437244092 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce" ,
"full_name" : "byteboycn\/CVE-2021-44228-Apache-Log4j-Rce" ,
"owner" : {
"login" : "byteboycn" ,
"id" : 14987996 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14987996?v=4" ,
"html_url" : "https:\/\/github.com\/byteboycn" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/byteboycn\/CVE-2021-44228-Apache-Log4j-Rce" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-11T09:52:36Z" ,
"updated_at" : "2023-06-20T16:41:33Z" ,
"pushed_at" : "2021-12-11T09:53:39Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437248883 ,
"name" : "log4shell-mitigation-tester" ,
"full_name" : "lhotari\/log4shell-mitigation-tester" ,
"owner" : {
"login" : "lhotari" ,
"id" : 66864 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4" ,
"html_url" : "https:\/\/github.com\/lhotari" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester" ,
"description" : "Log4Shell CVE-2021-44228 mitigation tester" ,
"fork" : false ,
"created_at" : "2021-12-11T10:16:58Z" ,
"updated_at" : "2021-12-21T20:05:48Z" ,
"pushed_at" : "2021-12-13T17:24:37Z" ,
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 16 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437249303 ,
"name" : "log4j-rce-detect-waf-bypass" ,
"full_name" : "toramanemre\/log4j-rce-detect-waf-bypass" ,
"owner" : {
"login" : "toramanemre" ,
"id" : 24626967 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4" ,
"html_url" : "https:\/\/github.com\/toramanemre" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/toramanemre\/log4j-rce-detect-waf-bypass" ,
"description" : "A Nuclei Template for Apache Log4j RCE (CVE-2021-44228) Detection with WAF Bypass Payloads" ,
"fork" : false ,
"created_at" : "2021-12-11T10:19:01Z" ,
"updated_at" : "2024-08-12T20:18:46Z" ,
"pushed_at" : "2021-12-11T10:19:51Z" ,
"stargazers_count" : 22 ,
"watchers_count" : 22 ,
"has_discussions" : false ,
"forks_count" : 9 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 9 ,
"watchers" : 22 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437261211 ,
"name" : "CVE-2021-44228-Scanner" ,
"full_name" : "logpresso\/CVE-2021-44228-Scanner" ,
"owner" : {
"login" : "logpresso" ,
"id" : 14171714 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14171714?v=4" ,
"html_url" : "https:\/\/github.com\/logpresso" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner" ,
"description" : "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T11:18:46Z" ,
2024-12-11 13:33:29 +01:00
"updated_at" : "2024-12-11T09:13:46Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2022-04-07T14:47:03Z" ,
2024-12-11 13:33:29 +01:00
"stargazers_count" : 852 ,
"watchers_count" : 852 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 173 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-4104" ,
"cve-2021-42550" ,
"cve-2021-44228" ,
"cve-2021-44832" ,
"cve-2021-45046" ,
"cve-2021-45105" ,
"cve-2022-23302" ,
"cve-2022-23305" ,
"cve-2022-23307" ,
"log4j2" ,
"patch" ,
"scanner"
] ,
"visibility" : "public" ,
"forks" : 173 ,
2024-12-11 13:33:29 +01:00
"watchers" : 852 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 33
} ,
{
"id" : 437265194 ,
"name" : "Log4j_CVE-2021-44228" ,
"full_name" : "vorburger\/Log4j_CVE-2021-44228" ,
"owner" : {
"login" : "vorburger" ,
"id" : 298598 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/298598?v=4" ,
"html_url" : "https:\/\/github.com\/vorburger" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/vorburger\/Log4j_CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-11T11:38:16Z" ,
"updated_at" : "2024-08-12T20:18:46Z" ,
"pushed_at" : "2022-02-16T21:58:54Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : true ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437265792 ,
"name" : "log4j2021_vul_test" ,
"full_name" : "gauthamg\/log4j2021_vul_test" ,
"owner" : {
"login" : "gauthamg" ,
"id" : 8748677 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4" ,
"html_url" : "https:\/\/github.com\/gauthamg" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/gauthamg\/log4j2021_vul_test" ,
"description" : "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T11:41:04Z" ,
"updated_at" : "2021-12-13T06:49:35Z" ,
"pushed_at" : "2021-12-13T06:49:32Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437273514 ,
"name" : "CVE-2021-44228-playground" ,
"full_name" : "b-abderrahmane\/CVE-2021-44228-playground" ,
"owner" : {
"login" : "b-abderrahmane" ,
"id" : 10504574 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10504574?v=4" ,
"html_url" : "https:\/\/github.com\/b-abderrahmane" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/b-abderrahmane\/CVE-2021-44228-playground" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-11T12:16:45Z" ,
"updated_at" : "2024-04-29T17:48:37Z" ,
2024-12-04 01:31:54 +01:00
"pushed_at" : "2024-12-03T19:03:28Z" ,
2024-11-28 19:31:51 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437278973 ,
"name" : "CVE-2021-44228-Advisories" ,
"full_name" : "leetxyz\/CVE-2021-44228-Advisories" ,
"owner" : {
"login" : "leetxyz" ,
"id" : 46599191 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46599191?v=4" ,
"html_url" : "https:\/\/github.com\/leetxyz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/leetxyz\/CVE-2021-44228-Advisories" ,
"description" : "List of company advisories log4j" ,
"fork" : false ,
"created_at" : "2021-12-11T12:41:38Z" ,
"updated_at" : "2024-08-12T20:18:46Z" ,
"pushed_at" : "2021-12-12T09:46:17Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437283982 ,
"name" : "log4shell" ,
"full_name" : "cado-security\/log4shell" ,
"owner" : {
"login" : "cado-security" ,
"id" : 63289041 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63289041?v=4" ,
"html_url" : "https:\/\/github.com\/cado-security" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/cado-security\/log4shell" ,
"description" : "Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T13:03:31Z" ,
"updated_at" : "2022-03-02T21:45:15Z" ,
"pushed_at" : "2021-12-11T14:52:30Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"log4shell" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 437289885 ,
"name" : "Log4J_0day_RCE" ,
"full_name" : "WYSIIWYG\/Log4J_0day_RCE" ,
"owner" : {
"login" : "WYSIIWYG" ,
"id" : 95032387 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/95032387?v=4" ,
"html_url" : "https:\/\/github.com\/WYSIIWYG" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/WYSIIWYG\/Log4J_0day_RCE" ,
"description" : "Log4j-RCE (CVE-2021-44228) Proof of Concept" ,
"fork" : false ,
"created_at" : "2021-12-11T13:28:52Z" ,
"updated_at" : "2024-08-12T20:18:46Z" ,
"pushed_at" : "2021-12-11T13:31:47Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437296454 ,
"name" : "log4j-vulnerable-app-cve-2021-44228-terraform" ,
"full_name" : "mkhazamipour\/log4j-vulnerable-app-cve-2021-44228-terraform" ,
"owner" : {
"login" : "mkhazamipour" ,
"id" : 23025217 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23025217?v=4" ,
"html_url" : "https:\/\/github.com\/mkhazamipour" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mkhazamipour\/log4j-vulnerable-app-cve-2021-44228-terraform" ,
"description" : "A Terraform to deploy vulnerable app and a JDNIExploit to work with CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T13:56:28Z" ,
"updated_at" : "2022-01-25T17:42:11Z" ,
"pushed_at" : "2021-12-11T14:53:38Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437310436 ,
"name" : "log4j-CVE-2021-44228-Public-IoCs" ,
"full_name" : "Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs" ,
"owner" : {
"login" : "Sh0ckFR" ,
"id" : 10033649 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10033649?v=4" ,
"html_url" : "https:\/\/github.com\/Sh0ckFR" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs" ,
"description" : "Public IoCs about log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T14:54:45Z" ,
"updated_at" : "2024-08-12T20:18:46Z" ,
"pushed_at" : "2021-12-17T10:14:30Z" ,
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 9 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437316134 ,
"name" : "log4j2-vulnerable-spring-app" ,
"full_name" : "zzzz0317\/log4j2-vulnerable-spring-app" ,
"owner" : {
"login" : "zzzz0317" ,
"id" : 16097046 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4" ,
"html_url" : "https:\/\/github.com\/zzzz0317" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T15:18:42Z" ,
"updated_at" : "2023-10-23T06:12:54Z" ,
"pushed_at" : "2021-12-13T02:14:14Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437319619 ,
"name" : "test-44228" ,
"full_name" : "datadavev\/test-44228" ,
"owner" : {
"login" : "datadavev" ,
"id" : 605409 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/605409?v=4" ,
"html_url" : "https:\/\/github.com\/datadavev" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/datadavev\/test-44228" ,
"description" : "Simple demo of CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T15:33:17Z" ,
"updated_at" : "2021-12-11T15:42:35Z" ,
"pushed_at" : "2022-01-04T16:56:11Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437323133 ,
"name" : "JndiRemover" ,
"full_name" : "LemonCraftRu\/JndiRemover" ,
"owner" : {
"login" : "LemonCraftRu" ,
"id" : 73554117 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73554117?v=4" ,
"html_url" : "https:\/\/github.com\/LemonCraftRu" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/LemonCraftRu\/JndiRemover" ,
"description" : "Небольшой мод направленный на устранение уязвимости CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T15:48:03Z" ,
"updated_at" : "2022-01-08T19:26:15Z" ,
"pushed_at" : "2022-02-07T20:44:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"jndi-exploit" ,
"log4j" ,
"minecraft-mod"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437327955 ,
"name" : "Log4j-Rec-CVE-2021-44228" ,
"full_name" : "zhangxvx\/Log4j-Rec-CVE-2021-44228" ,
"owner" : {
"login" : "zhangxvx" ,
"id" : 19684449 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/19684449?v=4" ,
"html_url" : "https:\/\/github.com\/zhangxvx" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/zhangxvx\/Log4j-Rec-CVE-2021-44228" ,
"description" : "Apache Log4j CVE-2021-44228 漏洞复现" ,
"fork" : false ,
"created_at" : "2021-12-11T16:08:34Z" ,
"updated_at" : "2021-12-12T03:50:45Z" ,
"pushed_at" : "2021-12-12T03:49:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437327995 ,
"name" : "Log4j-CVE-Detect" ,
"full_name" : "darkarnium\/Log4j-CVE-Detect" ,
"owner" : {
"login" : "darkarnium" ,
"id" : 3048394 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3048394?v=4" ,
"html_url" : "https:\/\/github.com\/darkarnium" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/darkarnium\/Log4j-CVE-Detect" ,
"description" : "Detections for CVE-2021-44228 inside of nested binaries" ,
"fork" : false ,
"created_at" : "2021-12-11T16:08:47Z" ,
"updated_at" : "2024-08-12T20:18:47Z" ,
"pushed_at" : "2021-12-18T22:20:25Z" ,
"stargazers_count" : 34 ,
"watchers_count" : 34 ,
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"binary" ,
"cve-2021-44228" ,
"cve-2021-45046" ,
"detection" ,
"devops" ,
"python" ,
"sca" ,
"security"
] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 34 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437381453 ,
"name" : "CVE-2021-44228_Example" ,
"full_name" : "chilliwebs\/CVE-2021-44228_Example" ,
"owner" : {
"login" : "chilliwebs" ,
"id" : 6079309 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6079309?v=4" ,
"html_url" : "https:\/\/github.com\/chilliwebs" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/chilliwebs\/CVE-2021-44228_Example" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-11T20:25:08Z" ,
"updated_at" : "2022-01-03T13:51:27Z" ,
"pushed_at" : "2021-12-15T20:27:59Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437397347 ,
"name" : "f5-waf-enforce-sig-CVE-2021-44228" ,
"full_name" : "irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228" ,
"owner" : {
"login" : "irgoncalves" ,
"id" : 23459099 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4" ,
"html_url" : "https:\/\/github.com\/irgoncalves" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228" ,
"description" : "This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device" ,
"fork" : false ,
"created_at" : "2021-12-11T21:59:19Z" ,
"updated_at" : "2024-04-07T21:37:20Z" ,
"pushed_at" : "2021-12-15T18:56:57Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437407625 ,
"name" : "log4j-docker-vaccine" ,
"full_name" : "jeffbryner\/log4j-docker-vaccine" ,
"owner" : {
"login" : "jeffbryner" ,
"id" : 566889 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/566889?v=4" ,
"html_url" : "https:\/\/github.com\/jeffbryner" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jeffbryner\/log4j-docker-vaccine" ,
"description" : "docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-11T23:06:23Z" ,
"updated_at" : "2022-05-22T02:50:49Z" ,
"pushed_at" : "2021-12-12T00:15:23Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437419010 ,
"name" : "log4j-detector" ,
"full_name" : "mergebase\/log4j-detector" ,
"owner" : {
"login" : "mergebase" ,
"id" : 73667397 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4" ,
"html_url" : "https:\/\/github.com\/mergebase" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mergebase\/log4j-detector" ,
"description" : "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC" ,
"fork" : false ,
"created_at" : "2021-12-12T00:29:03Z" ,
"updated_at" : "2024-11-12T20:26:27Z" ,
"pushed_at" : "2022-03-10T18:44:50Z" ,
"stargazers_count" : 638 ,
"watchers_count" : 638 ,
"has_discussions" : false ,
"forks_count" : 98 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"cve-2021-45105" ,
"cybersecurity" ,
"detector" ,
"log4j" ,
"log4shell" ,
"pentest" ,
"sca" ,
"scanner" ,
"vulnerability-scanner"
] ,
"visibility" : "public" ,
"forks" : 98 ,
"watchers" : 638 ,
"score" : 0 ,
"subscribers_count" : 28
} ,
{
"id" : 437426248 ,
"name" : "log4j2-rce-poc" ,
"full_name" : "unlimitedsola\/log4j2-rce-poc" ,
"owner" : {
"login" : "unlimitedsola" ,
"id" : 3632663 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3632663?v=4" ,
"html_url" : "https:\/\/github.com\/unlimitedsola" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/unlimitedsola\/log4j2-rce-poc" ,
"description" : "A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228\/Log4Shell)." ,
"fork" : false ,
"created_at" : "2021-12-12T01:23:45Z" ,
"updated_at" : "2023-04-17T21:10:43Z" ,
"pushed_at" : "2021-12-12T09:59:26Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j2" ,
"log4shell" ,
"poc" ,
"proof-of-concept" ,
"rce" ,
"remote-code-execution"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437426359 ,
"name" : "log4j2burpscanner" ,
"full_name" : "Jeromeyoung\/log4j2burpscanner" ,
"owner" : {
"login" : "Jeromeyoung" ,
"id" : 39945364 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4" ,
"html_url" : "https:\/\/github.com\/Jeromeyoung" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Jeromeyoung\/log4j2burpscanner" ,
"description" : "CVE-2021-44228, log4j2 burp插件 Java版本, dnslog选取了非dnslog.cn域名" ,
"fork" : false ,
"created_at" : "2021-12-12T01:24:39Z" ,
2024-11-29 13:32:27 +01:00
"updated_at" : "2024-11-29T09:15:29Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2021-12-11T10:39:41Z" ,
2024-11-29 13:32:27 +01:00
"stargazers_count" : 31 ,
"watchers_count" : 31 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 38 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 38 ,
2024-11-29 13:32:27 +01:00
"watchers" : 31 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437426386 ,
"name" : "hotpatch-for-apache-log4j2" ,
"full_name" : "corretto\/hotpatch-for-apache-log4j2" ,
"owner" : {
"login" : "corretto" ,
"id" : 44104058 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44104058?v=4" ,
"html_url" : "https:\/\/github.com\/corretto" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/corretto\/hotpatch-for-apache-log4j2" ,
"description" : "An agent to hotpatch the log4j RCE from CVE-2021-44228." ,
"fork" : false ,
"created_at" : "2021-12-12T01:24:51Z" ,
2024-12-07 07:31:40 +01:00
"updated_at" : "2024-12-07T05:14:07Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2022-10-24T02:25:53Z" ,
2024-12-07 07:31:40 +01:00
"stargazers_count" : 492 ,
"watchers_count" : 492 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 72 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 72 ,
2024-12-07 07:31:40 +01:00
"watchers" : 492 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 25
} ,
{
"id" : 437438829 ,
"name" : "python-log4rce" ,
"full_name" : "alexandre-lavoie\/python-log4rce" ,
"owner" : {
"login" : "alexandre-lavoie" ,
"id" : 36684879 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36684879?v=4" ,
"html_url" : "https:\/\/github.com\/alexandre-lavoie" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/alexandre-lavoie\/python-log4rce" ,
"description" : "An All-In-One Pure Python PoC for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-12T02:57:49Z" ,
"updated_at" : "2024-11-25T23:28:13Z" ,
"pushed_at" : "2021-12-16T18:34:46Z" ,
"stargazers_count" : 175 ,
"watchers_count" : 175 ,
"has_discussions" : false ,
"forks_count" : 30 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cli" ,
"cve-2021-44228" ,
"log4j" ,
"python" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 30 ,
"watchers" : 175 ,
"score" : 0 ,
"subscribers_count" : 10
} ,
{
"id" : 437439106 ,
"name" : "Log4Shell_CVE-2021-44228_related_attacks_IOCs" ,
"full_name" : "RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs" ,
"owner" : {
"login" : "RedDrip7" ,
"id" : 51360411 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51360411?v=4" ,
"html_url" : "https:\/\/github.com\/RedDrip7" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T02:59:54Z" ,
"updated_at" : "2024-10-15T07:30:11Z" ,
"pushed_at" : "2021-12-15T10:19:51Z" ,
"stargazers_count" : 45 ,
"watchers_count" : 45 ,
"has_discussions" : false ,
"forks_count" : 9 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 9 ,
"watchers" : 45 ,
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 437440782 ,
"name" : "CVE-2021-44228-Demo" ,
"full_name" : "mzlogin\/CVE-2021-44228-Demo" ,
"owner" : {
"login" : "mzlogin" ,
"id" : 1646590 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1646590?v=4" ,
"html_url" : "https:\/\/github.com\/mzlogin" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mzlogin\/CVE-2021-44228-Demo" ,
"description" : "Apache Log4j2 CVE-2021-44228 RCE Demo with RMI and LDAP" ,
"fork" : false ,
"created_at" : "2021-12-12T03:11:14Z" ,
"updated_at" : "2024-08-12T20:18:49Z" ,
"pushed_at" : "2021-12-12T03:22:59Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"jndi" ,
"ldap" ,
"rmi"
] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437451451 ,
"name" : "vcenter-log4j" ,
"full_name" : "blake-fm\/vcenter-log4j" ,
"owner" : {
"login" : "blake-fm" ,
"id" : 89286531 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89286531?v=4" ,
"html_url" : "https:\/\/github.com\/blake-fm" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/blake-fm\/vcenter-log4j" ,
"description" : "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-12T04:23:10Z" ,
"updated_at" : "2022-08-17T05:28:16Z" ,
"pushed_at" : "2021-12-15T12:17:19Z" ,
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 16 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437479258 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce__review" ,
"full_name" : "creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review" ,
"owner" : {
"login" : "creamIcec" ,
"id" : 42510470 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42510470?v=4" ,
"html_url" : "https:\/\/github.com\/creamIcec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review" ,
"description" : "log4j2漏洞复现" ,
"fork" : false ,
"created_at" : "2021-12-12T07:20:03Z" ,
"updated_at" : "2021-12-12T07:20:03Z" ,
"pushed_at" : "2021-12-12T07:20:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437501121 ,
"name" : "cve-2021-44228-helpers" ,
"full_name" : "uint0\/cve-2021-44228-helpers" ,
"owner" : {
"login" : "uint0" ,
"id" : 11325389 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4" ,
"html_url" : "https:\/\/github.com\/uint0" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/uint0\/cve-2021-44228-helpers" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T09:21:09Z" ,
"updated_at" : "2021-12-13T00:01:22Z" ,
"pushed_at" : "2021-12-13T00:01:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437511755 ,
"name" : "apache-log4j-poc" ,
"full_name" : "RK800-DEV\/apache-log4j-poc" ,
"owner" : {
"login" : "RK800-DEV" ,
"id" : 85429713 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/85429713?v=4" ,
"html_url" : "https:\/\/github.com\/RK800-DEV" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/RK800-DEV\/apache-log4j-poc" ,
"description" : "CVE-2021-44228(Apache Log4j Remote Code Execution) " ,
"fork" : false ,
"created_at" : "2021-12-12T10:17:13Z" ,
"updated_at" : "2021-12-12T10:17:47Z" ,
"pushed_at" : "2021-12-12T10:17:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437512798 ,
"name" : "log4j-CVE-2021-44228" ,
"full_name" : "sud0x00\/log4j-CVE-2021-44228" ,
"owner" : {
"login" : "sud0x00" ,
"id" : 91898207 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/91898207?v=4" ,
"html_url" : "https:\/\/github.com\/sud0x00" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sud0x00\/log4j-CVE-2021-44228" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-12T10:22:45Z" ,
"updated_at" : "2023-11-07T01:40:01Z" ,
"pushed_at" : "2021-12-12T14:08:08Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2021-44228" ,
"security"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437518939 ,
"name" : "CVE-2021-44228-docker-example" ,
"full_name" : "DiCanio\/CVE-2021-44228-docker-example" ,
"owner" : {
"login" : "DiCanio" ,
"id" : 6052859 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6052859?v=4" ,
"html_url" : "https:\/\/github.com\/DiCanio" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/DiCanio\/CVE-2021-44228-docker-example" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T10:53:15Z" ,
"updated_at" : "2021-12-13T03:58:51Z" ,
"pushed_at" : "2021-12-13T00:03:51Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437525008 ,
"name" : "cve-2021-44228-minecraft-poc" ,
"full_name" : "myyxl\/cve-2021-44228-minecraft-poc" ,
"owner" : {
"login" : "myyxl" ,
"id" : 22593897 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22593897?v=4" ,
"html_url" : "https:\/\/github.com\/myyxl" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/myyxl\/cve-2021-44228-minecraft-poc" ,
"description" : "Log4J CVE-2021-44228 Minecraft PoC" ,
"fork" : false ,
"created_at" : "2021-12-12T11:22:51Z" ,
"updated_at" : "2022-02-15T06:41:00Z" ,
"pushed_at" : "2021-12-12T11:34:50Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell" ,
"poc"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437525445 ,
"name" : "Awesome-CVE-2021-44228" ,
"full_name" : "RrUZi\/Awesome-CVE-2021-44228" ,
"owner" : {
"login" : "RrUZi" ,
"id" : 43235635 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43235635?v=4" ,
"html_url" : "https:\/\/github.com\/RrUZi" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/RrUZi\/Awesome-CVE-2021-44228" ,
"description" : "An awesome curated list of repos for CVE-2021-44228. ``Apache Log4j 2``" ,
"fork" : false ,
"created_at" : "2021-12-12T11:25:00Z" ,
"updated_at" : "2021-12-12T11:35:58Z" ,
"pushed_at" : "2021-12-12T11:33:43Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j2"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437525803 ,
"name" : "CVE-2021-44228" ,
"full_name" : "future-client\/CVE-2021-44228" ,
"owner" : {
"login" : "future-client" ,
"id" : 122487775 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/122487775?v=4" ,
"html_url" : "https:\/\/github.com\/future-client" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/future-client\/CVE-2021-44228" ,
"description" : "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) " ,
"fork" : false ,
"created_at" : "2021-12-12T11:26:42Z" ,
"updated_at" : "2024-06-06T12:50:41Z" ,
"pushed_at" : "2021-12-12T17:37:11Z" ,
"stargazers_count" : 67 ,
"watchers_count" : 67 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"exploit" ,
"jndi" ,
"ldap" ,
"log4j" ,
"minecraft" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 67 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437526168 ,
"name" : "Log4JShell-Bytecode-Detector" ,
"full_name" : "CodeShield-Security\/Log4JShell-Bytecode-Detector" ,
"owner" : {
"login" : "CodeShield-Security" ,
"id" : 60257643 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60257643?v=4" ,
"html_url" : "https:\/\/github.com\/CodeShield-Security" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/CodeShield-Security\/Log4JShell-Bytecode-Detector" ,
"description" : "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-12T11:28:34Z" ,
"updated_at" : "2023-05-10T20:58:01Z" ,
"pushed_at" : "2022-02-23T19:10:53Z" ,
"stargazers_count" : 50 ,
"watchers_count" : 50 ,
"has_discussions" : false ,
"forks_count" : 9 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"bytecode" ,
"cve-2021-44228" ,
"log4j2" ,
"log4jshell" ,
"log4shell" ,
"scanner" ,
"security"
] ,
"visibility" : "public" ,
"forks" : 9 ,
"watchers" : 50 ,
"score" : 0 ,
"subscribers_count" : 8
} ,
{
"id" : 437526871 ,
"name" : "log4j-poc" ,
"full_name" : "Crane-Mocker\/log4j-poc" ,
"owner" : {
"login" : "Crane-Mocker" ,
"id" : 46662246 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46662246?v=4" ,
"html_url" : "https:\/\/github.com\/Crane-Mocker" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Crane-Mocker\/log4j-poc" ,
"description" : "Poc of log4j2 (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-12T11:31:45Z" ,
"updated_at" : "2023-01-27T21:00:19Z" ,
"pushed_at" : "2021-12-12T12:19:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437536404 ,
"name" : "divd-2021-00038--log4j-scanner" ,
"full_name" : "dtact\/divd-2021-00038--log4j-scanner" ,
"owner" : {
"login" : "dtact" ,
"id" : 65305480 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/65305480?v=4" ,
"html_url" : "https:\/\/github.com\/dtact" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dtact\/divd-2021-00038--log4j-scanner" ,
"description" : "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang." ,
"fork" : false ,
"created_at" : "2021-12-12T12:16:07Z" ,
"updated_at" : "2023-08-09T21:34:19Z" ,
"pushed_at" : "2021-12-28T22:21:52Z" ,
"stargazers_count" : 50 ,
"watchers_count" : 50 ,
"has_discussions" : false ,
"forks_count" : 11 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 11 ,
"watchers" : 50 ,
"score" : 0 ,
"subscribers_count" : 5
} ,
{
"id" : 437538957 ,
"name" : "CVE-2021-44228-log4Shell" ,
"full_name" : "kali-dass\/CVE-2021-44228-log4Shell" ,
"owner" : {
"login" : "kali-dass" ,
"id" : 28717904 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28717904?v=4" ,
"html_url" : "https:\/\/github.com\/kali-dass" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kali-dass\/CVE-2021-44228-log4Shell" ,
"description" : "Sample log4j shell exploit" ,
"fork" : false ,
"created_at" : "2021-12-12T12:27:39Z" ,
"updated_at" : "2022-09-07T20:25:29Z" ,
"pushed_at" : "2021-12-13T16:37:22Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437546559 ,
"name" : "log4j2-CVE-2021-44228" ,
"full_name" : "pravin-pp\/log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "pravin-pp" ,
"id" : 12995541 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4" ,
"html_url" : "https:\/\/github.com\/pravin-pp" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T13:00:38Z" ,
"updated_at" : "2021-12-13T04:00:49Z" ,
"pushed_at" : "2021-12-12T13:25:27Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437550473 ,
"name" : "Exploitation-of-Log4j2-CVE-2021-44228" ,
"full_name" : "Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "Malwar3Ninja" ,
"id" : 34618086 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/34618086?v=4" ,
"html_url" : "https:\/\/github.com\/Malwar3Ninja" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228" ,
"description" : "IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 " ,
"fork" : false ,
"created_at" : "2021-12-12T13:17:18Z" ,
"updated_at" : "2024-08-04T16:04:11Z" ,
"pushed_at" : "2021-12-19T12:42:02Z" ,
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 15 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437551037 ,
"name" : "docker-log4shell" ,
"full_name" : "urholaukkarinen\/docker-log4shell" ,
"owner" : {
"login" : "urholaukkarinen" ,
"id" : 5576504 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5576504?v=4" ,
"html_url" : "https:\/\/github.com\/urholaukkarinen" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/urholaukkarinen\/docker-log4shell" ,
"description" : "Dockerized Go app for testing the CVE-2021-44228 vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-12T13:19:50Z" ,
"updated_at" : "2021-12-12T13:23:50Z" ,
"pushed_at" : "2021-12-12T13:21:28Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437553138 ,
"name" : "scan4log4j" ,
"full_name" : "ssl\/scan4log4j" ,
"owner" : {
"login" : "ssl" ,
"id" : 25695071 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25695071?v=4" ,
"html_url" : "https:\/\/github.com\/ssl" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ssl\/scan4log4j" ,
"description" : "Python script that sends CVE-2021-44228 log4j payload requests to url list" ,
"fork" : false ,
"created_at" : "2021-12-12T13:28:31Z" ,
"updated_at" : "2024-09-28T10:29:18Z" ,
"pushed_at" : "2021-12-12T13:39:45Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 7 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 7 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437557116 ,
"name" : "nginx-mitigate-log4shell" ,
"full_name" : "infiniroot\/nginx-mitigate-log4shell" ,
"owner" : {
"login" : "infiniroot" ,
"id" : 29702565 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29702565?v=4" ,
"html_url" : "https:\/\/github.com\/infiniroot" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/infiniroot\/nginx-mitigate-log4shell" ,
"description" : "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script" ,
"fork" : false ,
"created_at" : "2021-12-12T13:45:08Z" ,
"updated_at" : "2024-05-10T08:52:50Z" ,
"pushed_at" : "2021-12-15T08:14:56Z" ,
"stargazers_count" : 38 ,
"watchers_count" : 38 ,
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4shell" ,
"lua" ,
"mitigation" ,
"nginx" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 38 ,
"score" : 0 ,
"subscribers_count" : 15
} ,
{
"id" : 437560690 ,
"name" : "log4j-cve-2021-44228" ,
"full_name" : "lohanichaten\/log4j-cve-2021-44228" ,
"owner" : {
"login" : "lohanichaten" ,
"id" : 70852336 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70852336?v=4" ,
"html_url" : "https:\/\/github.com\/lohanichaten" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lohanichaten\/log4j-cve-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T13:59:38Z" ,
"updated_at" : "2021-12-12T14:03:46Z" ,
"pushed_at" : "2021-12-12T14:03:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437562080 ,
"name" : "log4j-log4shell-affected" ,
"full_name" : "authomize\/log4j-log4shell-affected" ,
"owner" : {
"login" : "authomize" ,
"id" : 57180096 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57180096?v=4" ,
"html_url" : "https:\/\/github.com\/authomize" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/authomize\/log4j-log4shell-affected" ,
"description" : "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability " ,
"fork" : false ,
"created_at" : "2021-12-12T14:05:05Z" ,
"updated_at" : "2024-08-19T11:32:50Z" ,
"pushed_at" : "2021-12-19T07:40:25Z" ,
"stargazers_count" : 54 ,
"watchers_count" : 54 ,
"has_discussions" : false ,
"forks_count" : 8 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4j-rce"
] ,
"visibility" : "public" ,
"forks" : 8 ,
"watchers" : 54 ,
"score" : 0 ,
"subscribers_count" : 22
} ,
{
"id" : 437567489 ,
"name" : "CVE-2021-44228_IoCs" ,
"full_name" : "guardicode\/CVE-2021-44228_IoCs" ,
"owner" : {
"login" : "guardicode" ,
"id" : 64462782 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64462782?v=4" ,
"html_url" : "https:\/\/github.com\/guardicode" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/guardicode\/CVE-2021-44228_IoCs" ,
"description" : "Known IoCs for log4j framework vulnerability " ,
"fork" : false ,
"created_at" : "2021-12-12T14:27:28Z" ,
"updated_at" : "2022-01-02T08:53:49Z" ,
"pushed_at" : "2022-01-18T13:34:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 437574258 ,
"name" : "log4j-poc" ,
"full_name" : "fireflyingup\/log4j-poc" ,
"owner" : {
"login" : "fireflyingup" ,
"id" : 48504204 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4" ,
"html_url" : "https:\/\/github.com\/fireflyingup" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/fireflyingup\/log4j-poc" ,
"description" : "CVE-2021-44228 test demo" ,
"fork" : false ,
"created_at" : "2021-12-12T14:54:25Z" ,
"updated_at" : "2021-12-13T05:10:53Z" ,
"pushed_at" : "2021-12-13T05:10:50Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437575607 ,
"name" : "cve-2021-44228-qingteng-patch" ,
"full_name" : "qingtengyun\/cve-2021-44228-qingteng-patch" ,
"owner" : {
"login" : "qingtengyun" ,
"id" : 18526503 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4" ,
"html_url" : "https:\/\/github.com\/qingtengyun" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-patch" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T15:00:04Z" ,
2024-12-11 13:33:29 +01:00
"updated_at" : "2024-12-11T07:07:04Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2021-12-12T16:03:21Z" ,
2024-12-11 13:33:29 +01:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2024-12-11 13:33:29 +01:00
"watchers" : 9 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437582859 ,
"name" : "log4j-jndi-be-gone" ,
"full_name" : "nccgroup\/log4j-jndi-be-gone" ,
"owner" : {
"login" : "nccgroup" ,
"id" : 4067082 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4" ,
"html_url" : "https:\/\/github.com\/nccgroup" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/nccgroup\/log4j-jndi-be-gone" ,
"description" : "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability." ,
"fork" : false ,
"created_at" : "2021-12-12T15:29:20Z" ,
"updated_at" : "2023-11-03T08:18:38Z" ,
"pushed_at" : "2022-01-04T02:03:58Z" ,
"stargazers_count" : 71 ,
"watchers_count" : 71 ,
"has_discussions" : false ,
"forks_count" : 17 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 17 ,
"watchers" : 71 ,
"score" : 0 ,
"subscribers_count" : 12
} ,
{
"id" : 437583301 ,
"name" : "cve-2021-44228-qingteng-online-patch" ,
"full_name" : "qingtengyun\/cve-2021-44228-qingteng-online-patch" ,
"owner" : {
"login" : "qingtengyun" ,
"id" : 18526503 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4" ,
"html_url" : "https:\/\/github.com\/qingtengyun" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-online-patch" ,
"description" : "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself." ,
"fork" : false ,
"created_at" : "2021-12-12T15:30:55Z" ,
2024-12-11 13:33:29 +01:00
"updated_at" : "2024-12-11T07:07:15Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2022-01-19T09:07:14Z" ,
"stargazers_count" : 26 ,
"watchers_count" : 26 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"log4j" ,
"log4jshell"
] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 26 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437586734 ,
"name" : "horrors-log4shell" ,
"full_name" : "tasooshi\/horrors-log4shell" ,
"owner" : {
"login" : "tasooshi" ,
"id" : 44586478 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44586478?v=4" ,
"html_url" : "https:\/\/github.com\/tasooshi" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/tasooshi\/horrors-log4shell" ,
"description" : "A micro lab for CVE-2021-44228 (log4j)" ,
"fork" : false ,
"created_at" : "2021-12-12T15:44:49Z" ,
"updated_at" : "2022-03-15T19:14:39Z" ,
"pushed_at" : "2022-02-22T00:27:58Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437602257 ,
"name" : "evil-rmi-server" ,
"full_name" : "Hydragyrum\/evil-rmi-server" ,
"owner" : {
"login" : "Hydragyrum" ,
"id" : 4928181 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4" ,
"html_url" : "https:\/\/github.com\/Hydragyrum" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Hydragyrum\/evil-rmi-server" ,
"description" : "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-12T16:49:45Z" ,
"updated_at" : "2024-08-12T20:18:50Z" ,
"pushed_at" : "2021-12-12T21:48:06Z" ,
"stargazers_count" : 12 ,
"watchers_count" : 12 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 12 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437603411 ,
"name" : "spring-boot-log4j-cve-2021-44228-docker-lab" ,
"full_name" : "twseptian\/spring-boot-log4j-cve-2021-44228-docker-lab" ,
"owner" : {
"login" : "twseptian" ,
"id" : 9025301 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4" ,
"html_url" : "https:\/\/github.com\/twseptian" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/twseptian\/spring-boot-log4j-cve-2021-44228-docker-lab" ,
"description" : "Spring Boot Log4j - CVE-2021-44228 Docker Lab " ,
"fork" : false ,
"created_at" : "2021-12-12T16:54:33Z" ,
"updated_at" : "2024-08-14T04:42:20Z" ,
"pushed_at" : "2021-12-17T13:59:44Z" ,
"stargazers_count" : 25 ,
"watchers_count" : 25 ,
"has_discussions" : false ,
"forks_count" : 20 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"spring-boot-log4j"
] ,
"visibility" : "public" ,
"forks" : 20 ,
"watchers" : 25 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437630669 ,
"name" : "log4jcheck" ,
"full_name" : "OlafHaalstra\/log4jcheck" ,
"owner" : {
"login" : "OlafHaalstra" ,
"id" : 6420723 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6420723?v=4" ,
"html_url" : "https:\/\/github.com\/OlafHaalstra" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/OlafHaalstra\/log4jcheck" ,
"description" : "Check list of URLs against Log4j vulnerability CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-12T18:57:05Z" ,
"updated_at" : "2023-06-25T13:56:28Z" ,
"pushed_at" : "2021-12-20T17:32:06Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437649883 ,
"name" : "Prove-CVE-2021-44228" ,
"full_name" : "Panyaprach\/Prove-CVE-2021-44228" ,
"owner" : {
"login" : "Panyaprach" ,
"id" : 9110880 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9110880?v=4" ,
"html_url" : "https:\/\/github.com\/Panyaprach" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Panyaprach\/Prove-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-12T20:31:19Z" ,
"updated_at" : "2024-04-28T19:39:24Z" ,
"pushed_at" : "2022-01-14T10:08:06Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437660117 ,
"name" : "Log4j-RCE" ,
"full_name" : "momos1337\/Log4j-RCE" ,
"owner" : {
"login" : "momos1337" ,
"id" : 64172550 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64172550?v=4" ,
"html_url" : "https:\/\/github.com\/momos1337" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/momos1337\/Log4j-RCE" ,
"description" : "Log4j RCE - (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-12T21:26:44Z" ,
"updated_at" : "2024-08-12T20:18:50Z" ,
"pushed_at" : "2021-12-13T00:54:22Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"bughunter" ,
"cve-2021-44228" ,
"exploit" ,
"hacking" ,
"log4j" ,
"log4j-rce" ,
"rce" ,
"remote-code-execution"
] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437660360 ,
"name" : "cve-2021-44228-log4j-mitigation" ,
"full_name" : "palominoinc\/cve-2021-44228-log4j-mitigation" ,
"owner" : {
"login" : "palominoinc" ,
"id" : 7401270 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7401270?v=4" ,
"html_url" : "https:\/\/github.com\/palominoinc" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/palominoinc\/cve-2021-44228-log4j-mitigation" ,
"description" : "Mitigate against log4j vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-12T21:28:09Z" ,
"updated_at" : "2021-12-16T15:15:07Z" ,
"pushed_at" : "2021-12-16T15:15:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 437663314 ,
"name" : "log4j-poc" ,
"full_name" : "cyberxml\/log4j-poc" ,
"owner" : {
"login" : "cyberxml" ,
"id" : 10391872 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10391872?v=4" ,
"html_url" : "https:\/\/github.com\/cyberxml" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/cyberxml\/log4j-poc" ,
"description" : "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell" ,
"fork" : false ,
"created_at" : "2021-12-12T21:45:33Z" ,
2024-12-02 19:32:44 +01:00
"updated_at" : "2024-12-02T12:28:32Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2022-12-21T21:11:58Z" ,
2024-12-02 19:32:44 +01:00
"stargazers_count" : 69 ,
"watchers_count" : 69 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 34 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"exploit" ,
"log4j" ,
"log4shell" ,
"poc"
] ,
"visibility" : "public" ,
"forks" : 34 ,
2024-12-02 19:32:44 +01:00
"watchers" : 69 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 437664611 ,
"name" : "Log4J-CVE-2021-44228-RCE" ,
"full_name" : "corneacristian\/Log4J-CVE-2021-44228-RCE" ,
"owner" : {
"login" : "corneacristian" ,
"id" : 59137279 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59137279?v=4" ,
"html_url" : "https:\/\/github.com\/corneacristian" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/corneacristian\/Log4J-CVE-2021-44228-RCE" ,
"description" : "Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)" ,
"fork" : false ,
"created_at" : "2021-12-12T21:52:53Z" ,
"updated_at" : "2023-07-20T04:33:57Z" ,
"pushed_at" : "2021-12-12T22:36:02Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437674455 ,
"name" : "nse-log4shell" ,
"full_name" : "Diverto\/nse-log4shell" ,
"owner" : {
"login" : "Diverto" ,
"id" : 11384089 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11384089?v=4" ,
"html_url" : "https:\/\/github.com\/Diverto" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Diverto\/nse-log4shell" ,
"description" : "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-12T22:52:02Z" ,
"updated_at" : "2024-10-04T14:26:27Z" ,
"pushed_at" : "2021-12-20T15:34:21Z" ,
"stargazers_count" : 349 ,
"watchers_count" : 349 ,
"has_discussions" : false ,
"forks_count" : 48 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 48 ,
"watchers" : 349 ,
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 437674999 ,
"name" : "log4py" ,
"full_name" : "dotPY-hax\/log4py" ,
"owner" : {
"login" : "dotPY-hax" ,
"id" : 67259802 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/67259802?v=4" ,
"html_url" : "https:\/\/github.com\/dotPY-hax" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dotPY-hax\/log4py" ,
"description" : "pythonic pure python RCE exploit for CVE-2021-44228 log4shell" ,
"fork" : false ,
"created_at" : "2021-12-12T22:55:25Z" ,
"updated_at" : "2022-11-09T18:14:43Z" ,
"pushed_at" : "2021-12-12T23:49:01Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"exploit" ,
"log4j" ,
"python" ,
"pythonic" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437681598 ,
"name" : "CVE-2021-44228-PoC" ,
"full_name" : "sunnyvale-it\/CVE-2021-44228-PoC" ,
"owner" : {
"login" : "sunnyvale-it" ,
"id" : 44291039 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4" ,
"html_url" : "https:\/\/github.com\/sunnyvale-it" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC" ,
"description" : "CVE-2021-44228 (Log4Shell) Proof of Concept" ,
"fork" : false ,
"created_at" : "2021-12-12T23:37:39Z" ,
"updated_at" : "2024-07-09T05:36:30Z" ,
"pushed_at" : "2021-12-13T21:23:25Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cybersecurity" ,
"java" ,
"log4j" ,
"log4j2" ,
"security"
] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 437685288 ,
"name" : "log4j2-CVE-2021-44228" ,
"full_name" : "maxant\/log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "maxant" ,
"id" : 1108507 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1108507?v=4" ,
"html_url" : "https:\/\/github.com\/maxant" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/maxant\/log4j2-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T00:02:54Z" ,
"updated_at" : "2021-12-19T19:56:12Z" ,
"pushed_at" : "2021-12-19T19:56:08Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437687048 ,
"name" : "fail2ban-log4j" ,
"full_name" : "atnetws\/fail2ban-log4j" ,
"owner" : {
"login" : "atnetws" ,
"id" : 44603839 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44603839?v=4" ,
"html_url" : "https:\/\/github.com\/atnetws" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/atnetws\/fail2ban-log4j" ,
"description" : "fail2ban filter that catches attacks againts log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T00:14:31Z" ,
"updated_at" : "2022-07-21T09:23:18Z" ,
"pushed_at" : "2022-01-06T20:00:17Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 8 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437687082 ,
"name" : "cve-2021-44228" ,
"full_name" : "kimobu\/cve-2021-44228" ,
"owner" : {
"login" : "kimobu" ,
"id" : 18669130 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18669130?v=4" ,
"html_url" : "https:\/\/github.com\/kimobu" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kimobu\/cve-2021-44228" ,
"description" : "Some files for red team\/blue team investigations into CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T00:14:45Z" ,
"updated_at" : "2023-08-15T12:50:48Z" ,
"pushed_at" : "2021-12-14T19:46:02Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437688500 ,
"name" : "anti-jndi" ,
"full_name" : "ph0lk3r\/anti-jndi" ,
"owner" : {
"login" : "ph0lk3r" ,
"id" : 1352675 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1352675?v=4" ,
"html_url" : "https:\/\/github.com\/ph0lk3r" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ph0lk3r\/anti-jndi" ,
"description" : "Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers." ,
"fork" : false ,
"created_at" : "2021-12-13T00:23:20Z" ,
"updated_at" : "2021-12-13T22:21:20Z" ,
"pushed_at" : "2021-12-13T22:21:17Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437704633 ,
"name" : "Log4j-check" ,
"full_name" : "bigsizeme\/Log4j-check" ,
"owner" : {
"login" : "bigsizeme" ,
"id" : 17845094 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4" ,
"html_url" : "https:\/\/github.com\/bigsizeme" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/bigsizeme\/Log4j-check" ,
"description" : "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload" ,
"fork" : false ,
"created_at" : "2021-12-13T01:55:51Z" ,
"updated_at" : "2024-10-25T12:16:34Z" ,
"pushed_at" : "2021-12-13T09:18:19Z" ,
"stargazers_count" : 69 ,
"watchers_count" : 69 ,
"has_discussions" : false ,
"forks_count" : 18 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 18 ,
"watchers" : 69 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437709337 ,
"name" : "exploit-CVE-2021-44228" ,
"full_name" : "pedrohavay\/exploit-CVE-2021-44228" ,
"owner" : {
"login" : "pedrohavay" ,
"id" : 18234370 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4" ,
"html_url" : "https:\/\/github.com\/pedrohavay" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/pedrohavay\/exploit-CVE-2021-44228" ,
"description" : "This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228)." ,
"fork" : false ,
"created_at" : "2021-12-13T02:18:57Z" ,
"updated_at" : "2024-01-30T05:00:44Z" ,
"pushed_at" : "2021-12-13T16:35:58Z" ,
"stargazers_count" : 20 ,
"watchers_count" : 20 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 20 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437721429 ,
"name" : "log4j-nullroute" ,
"full_name" : "0xRyan\/log4j-nullroute" ,
"owner" : {
"login" : "0xRyan" ,
"id" : 87556614 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87556614?v=4" ,
"html_url" : "https:\/\/github.com\/0xRyan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xRyan\/log4j-nullroute" ,
"description" : "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes" ,
"fork" : false ,
"created_at" : "2021-12-13T03:15:42Z" ,
"updated_at" : "2024-08-12T20:18:50Z" ,
"pushed_at" : "2021-12-14T23:03:03Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437729534 ,
"name" : "CVE-2021-44228" ,
"full_name" : "fireeye\/CVE-2021-44228" ,
"owner" : {
"login" : "fireeye" ,
"id" : 4984788 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4984788?v=4" ,
"html_url" : "https:\/\/github.com\/fireeye" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/fireeye\/CVE-2021-44228" ,
"description" : "OpenIOC rules to facilitate hunting for indicators of compromise" ,
"fork" : false ,
"created_at" : "2021-12-13T03:55:32Z" ,
"updated_at" : "2024-08-05T03:09:51Z" ,
"pushed_at" : "2022-01-07T14:25:33Z" ,
"stargazers_count" : 38 ,
"watchers_count" : 38 ,
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 38 ,
"score" : 0 ,
"subscribers_count" : 8
} ,
{
"id" : 437729997 ,
"name" : "log4j-scan" ,
"full_name" : "fullhunt\/log4j-scan" ,
"owner" : {
"login" : "fullhunt" ,
"id" : 34830403 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/34830403?v=4" ,
"html_url" : "https:\/\/github.com\/fullhunt" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/fullhunt\/log4j-scan" ,
"description" : "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 " ,
"fork" : false ,
"created_at" : "2021-12-13T03:57:50Z" ,
2024-12-17 13:33:34 +01:00
"updated_at" : "2024-12-17T07:10:22Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2022-11-23T18:23:24Z" ,
2024-12-17 13:33:34 +01:00
"stargazers_count" : 3406 ,
"watchers_count" : 3406 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : true ,
"forks_count" : 740 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 740 ,
2024-12-17 13:33:34 +01:00
"watchers" : 3406 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 55
} ,
{
"id" : 437733080 ,
"name" : "log4j_checker_beta" ,
"full_name" : "rubo77\/log4j_checker_beta" ,
"owner" : {
"login" : "rubo77" ,
"id" : 1591563 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1591563?v=4" ,
"html_url" : "https:\/\/github.com\/rubo77" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/rubo77\/log4j_checker_beta" ,
"description" : "a fast check, if your server could be vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T04:14:18Z" ,
"updated_at" : "2024-10-12T16:42:12Z" ,
"pushed_at" : "2022-01-21T11:43:49Z" ,
"stargazers_count" : 250 ,
"watchers_count" : 250 ,
"has_discussions" : true ,
"forks_count" : 90 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 90 ,
"watchers" : 250 ,
"score" : 0 ,
"subscribers_count" : 8
} ,
{
"id" : 437766799 ,
"name" : "Log4j-RCE-Exploiter" ,
"full_name" : "thecyberneh\/Log4j-RCE-Exploiter" ,
"owner" : {
"login" : "thecyberneh" ,
"id" : 75005384 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75005384?v=4" ,
"html_url" : "https:\/\/github.com\/thecyberneh" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/thecyberneh\/Log4j-RCE-Exploiter" ,
"description" : "Scanner for Log4j RCE CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T06:53:01Z" ,
"updated_at" : "2024-08-12T20:18:51Z" ,
"pushed_at" : "2022-07-06T00:37:55Z" ,
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 11 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437769581 ,
"name" : "log4j2" ,
"full_name" : "halibobor\/log4j2" ,
"owner" : {
"login" : "halibobor" ,
"id" : 96046545 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96046545?v=4" ,
"html_url" : "https:\/\/github.com\/halibobor" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/halibobor\/log4j2" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T07:03:50Z" ,
"updated_at" : "2021-12-13T09:39:44Z" ,
"pushed_at" : "2021-12-13T09:30:28Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"jmi" ,
"log4j2"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437771197 ,
"name" : "log4j-cve-code-search-resources" ,
"full_name" : "sourcegraph\/log4j-cve-code-search-resources" ,
"owner" : {
"login" : "sourcegraph" ,
"id" : 3979584 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3979584?v=4" ,
"html_url" : "https:\/\/github.com\/sourcegraph" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sourcegraph\/log4j-cve-code-search-resources" ,
"description" : "Using code search to help fix\/mitigate log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T07:10:11Z" ,
"updated_at" : "2022-11-09T18:14:44Z" ,
"pushed_at" : "2024-04-01T21:00:27Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 40
} ,
{
"id" : 437774679 ,
"name" : "Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832" ,
"full_name" : "thedevappsecguy\/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832" ,
"owner" : {
"login" : "thedevappsecguy" ,
"id" : 27088213 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/27088213?v=4" ,
"html_url" : "https:\/\/github.com\/thedevappsecguy" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/thedevappsecguy\/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832" ,
"description" : "Log4J CVE-2021-44228 : Mitigation Cheat Sheet" ,
"fork" : false ,
"created_at" : "2021-12-13T07:24:02Z" ,
"updated_at" : "2022-10-26T08:46:27Z" ,
"pushed_at" : "2022-01-03T17:43:06Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437781188 ,
"name" : "CVE-2021-44228" ,
"full_name" : "helsecert\/CVE-2021-44228" ,
"owner" : {
"login" : "helsecert" ,
"id" : 2202200 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4" ,
"html_url" : "https:\/\/github.com\/helsecert" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/helsecert\/CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T07:48:49Z" ,
"updated_at" : "2021-12-19T23:28:13Z" ,
"pushed_at" : "2022-01-04T08:15:11Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 437784907 ,
"name" : "aws-log4j-mitigations" ,
"full_name" : "markuman\/aws-log4j-mitigations" ,
"owner" : {
"login" : "markuman" ,
"id" : 3920157 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4" ,
"html_url" : "https:\/\/github.com\/markuman" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/markuman\/aws-log4j-mitigations" ,
"description" : "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible" ,
"fork" : false ,
"created_at" : "2021-12-13T08:01:55Z" ,
"updated_at" : "2021-12-13T08:05:42Z" ,
"pushed_at" : "2021-12-13T08:03:50Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"ansible" ,
"aws" ,
"cve-2021-44228" ,
"log4j" ,
"mitigation" ,
"waf"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437788180 ,
"name" : "Log4shell" ,
"full_name" : "tuyenee\/Log4shell" ,
"owner" : {
"login" : "tuyenee" ,
"id" : 29719729 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29719729?v=4" ,
"html_url" : "https:\/\/github.com\/tuyenee" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/tuyenee\/Log4shell" ,
"description" : "A lab for playing around with the Log4J CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T08:13:07Z" ,
"updated_at" : "2024-08-12T20:18:51Z" ,
"pushed_at" : "2021-12-13T09:26:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437795998 ,
"name" : "Log4j-CVE-2021-44228" ,
"full_name" : "JiuBanSec\/Log4j-CVE-2021-44228" ,
"owner" : {
"login" : "JiuBanSec" ,
"id" : 57030243 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4" ,
"html_url" : "https:\/\/github.com\/JiuBanSec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/JiuBanSec\/Log4j-CVE-2021-44228" ,
"description" : "Log4j Remote Code Injection (Apache Log4j 2.x < 2.15.0-rc2)" ,
"fork" : false ,
"created_at" : "2021-12-13T08:40:13Z" ,
"updated_at" : "2023-08-15T12:50:45Z" ,
"pushed_at" : "2021-12-13T12:01:19Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437797086 ,
"name" : "Log4Shell-CVE-2021-44228-ENV" ,
"full_name" : "ycdxsb\/Log4Shell-CVE-2021-44228-ENV" ,
"owner" : {
"login" : "ycdxsb" ,
"id" : 32149596 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4" ,
"html_url" : "https:\/\/github.com\/ycdxsb" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ycdxsb\/Log4Shell-CVE-2021-44228-ENV" ,
"description" : "Log4Shell Docker Env" ,
"fork" : false ,
"created_at" : "2021-12-13T08:43:45Z" ,
"updated_at" : "2023-08-15T12:50:53Z" ,
"pushed_at" : "2021-12-14T02:54:48Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437797971 ,
"name" : "Sitecore.Solr-log4j-mitigation" ,
"full_name" : "avwolferen\/Sitecore.Solr-log4j-mitigation" ,
"owner" : {
"login" : "avwolferen" ,
"id" : 11447968 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11447968?v=4" ,
"html_url" : "https:\/\/github.com\/avwolferen" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/avwolferen\/Sitecore.Solr-log4j-mitigation" ,
"description" : "This repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T08:46:41Z" ,
"updated_at" : "2022-01-05T17:02:45Z" ,
"pushed_at" : "2022-10-19T14:57:20Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437799663 ,
"name" : "log4j-scanner-CVE-2021-44228" ,
"full_name" : "kek-Sec\/log4j-scanner-CVE-2021-44228" ,
"owner" : {
"login" : "kek-Sec" ,
"id" : 28791067 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28791067?v=4" ,
"html_url" : "https:\/\/github.com\/kek-Sec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kek-Sec\/log4j-scanner-CVE-2021-44228" ,
"description" : "Simple tool for scanning entire directories for attempts of CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T08:51:56Z" ,
"updated_at" : "2024-08-12T20:18:51Z" ,
"pushed_at" : "2021-12-14T07:57:25Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437816961 ,
"name" : "log4shell-spring-framework-research" ,
"full_name" : "Camphul\/log4shell-spring-framework-research" ,
"owner" : {
"login" : "Camphul" ,
"id" : 23475815 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23475815?v=4" ,
"html_url" : "https:\/\/github.com\/Camphul" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Camphul\/log4shell-spring-framework-research" ,
"description" : "Research into the implications of CVE-2021-44228 in Spring based applications." ,
"fork" : false ,
"created_at" : "2021-12-13T09:48:04Z" ,
"updated_at" : "2021-12-15T10:33:35Z" ,
"pushed_at" : "2021-12-15T10:33:32Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437820134 ,
"name" : "cve-2021-44228-log4j-exploits" ,
"full_name" : "lov3r\/cve-2021-44228-log4j-exploits" ,
"owner" : {
"login" : "lov3r" ,
"id" : 33676682 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33676682?v=4" ,
"html_url" : "https:\/\/github.com\/lov3r" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lov3r\/cve-2021-44228-log4j-exploits" ,
"description" : "CVE-2021-4428 复现" ,
"fork" : false ,
"created_at" : "2021-12-13T09:58:11Z" ,
"updated_at" : "2022-09-05T15:53:24Z" ,
"pushed_at" : "2021-12-13T10:22:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437838249 ,
"name" : "log4jScan" ,
"full_name" : "sinakeshmiri\/log4jScan" ,
"owner" : {
"login" : "sinakeshmiri" ,
"id" : 72389059 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/72389059?v=4" ,
"html_url" : "https:\/\/github.com\/sinakeshmiri" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sinakeshmiri\/log4jScan" ,
"description" : "simple python scanner to check if your network is vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T10:59:50Z" ,
"updated_at" : "2024-10-08T07:36:17Z" ,
"pushed_at" : "2021-12-13T12:16:03Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437840280 ,
"name" : "Log4J-Scanner" ,
"full_name" : "0xDexter0us\/Log4J-Scanner" ,
"owner" : {
"login" : "0xDexter0us" ,
"id" : 76158271 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76158271?v=4" ,
"html_url" : "https:\/\/github.com\/0xDexter0us" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xDexter0us\/Log4J-Scanner" ,
"description" : "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth." ,
"fork" : false ,
"created_at" : "2021-12-13T11:06:46Z" ,
"updated_at" : "2024-09-09T07:15:00Z" ,
"pushed_at" : "2021-12-26T09:58:06Z" ,
"stargazers_count" : 101 ,
"watchers_count" : 101 ,
"has_discussions" : false ,
"forks_count" : 27 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 27 ,
"watchers" : 101 ,
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 437847140 ,
"name" : "Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228" ,
"full_name" : "LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228" ,
"owner" : {
"login" : "LutziGoz" ,
"id" : 45577616 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45577616?v=4" ,
"html_url" : "https:\/\/github.com\/LutziGoz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T11:29:57Z" ,
"updated_at" : "2022-08-14T12:05:18Z" ,
"pushed_at" : "2022-02-22T00:21:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437848570 ,
"name" : "Log4Shell" ,
"full_name" : "0xsyr0\/Log4Shell" ,
"owner" : {
"login" : "0xsyr0" ,
"id" : 67317571 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/67317571?v=4" ,
"html_url" : "https:\/\/github.com\/0xsyr0" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xsyr0\/Log4Shell" ,
"description" : "This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell." ,
"fork" : false ,
"created_at" : "2021-12-13T11:34:54Z" ,
"updated_at" : "2024-01-17T16:03:44Z" ,
"pushed_at" : "2024-02-21T15:47:36Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2021-44228" ,
"log4j" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 8 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 437860177 ,
"name" : "log4j-rce-CVE-2021-44228" ,
"full_name" : "1hakusai1\/log4j-rce-CVE-2021-44228" ,
"owner" : {
"login" : "1hakusai1" ,
"id" : 55519230 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55519230?v=4" ,
"html_url" : "https:\/\/github.com\/1hakusai1" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/1hakusai1\/log4j-rce-CVE-2021-44228" ,
"description" : "log4j2 CVE-2021-44228 POC" ,
"fork" : false ,
"created_at" : "2021-12-13T12:15:10Z" ,
"updated_at" : "2022-10-04T05:04:19Z" ,
"pushed_at" : "2021-12-13T13:00:49Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437866496 ,
"name" : "log4j-rce-test" ,
"full_name" : "jeffli1024\/log4j-rce-test" ,
"owner" : {
"login" : "jeffli1024" ,
"id" : 33046602 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33046602?v=4" ,
"html_url" : "https:\/\/github.com\/jeffli1024" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jeffli1024\/log4j-rce-test" ,
"description" : "CVE-2021-44228 - Apache log4j RCE quick test" ,
"fork" : false ,
"created_at" : "2021-12-13T12:35:39Z" ,
"updated_at" : "2023-02-07T00:20:03Z" ,
"pushed_at" : "2021-12-13T21:53:39Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437876264 ,
"name" : "Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service" ,
"full_name" : "zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service" ,
"owner" : {
"login" : "zsolt-halo" ,
"id" : 2437516 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2437516?v=4" ,
"html_url" : "https:\/\/github.com\/zsolt-halo" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T13:05:26Z" ,
"updated_at" : "2023-08-15T12:50:31Z" ,
"pushed_at" : "2021-12-13T13:26:11Z" ,
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 13 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437877109 ,
"name" : "log4j-cve-2021-44228" ,
"full_name" : "manuel-alvarez-alvarez\/log4j-cve-2021-44228" ,
"owner" : {
"login" : "manuel-alvarez-alvarez" ,
"id" : 4885539 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4885539?v=4" ,
"html_url" : "https:\/\/github.com\/manuel-alvarez-alvarez" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/manuel-alvarez-alvarez\/log4j-cve-2021-44228" ,
"description" : "Log4j CVE-2021-44228 examples: Remote Code Execution (through LDAP, RMI, ...), Forced DNS queries, ..." ,
"fork" : false ,
"created_at" : "2021-12-13T13:08:03Z" ,
"updated_at" : "2024-05-14T08:37:19Z" ,
"pushed_at" : "2021-12-21T11:12:40Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437882599 ,
"name" : "CVE-2021-44228" ,
"full_name" : "VNYui\/CVE-2021-44228" ,
"owner" : {
"login" : "VNYui" ,
"id" : 14999242 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14999242?v=4" ,
"html_url" : "https:\/\/github.com\/VNYui" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/VNYui\/CVE-2021-44228" ,
"description" : "Mass recognition tool for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T13:25:19Z" ,
"updated_at" : "2021-12-13T13:37:39Z" ,
"pushed_at" : "2021-12-13T13:37:36Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437883625 ,
"name" : "Scan-CVE-2021-44228" ,
"full_name" : "flxhaas\/Scan-CVE-2021-44228" ,
"owner" : {
"login" : "flxhaas" ,
"id" : 5561099 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5561099?v=4" ,
"html_url" : "https:\/\/github.com\/flxhaas" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/flxhaas\/Scan-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T13:28:26Z" ,
"updated_at" : "2021-12-13T13:28:26Z" ,
"pushed_at" : "2021-12-13T13:28:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437884471 ,
"name" : "Log4j-CVE-2021-44228" ,
"full_name" : "justakazh\/Log4j-CVE-2021-44228" ,
"owner" : {
"login" : "justakazh" ,
"id" : 36891477 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4" ,
"html_url" : "https:\/\/github.com\/justakazh" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/justakazh\/Log4j-CVE-2021-44228" ,
"description" : "Mass Check Vulnerable Log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T13:30:57Z" ,
"updated_at" : "2024-08-12T20:18:51Z" ,
"pushed_at" : "2021-12-13T14:17:59Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"0day" ,
"exploit" ,
"log4j" ,
"scanner"
] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 437888133 ,
"name" : "f5-waf-quick-patch-cve-2021-44228" ,
"full_name" : "irgoncalves\/f5-waf-quick-patch-cve-2021-44228" ,
"owner" : {
"login" : "irgoncalves" ,
"id" : 23459099 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4" ,
"html_url" : "https:\/\/github.com\/irgoncalves" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/irgoncalves\/f5-waf-quick-patch-cve-2021-44228" ,
"description" : "This tool creates a custom signature set on F5 WAF and apply to policies in blocking mode" ,
"fork" : false ,
"created_at" : "2021-12-13T13:41:39Z" ,
"updated_at" : "2023-02-11T20:16:19Z" ,
"pushed_at" : "2022-05-04T23:49:03Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437902732 ,
"name" : "JndiLookup" ,
"full_name" : "madCdan\/JndiLookup" ,
"owner" : {
"login" : "madCdan" ,
"id" : 10784600 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10784600?v=4" ,
"html_url" : "https:\/\/github.com\/madCdan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/madCdan\/JndiLookup" ,
"description" : "Some tools to help mitigating Apache Log4j 2 CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T14:22:34Z" ,
"updated_at" : "2021-12-18T02:12:49Z" ,
"pushed_at" : "2021-12-13T17:07:42Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437904012 ,
"name" : "MC-Log4j-Patcher" ,
"full_name" : "Koupah\/MC-Log4j-Patcher" ,
"owner" : {
"login" : "Koupah" ,
"id" : 25888315 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25888315?v=4" ,
"html_url" : "https:\/\/github.com\/Koupah" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Koupah\/MC-Log4j-Patcher" ,
"description" : "A singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228)." ,
"fork" : false ,
"created_at" : "2021-12-13T14:26:24Z" ,
"updated_at" : "2022-01-04T03:00:29Z" ,
"pushed_at" : "2022-01-16T01:59:24Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437917354 ,
"name" : "Fix-CVE-2021-44228" ,
"full_name" : "AlexandreHeroux\/Fix-CVE-2021-44228" ,
"owner" : {
"login" : "AlexandreHeroux" ,
"id" : 28022186 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28022186?v=4" ,
"html_url" : "https:\/\/github.com\/AlexandreHeroux" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/AlexandreHeroux\/Fix-CVE-2021-44228" ,
"description" : "Apply class remove process from ear\/war\/jar\/zip archive, see https:\/\/logging.apache.org\/log4j\/2.x\/" ,
"fork" : false ,
"created_at" : "2021-12-13T15:04:31Z" ,
"updated_at" : "2024-05-20T03:26:22Z" ,
"pushed_at" : "2021-12-15T02:02:51Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437919806 ,
"name" : "log4j-CVE-2021-44228-test" ,
"full_name" : "kossatzd\/log4j-CVE-2021-44228-test" ,
"owner" : {
"login" : "kossatzd" ,
"id" : 3578287 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3578287?v=4" ,
"html_url" : "https:\/\/github.com\/kossatzd" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kossatzd\/log4j-CVE-2021-44228-test" ,
"description" : "demo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-13T15:11:15Z" ,
"updated_at" : "2021-12-24T22:09:51Z" ,
"pushed_at" : "2021-12-24T22:09:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437937629 ,
"name" : "log4j-CVE-2021-44228" ,
"full_name" : "tobiasoed\/log4j-CVE-2021-44228" ,
"owner" : {
"login" : "tobiasoed" ,
"id" : 12912943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12912943?v=4" ,
"html_url" : "https:\/\/github.com\/tobiasoed" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/tobiasoed\/log4j-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T16:04:54Z" ,
"updated_at" : "2021-12-21T02:30:06Z" ,
"pushed_at" : "2022-02-21T23:45:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437948564 ,
"name" : "log4shell_ioc_ips" ,
"full_name" : "hackinghippo\/log4shell_ioc_ips" ,
"owner" : {
"login" : "hackinghippo" ,
"id" : 96073490 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96073490?v=4" ,
"html_url" : "https:\/\/github.com\/hackinghippo" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/hackinghippo\/log4shell_ioc_ips" ,
"description" : "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-13T16:39:16Z" ,
"updated_at" : "2023-12-11T04:51:15Z" ,
"pushed_at" : "2022-01-07T17:00:38Z" ,
"stargazers_count" : 36 ,
"watchers_count" : 36 ,
"has_discussions" : false ,
"forks_count" : 12 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2021-44228" ,
"ioc" ,
"list" ,
"log4j" ,
"log4shell" ,
"shell4log"
] ,
"visibility" : "public" ,
"forks" : 12 ,
"watchers" : 36 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 437948858 ,
"name" : "log4j-1.2.15-mod" ,
"full_name" : "p3dr16k\/log4j-1.2.15-mod" ,
"owner" : {
"login" : "p3dr16k" ,
"id" : 9317261 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9317261?v=4" ,
"html_url" : "https:\/\/github.com\/p3dr16k" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/p3dr16k\/log4j-1.2.15-mod" ,
"description" : "log4j version 1 with a patch for CVE-2021-44228 vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-13T16:40:14Z" ,
"updated_at" : "2021-12-14T11:41:29Z" ,
"pushed_at" : "2021-12-14T11:39:43Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437949273 ,
"name" : "ansible-role-log4shell" ,
"full_name" : "claranet\/ansible-role-log4shell" ,
"owner" : {
"login" : "claranet" ,
"id" : 7526691 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7526691?v=4" ,
"html_url" : "https:\/\/github.com\/claranet" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/claranet\/ansible-role-log4shell" ,
"description" : "Find Log4Shell CVE-2021-44228 on your system" ,
"fork" : false ,
"created_at" : "2021-12-13T16:41:31Z" ,
"updated_at" : "2023-11-16T14:11:42Z" ,
"pushed_at" : "2024-06-20T08:48:06Z" ,
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"ansible" ,
"claranet" ,
"log4j" ,
"log4shell" ,
"role"
] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 11 ,
"score" : 0 ,
"subscribers_count" : 15
} ,
{
"id" : 437960695 ,
"name" : "CVE-2021-44228" ,
"full_name" : "taurusxin\/CVE-2021-44228" ,
"owner" : {
"login" : "taurusxin" ,
"id" : 17809960 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17809960?v=4" ,
"html_url" : "https:\/\/github.com\/taurusxin" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/taurusxin\/CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T17:17:37Z" ,
"updated_at" : "2024-08-14T03:52:41Z" ,
"pushed_at" : "2021-12-13T17:22:19Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437963154 ,
"name" : "cve-2021-44228" ,
"full_name" : "corelight\/cve-2021-44228" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4" ,
"html_url" : "https:\/\/github.com\/corelight" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/corelight\/cve-2021-44228" ,
"description" : "Log4j Exploit Detection Logic for Zeek" ,
"fork" : false ,
"created_at" : "2021-12-13T17:25:52Z" ,
"updated_at" : "2024-10-12T10:55:49Z" ,
"pushed_at" : "2024-05-04T18:38:58Z" ,
"stargazers_count" : 19 ,
"watchers_count" : 19 ,
"has_discussions" : false ,
"forks_count" : 8 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"zeek"
] ,
"visibility" : "public" ,
"forks" : 8 ,
"watchers" : 19 ,
"score" : 0 ,
"subscribers_count" : 12
} ,
{
"id" : 437965181 ,
"name" : "log4j2-prosecutor" ,
"full_name" : "rodfer0x80\/log4j2-prosecutor" ,
"owner" : {
"login" : "rodfer0x80" ,
"id" : 52704508 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52704508?v=4" ,
"html_url" : "https:\/\/github.com\/rodfer0x80" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/rodfer0x80\/log4j2-prosecutor" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T17:32:26Z" ,
"updated_at" : "2021-12-23T10:05:33Z" ,
"pushed_at" : "2021-12-23T10:05:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437968616 ,
"name" : "CVE-2021-44228_Log4Shell" ,
"full_name" : "yanghaoi\/CVE-2021-44228_Log4Shell" ,
"owner" : {
"login" : "yanghaoi" ,
"id" : 21354684 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4" ,
"html_url" : "https:\/\/github.com\/yanghaoi" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell" ,
"description" : "Log4Shell A test for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T17:44:01Z" ,
"updated_at" : "2021-12-13T18:03:51Z" ,
"pushed_at" : "2021-12-13T18:06:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437983994 ,
"name" : "log4j_checker" ,
"full_name" : "lfama\/log4j_checker" ,
"owner" : {
"login" : "lfama" ,
"id" : 14056990 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14056990?v=4" ,
"html_url" : "https:\/\/github.com\/lfama" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lfama\/log4j_checker" ,
"description" : "Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines." ,
"fork" : false ,
"created_at" : "2021-12-13T18:35:16Z" ,
"updated_at" : "2024-01-16T00:41:28Z" ,
"pushed_at" : "2021-12-21T16:01:08Z" ,
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell" ,
"python" ,
"python3" ,
"scan" ,
"scanner" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 9 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 437988861 ,
"name" : "Log4j-IOCs" ,
"full_name" : "threatmonit\/Log4j-IOCs" ,
"owner" : {
"login" : "threatmonit" ,
"id" : 90388073 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4" ,
"html_url" : "https:\/\/github.com\/threatmonit" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/threatmonit\/Log4j-IOCs" ,
"description" : "Public IOCs about log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T18:52:19Z" ,
"updated_at" : "2023-05-09T18:44:15Z" ,
"pushed_at" : "2021-12-13T19:11:30Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 437995131 ,
"name" : "l4j-info" ,
"full_name" : "ben-smash\/l4j-info" ,
"owner" : {
"login" : "ben-smash" ,
"id" : 95368649 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4" ,
"html_url" : "https:\/\/github.com\/ben-smash" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ben-smash\/l4j-info" ,
"description" : "Compiling links of value i find regarding CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-13T19:14:23Z" ,
"updated_at" : "2021-12-13T21:11:09Z" ,
"pushed_at" : "2021-12-13T21:11:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438003225 ,
"name" : "log4j-test" ,
"full_name" : "strawhatasif\/log4j-test" ,
"owner" : {
"login" : "strawhatasif" ,
"id" : 10750101 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4" ,
"html_url" : "https:\/\/github.com\/strawhatasif" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/strawhatasif\/log4j-test" ,
"description" : "Demonstration of CVE-2021-44228 with a possible strategic fix." ,
"fork" : false ,
"created_at" : "2021-12-13T19:43:01Z" ,
"updated_at" : "2021-12-13T20:26:40Z" ,
"pushed_at" : "2021-12-13T20:26:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438012376 ,
"name" : "nmap-log4shell" ,
"full_name" : "giterlizzi\/nmap-log4shell" ,
"owner" : {
"login" : "giterlizzi" ,
"id" : 1824717 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1824717?v=4" ,
"html_url" : "https:\/\/github.com\/giterlizzi" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/giterlizzi\/nmap-log4shell" ,
"description" : "Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-13T20:17:14Z" ,
2024-12-04 07:32:12 +01:00
"updated_at" : "2024-12-04T01:38:34Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2021-12-17T17:23:57Z" ,
2024-12-04 07:32:12 +01:00
"stargazers_count" : 79 ,
"watchers_count" : 79 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 21 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell" ,
"nmap" ,
"nmap-scripts" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 21 ,
2024-12-04 07:32:12 +01:00
"watchers" : 79 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 438013062 ,
"name" : "Siem-queries-for-CVE-2021-44228" ,
"full_name" : "tica506\/Siem-queries-for-CVE-2021-44228" ,
"owner" : {
"login" : "tica506" ,
"id" : 93236626 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4" ,
"html_url" : "https:\/\/github.com\/tica506" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T20:19:57Z" ,
"updated_at" : "2021-12-13T20:56:54Z" ,
"pushed_at" : "2021-12-13T20:56:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438021782 ,
"name" : "log4shell-example" ,
"full_name" : "chilit-nl\/log4shell-example" ,
"owner" : {
"login" : "chilit-nl" ,
"id" : 96049152 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96049152?v=4" ,
"html_url" : "https:\/\/github.com\/chilit-nl" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/chilit-nl\/log4shell-example" ,
"description" : "The goal of this project is to demonstrate the log4j cve-2021-44228 exploit vulnerability in a spring-boot setup, and to show how to fix it." ,
"fork" : false ,
"created_at" : "2021-12-13T20:54:10Z" ,
"updated_at" : "2021-12-14T08:30:57Z" ,
"pushed_at" : "2021-12-14T08:18:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4j2" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438026042 ,
"name" : "log4j-checker" ,
"full_name" : "Occamsec\/log4j-checker" ,
"owner" : {
"login" : "Occamsec" ,
"id" : 55592824 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55592824?v=4" ,
"html_url" : "https:\/\/github.com\/Occamsec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Occamsec\/log4j-checker" ,
"description" : "Bash and PowerShell scripts to scan a local filesystem for Log4j .jar files which could be vulnerable to CVE-2021-44228 aka Log4Shell." ,
"fork" : false ,
"created_at" : "2021-12-13T21:11:18Z" ,
"updated_at" : "2021-12-21T15:16:18Z" ,
"pushed_at" : "2021-12-16T17:44:06Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"log4j" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438028657 ,
"name" : "log4j2-CVE-2021-44228-poc-local" ,
"full_name" : "snatalius\/log4j2-CVE-2021-44228-poc-local" ,
"owner" : {
"login" : "snatalius" ,
"id" : 22771118 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4" ,
"html_url" : "https:\/\/github.com\/snatalius" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local" ,
"description" : "Just a personal proof of concept of CVE-2021-44228 on log4j2" ,
"fork" : false ,
"created_at" : "2021-12-13T21:21:53Z" ,
"updated_at" : "2021-12-13T21:21:56Z" ,
"pushed_at" : "2021-12-13T21:21:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438032780 ,
"name" : "CVE-2021-44228" ,
"full_name" : "Contrast-Security-OSS\/CVE-2021-44228" ,
"owner" : {
"login" : "Contrast-Security-OSS" ,
"id" : 5577345 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5577345?v=4" ,
"html_url" : "https:\/\/github.com\/Contrast-Security-OSS" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Contrast-Security-OSS\/CVE-2021-44228" ,
"description" : "Professional Service scripts to aid in the identification of affected Java applications in TeamServer" ,
"fork" : false ,
"created_at" : "2021-12-13T21:39:39Z" ,
"updated_at" : "2021-12-14T01:40:19Z" ,
"pushed_at" : "2021-12-22T13:15:12Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 8
} ,
{
"id" : 438032826 ,
"name" : "log4shell-rex" ,
"full_name" : "back2root\/log4shell-rex" ,
"owner" : {
"login" : "back2root" ,
"id" : 9200239 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9200239?v=4" ,
"html_url" : "https:\/\/github.com\/back2root" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/back2root\/log4shell-rex" ,
"description" : "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs" ,
"fork" : false ,
"created_at" : "2021-12-13T21:39:51Z" ,
"updated_at" : "2024-11-25T13:32:41Z" ,
"pushed_at" : "2021-12-21T01:24:46Z" ,
"stargazers_count" : 291 ,
"watchers_count" : 291 ,
"has_discussions" : false ,
"forks_count" : 30 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 30 ,
"watchers" : 291 ,
"score" : 0 ,
"subscribers_count" : 12
} ,
{
"id" : 438034703 ,
"name" : "log4shell-tools" ,
"full_name" : "alexbakker\/log4shell-tools" ,
"owner" : {
"login" : "alexbakker" ,
"id" : 2387841 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4" ,
"html_url" : "https:\/\/github.com\/alexbakker" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/alexbakker\/log4shell-tools" ,
"description" : "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046" ,
"fork" : false ,
"created_at" : "2021-12-13T21:47:41Z" ,
"updated_at" : "2024-10-28T07:04:55Z" ,
"pushed_at" : "2024-04-07T22:45:53Z" ,
"stargazers_count" : 86 ,
"watchers_count" : 86 ,
"has_discussions" : false ,
"forks_count" : 17 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"dns" ,
"jndi" ,
"ldap" ,
"log4j" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 17 ,
"watchers" : 86 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 438043313 ,
"name" : "find-log4j" ,
"full_name" : "perryflynn\/find-log4j" ,
"owner" : {
"login" : "perryflynn" ,
"id" : 1693988 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1693988?v=4" ,
"html_url" : "https:\/\/github.com\/perryflynn" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/perryflynn\/find-log4j" ,
"description" : "Find log4j for CVE-2021-44228 on some places * Log4Shell" ,
"fork" : false ,
"created_at" : "2021-12-13T22:26:04Z" ,
"updated_at" : "2021-12-21T07:48:29Z" ,
"pushed_at" : "2021-12-14T21:11:59Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4j2" ,
"log4jshell"
] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438090697 ,
"name" : "log4j-cve-2021-44228-sample" ,
"full_name" : "alpacamybags118\/log4j-cve-2021-44228-sample" ,
"owner" : {
"login" : "alpacamybags118" ,
"id" : 16386559 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16386559?v=4" ,
"html_url" : "https:\/\/github.com\/alpacamybags118" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/alpacamybags118\/log4j-cve-2021-44228-sample" ,
"description" : "Sample docker-compose setup to show how this exploit works" ,
"fork" : false ,
"created_at" : "2021-12-14T02:26:52Z" ,
"updated_at" : "2022-11-21T21:14:16Z" ,
"pushed_at" : "2022-01-14T14:13:07Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438090719 ,
"name" : "log4j2-issue-check" ,
"full_name" : "sandarenu\/log4j2-issue-check" ,
"owner" : {
"login" : "sandarenu" ,
"id" : 808954 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/808954?v=4" ,
"html_url" : "https:\/\/github.com\/sandarenu" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sandarenu\/log4j2-issue-check" ,
"description" : "Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T02:26:56Z" ,
"updated_at" : "2021-12-14T03:53:41Z" ,
"pushed_at" : "2021-12-14T03:53:38Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438112808 ,
"name" : "CVE-2021-44228-Demo" ,
"full_name" : "roticagas\/CVE-2021-44228-Demo" ,
"owner" : {
"login" : "roticagas" ,
"id" : 17757134 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17757134?v=4" ,
"html_url" : "https:\/\/github.com\/roticagas" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/roticagas\/CVE-2021-44228-Demo" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-14T04:09:02Z" ,
"updated_at" : "2021-12-15T07:13:10Z" ,
"pushed_at" : "2021-12-15T07:13:08Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438118026 ,
"name" : "log4j-urlscanner" ,
"full_name" : "Woahd\/log4j-urlscanner" ,
"owner" : {
"login" : "Woahd" ,
"id" : 91861246 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/91861246?v=4" ,
"html_url" : "https:\/\/github.com\/Woahd" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Woahd\/log4j-urlscanner" ,
"description" : "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading" ,
"fork" : false ,
"created_at" : "2021-12-14T04:35:20Z" ,
"updated_at" : "2021-12-15T04:54:26Z" ,
"pushed_at" : "2021-12-15T04:54:23Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438128189 ,
"name" : "Log4j2-CVE-2021-44228-revshell" ,
"full_name" : "faisalfs10x\/Log4j2-CVE-2021-44228-revshell" ,
"owner" : {
"login" : "faisalfs10x" ,
"id" : 51811615 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4" ,
"html_url" : "https:\/\/github.com\/faisalfs10x" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/faisalfs10x\/Log4j2-CVE-2021-44228-revshell" ,
"description" : "Log4j2 CVE-2021-44228 revshell, ofc it suck!!" ,
"fork" : false ,
"created_at" : "2021-12-14T05:24:52Z" ,
"updated_at" : "2024-07-31T09:38:34Z" ,
"pushed_at" : "2021-12-21T19:48:57Z" ,
"stargazers_count" : 19 ,
"watchers_count" : 19 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"exploit" ,
"log4j" ,
"poc"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 19 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438135281 ,
"name" : "chk_log4j" ,
"full_name" : "gcmurphy\/chk_log4j" ,
"owner" : {
"login" : "gcmurphy" ,
"id" : 222833 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/222833?v=4" ,
"html_url" : "https:\/\/github.com\/gcmurphy" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/gcmurphy\/chk_log4j" ,
"description" : "Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T05:58:28Z" ,
"updated_at" : "2023-03-08T02:33:19Z" ,
"pushed_at" : "2021-12-14T12:20:56Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"jar" ,
"log4j" ,
"log4shell" ,
"rust"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438144746 ,
"name" : "LogMePwn" ,
"full_name" : "0xInfection\/LogMePwn" ,
"owner" : {
"login" : "0xInfection" ,
"id" : 39941993 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39941993?v=4" ,
"html_url" : "https:\/\/github.com\/0xInfection" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xInfection\/LogMePwn" ,
"description" : "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability." ,
"fork" : false ,
"created_at" : "2021-12-14T06:37:59Z" ,
"updated_at" : "2024-11-16T19:51:31Z" ,
2024-12-12 01:31:58 +01:00
"pushed_at" : "2024-12-11T23:04:50Z" ,
2024-11-28 19:31:51 +01:00
"stargazers_count" : 386 ,
"watchers_count" : 386 ,
"has_discussions" : false ,
2024-12-06 07:31:56 +01:00
"forks_count" : 53 ,
2024-11-28 19:31:51 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"internet-scanning" ,
"log4j" ,
"rce-scanner" ,
"vulnerability-scanners"
] ,
"visibility" : "public" ,
2024-12-06 07:31:56 +01:00
"forks" : 53 ,
2024-11-28 19:31:51 +01:00
"watchers" : 386 ,
"score" : 0 ,
"subscribers_count" : 12
} ,
{
"id" : 438148080 ,
"name" : "apache-solr-log4j-CVE-2021-44228" ,
"full_name" : "toramanemre\/apache-solr-log4j-CVE-2021-44228" ,
"owner" : {
"login" : "toramanemre" ,
"id" : 24626967 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4" ,
"html_url" : "https:\/\/github.com\/toramanemre" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/toramanemre\/apache-solr-log4j-CVE-2021-44228" ,
"description" : "A Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T06:51:30Z" ,
"updated_at" : "2023-07-28T09:59:43Z" ,
"pushed_at" : "2021-12-14T06:51:51Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438165990 ,
"name" : "log4j-scanner" ,
"full_name" : "codiobert\/log4j-scanner" ,
"owner" : {
"login" : "codiobert" ,
"id" : 10519412 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10519412?v=4" ,
"html_url" : "https:\/\/github.com\/codiobert" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/codiobert\/log4j-scanner" ,
"description" : "Check CVE-2021-44228 vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-14T07:59:14Z" ,
"updated_at" : "2022-01-30T16:35:24Z" ,
"pushed_at" : "2021-12-15T17:08:42Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438175327 ,
"name" : "log4j2-rce-recap" ,
"full_name" : "cbuschka\/log4j2-rce-recap" ,
"owner" : {
"login" : "cbuschka" ,
"id" : 5462513 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5462513?v=4" ,
"html_url" : "https:\/\/github.com\/cbuschka" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/cbuschka\/log4j2-rce-recap" ,
"description" : "Little recap of the log4j2 remote code execution (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-14T08:31:47Z" ,
"updated_at" : "2021-12-14T10:06:36Z" ,
"pushed_at" : "2021-12-14T10:03:23Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"exploit" ,
"java" ,
"log4j2" ,
"rce" ,
"security"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438182253 ,
"name" : "log4j-vulnerability-demo" ,
"full_name" : "andrii-kovalenko-celonis\/log4j-vulnerability-demo" ,
"owner" : {
"login" : "andrii-kovalenko-celonis" ,
"id" : 63106217 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63106217?v=4" ,
"html_url" : "https:\/\/github.com\/andrii-kovalenko-celonis" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/andrii-kovalenko-celonis\/log4j-vulnerability-demo" ,
"description" : "Endpoint to test CVE-2021-44228 – Log4j 2" ,
"fork" : false ,
"created_at" : "2021-12-14T08:55:43Z" ,
"updated_at" : "2021-12-14T08:57:36Z" ,
"pushed_at" : "2021-12-14T08:57:33Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438193673 ,
"name" : "Log4j-CVE-2021-44228" ,
"full_name" : "dark-ninja10\/Log4j-CVE-2021-44228" ,
"owner" : {
"login" : "dark-ninja10" ,
"id" : 58605984 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/58605984?v=4" ,
"html_url" : "https:\/\/github.com\/dark-ninja10" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dark-ninja10\/Log4j-CVE-2021-44228" ,
"description" : "On Thursday (December 9th), a 0-day exploit in the popular Java logging library log4j (version 2) was discovered that results in Remote Code Execution (RCE) by logging a certain string. Given how ubiquitous this library is, the impact of the exploit (full server control), and how easy it is to exploit, the impact of this vulnerability is quite severe. We're calling it \"Log4Shell\" for short." ,
"fork" : false ,
"created_at" : "2021-12-14T09:33:22Z" ,
"updated_at" : "2021-12-14T09:35:51Z" ,
"pushed_at" : "2021-12-14T09:35:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438203240 ,
"name" : "log4j-finder" ,
"full_name" : "fox-it\/log4j-finder" ,
"owner" : {
"login" : "fox-it" ,
"id" : 468621 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/468621?v=4" ,
"html_url" : "https:\/\/github.com\/fox-it" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/fox-it\/log4j-finder" ,
"description" : "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)" ,
"fork" : false ,
"created_at" : "2021-12-14T10:04:42Z" ,
"updated_at" : "2024-10-03T05:15:58Z" ,
"pushed_at" : "2022-12-27T17:57:19Z" ,
"stargazers_count" : 435 ,
"watchers_count" : 435 ,
"has_discussions" : true ,
"forks_count" : 97 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"cve-2021-45105" ,
"log4j" ,
"log4j-finder" ,
"log4j2" ,
"log4shell" ,
"python"
] ,
"visibility" : "public" ,
"forks" : 97 ,
"watchers" : 435 ,
"score" : 0 ,
"subscribers_count" : 21
} ,
{
"id" : 438248880 ,
"name" : "JNDI-Exploit-1.2-log4shell" ,
"full_name" : "34zY\/JNDI-Exploit-1.2-log4shell" ,
"owner" : {
"login" : "34zY" ,
"id" : 55347142 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4" ,
"html_url" : "https:\/\/github.com\/34zY" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/34zY\/JNDI-Exploit-1.2-log4shell" ,
"description" : "Details : CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T12:42:54Z" ,
"updated_at" : "2024-08-12T20:18:53Z" ,
"pushed_at" : "2021-12-19T07:57:58Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438250402 ,
"name" : "cve-2021-44228" ,
"full_name" : "didoatanasov\/cve-2021-44228" ,
"owner" : {
"login" : "didoatanasov" ,
"id" : 7069625 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7069625?v=4" ,
"html_url" : "https:\/\/github.com\/didoatanasov" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/didoatanasov\/cve-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-14T12:47:56Z" ,
"updated_at" : "2021-12-14T14:30:02Z" ,
"pushed_at" : "2021-12-14T14:29:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438289849 ,
"name" : "Security-Log4J-Tester" ,
"full_name" : "ReynerGonzalez\/Security-Log4J-Tester" ,
"owner" : {
"login" : "ReynerGonzalez" ,
"id" : 51517256 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51517256?v=4" ,
"html_url" : "https:\/\/github.com\/ReynerGonzalez" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ReynerGonzalez\/Security-Log4J-Tester" ,
"description" : "The vulnerability, which can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell." ,
"fork" : false ,
"created_at" : "2021-12-14T14:46:08Z" ,
"updated_at" : "2021-12-14T15:04:49Z" ,
"pushed_at" : "2021-12-14T15:04:46Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438291572 ,
"name" : "org.shaneking.demo.cve.y2021.s44228" ,
"full_name" : "ShaneKingBlog\/org.shaneking.demo.cve.y2021.s44228" ,
"owner" : {
"login" : "ShaneKingBlog" ,
"id" : 76613703 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76613703?v=4" ,
"html_url" : "https:\/\/github.com\/ShaneKingBlog" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ShaneKingBlog\/org.shaneking.demo.cve.y2021.s44228" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T14:51:26Z" ,
"updated_at" : "2021-12-14T18:03:52Z" ,
"pushed_at" : "2021-12-14T18:03:49Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438299030 ,
"name" : "log4j" ,
"full_name" : "wortell\/log4j" ,
"owner" : {
"login" : "wortell" ,
"id" : 54625905 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54625905?v=4" ,
"html_url" : "https:\/\/github.com\/wortell" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/wortell\/log4j" ,
"description" : "Repo containing all info, scripts, etc. related to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T15:13:06Z" ,
"updated_at" : "2024-03-21T04:34:22Z" ,
"pushed_at" : "2021-12-29T19:46:22Z" ,
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 10 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 438349219 ,
"name" : "CVE-2021-44228-Scanner" ,
"full_name" : "municipalparkingservices\/CVE-2021-44228-Scanner" ,
"owner" : {
"login" : "municipalparkingservices" ,
"id" : 3780687 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3780687?v=4" ,
"html_url" : "https:\/\/github.com\/municipalparkingservices" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/municipalparkingservices\/CVE-2021-44228-Scanner" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-14T17:53:37Z" ,
"updated_at" : "2021-12-14T17:58:15Z" ,
"pushed_at" : "2021-12-14T17:54:33Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 438353510 ,
"name" : "log4j-honeypot-flask" ,
"full_name" : "BinaryDefense\/log4j-honeypot-flask" ,
"owner" : {
"login" : "BinaryDefense" ,
"id" : 10130449 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10130449?v=4" ,
"html_url" : "https:\/\/github.com\/BinaryDefense" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/BinaryDefense\/log4j-honeypot-flask" ,
"description" : "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T18:08:45Z" ,
"updated_at" : "2024-10-14T22:09:15Z" ,
"pushed_at" : "2021-12-20T14:44:27Z" ,
"stargazers_count" : 148 ,
"watchers_count" : 148 ,
"has_discussions" : false ,
"forks_count" : 24 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 24 ,
"watchers" : 148 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 438369987 ,
"name" : "Log4jTools" ,
"full_name" : "MalwareTech\/Log4jTools" ,
"owner" : {
"login" : "MalwareTech" ,
"id" : 7256561 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7256561?v=4" ,
"html_url" : "https:\/\/github.com\/MalwareTech" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/MalwareTech\/Log4jTools" ,
"description" : "Tools for investigating Log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T19:08:14Z" ,
2024-12-13 07:32:23 +01:00
"updated_at" : "2024-12-13T02:39:37Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2021-12-23T21:03:08Z" ,
2024-12-13 07:32:23 +01:00
"stargazers_count" : 95 ,
"watchers_count" : 95 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 12 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 12 ,
2024-12-13 07:32:23 +01:00
"watchers" : 95 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 438375603 ,
"name" : "log4jail" ,
"full_name" : "mufeedvh\/log4jail" ,
"owner" : {
"login" : "mufeedvh" ,
"id" : 26198477 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26198477?v=4" ,
"html_url" : "https:\/\/github.com\/mufeedvh" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mufeedvh\/log4jail" ,
"description" : "A firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks." ,
"fork" : false ,
"created_at" : "2021-12-14T19:29:11Z" ,
"updated_at" : "2023-06-30T21:38:46Z" ,
"pushed_at" : "2021-12-14T21:14:33Z" ,
"stargazers_count" : 24 ,
"watchers_count" : 24 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 24 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 438390351 ,
"name" : "log4shellpoc" ,
"full_name" : "guerzon\/log4shellpoc" ,
"owner" : {
"login" : "guerzon" ,
"id" : 44284609 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44284609?v=4" ,
"html_url" : "https:\/\/github.com\/guerzon" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/guerzon\/log4shellpoc" ,
"description" : "Simple Spring Boot application vulnerable to CVE-2021-44228 (a.k.a log4shell)" ,
"fork" : false ,
"created_at" : "2021-12-14T20:27:26Z" ,
"updated_at" : "2023-02-21T10:56:02Z" ,
"pushed_at" : "2021-12-17T23:47:41Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"jndi-exploit" ,
"log4j" ,
"log4j2" ,
"penetration-testing" ,
"proof-of-concept"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438406090 ,
"name" : "CVE-2021-44228_PoC" ,
"full_name" : "ab0x90\/CVE-2021-44228_PoC" ,
"owner" : {
"login" : "ab0x90" ,
"id" : 36925640 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36925640?v=4" ,
"html_url" : "https:\/\/github.com\/ab0x90" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ab0x90\/CVE-2021-44228_PoC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-14T21:32:42Z" ,
"updated_at" : "2024-11-23T23:28:52Z" ,
"pushed_at" : "2021-12-15T11:23:38Z" ,
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 16 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438409343 ,
"name" : "log4j-remediation-tools" ,
"full_name" : "stripe\/log4j-remediation-tools" ,
"owner" : {
"login" : "stripe" ,
"id" : 856813 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/856813?v=4" ,
"html_url" : "https:\/\/github.com\/stripe" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/stripe\/log4j-remediation-tools" ,
"description" : "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-14T21:47:04Z" ,
"updated_at" : "2024-08-18T16:13:22Z" ,
"pushed_at" : "2023-03-21T09:51:33Z" ,
"stargazers_count" : 41 ,
"watchers_count" : 41 ,
"has_discussions" : false ,
"forks_count" : 9 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"log4j2" ,
"remediation" ,
"tools"
] ,
"visibility" : "public" ,
"forks" : 9 ,
"watchers" : 41 ,
"score" : 0 ,
"subscribers_count" : 9
} ,
{
"id" : 438417506 ,
"name" : "log4jshield" ,
"full_name" : "xsultan\/log4jshield" ,
"owner" : {
"login" : "xsultan" ,
"id" : 231387 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/231387?v=4" ,
"html_url" : "https:\/\/github.com\/xsultan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/xsultan\/log4jshield" ,
"description" : "Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher" ,
"fork" : false ,
"created_at" : "2021-12-14T22:22:15Z" ,
"updated_at" : "2024-11-12T15:10:01Z" ,
"pushed_at" : "2021-12-23T04:50:38Z" ,
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"log4j" ,
"log4j2" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 13 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438418716 ,
"name" : "log4shell-finder" ,
"full_name" : "HynekPetrak\/log4shell-finder" ,
"owner" : {
"login" : "HynekPetrak" ,
"id" : 8593983 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8593983?v=4" ,
"html_url" : "https:\/\/github.com\/HynekPetrak" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/HynekPetrak\/log4shell-finder" ,
"description" : "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint." ,
"fork" : false ,
"created_at" : "2021-12-14T22:27:14Z" ,
"updated_at" : "2024-09-10T05:00:03Z" ,
"pushed_at" : "2023-06-21T11:37:03Z" ,
"stargazers_count" : 38 ,
"watchers_count" : 38 ,
"has_discussions" : false ,
"forks_count" : 14 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2017-5645" ,
"cve-2019-17571" ,
"cve-2020-9488" ,
"cve-2021-4104" ,
"cve-2021-42550" ,
"cve-2021-44228" ,
"cve-2021-44832" ,
"cve-2021-45046" ,
"cve-2021-45105" ,
"cve-2022-23302" ,
"cve-2022-23305" ,
"cve-2022-23307" ,
"log4j" ,
"log4j2" ,
"log4shell" ,
"scanner" ,
"security" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 14 ,
"watchers" : 38 ,
"score" : 0 ,
"subscribers_count" : 5
} ,
{
"id" : 438423480 ,
"name" : "CVE-2021-44228" ,
"full_name" : "0xThiebaut\/CVE-2021-44228" ,
"owner" : {
"login" : "0xThiebaut" ,
"id" : 46688461 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46688461?v=4" ,
"html_url" : "https:\/\/github.com\/0xThiebaut" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xThiebaut\/CVE-2021-44228" ,
"description" : "CVE-2021-44228 Response Scripts" ,
"fork" : false ,
"created_at" : "2021-12-14T22:50:05Z" ,
"updated_at" : "2021-12-15T00:30:22Z" ,
"pushed_at" : "2021-12-15T00:27:46Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438432868 ,
"name" : "CVE-2021-44228_scanner" ,
"full_name" : "CERTCC\/CVE-2021-44228_scanner" ,
"owner" : {
"login" : "CERTCC" ,
"id" : 37221555 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37221555?v=4" ,
"html_url" : "https:\/\/github.com\/CERTCC" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/CERTCC\/CVE-2021-44228_scanner" ,
"description" : "Scanners for Jar files that may be vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-14T23:33:51Z" ,
2024-12-11 13:33:29 +01:00
"updated_at" : "2024-12-11T09:38:58Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2022-03-23T18:12:51Z" ,
2024-12-11 13:33:29 +01:00
"stargazers_count" : 345 ,
"watchers_count" : 345 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 87 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 87 ,
2024-12-11 13:33:29 +01:00
"watchers" : 345 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 35
} ,
{
"id" : 438449548 ,
"name" : "CVE-2021-44228-Log4j-Payloads" ,
"full_name" : "CrackerCat\/CVE-2021-44228-Log4j-Payloads" ,
"owner" : {
"login" : "CrackerCat" ,
"id" : 17995064 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4" ,
"html_url" : "https:\/\/github.com\/CrackerCat" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/CrackerCat\/CVE-2021-44228-Log4j-Payloads" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-15T00:55:12Z" ,
"updated_at" : "2023-08-15T12:50:50Z" ,
"pushed_at" : "2021-12-14T12:49:56Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 14 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 14 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 438469082 ,
"name" : "log4j_scanner" ,
"full_name" : "dbzoo\/log4j_scanner" ,
"owner" : {
"login" : "dbzoo" ,
"id" : 1550399 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1550399?v=4" ,
"html_url" : "https:\/\/github.com\/dbzoo" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dbzoo\/log4j_scanner" ,
"description" : "Fast filesystem scanner for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T02:29:34Z" ,
"updated_at" : "2022-01-09T18:17:10Z" ,
"pushed_at" : "2022-01-10T14:52:40Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438469428 ,
"name" : "CVE-2021-44228_scanner" ,
"full_name" : "jeremyrsellars\/CVE-2021-44228_scanner" ,
"owner" : {
"login" : "jeremyrsellars" ,
"id" : 1396319 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1396319?v=4" ,
"html_url" : "https:\/\/github.com\/jeremyrsellars" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jeremyrsellars\/CVE-2021-44228_scanner" ,
"description" : "Aims to find JndiLookup.class in nearly any directory or zip, jar, ear, war file, even deeply nested." ,
"fork" : false ,
"created_at" : "2021-12-15T02:31:14Z" ,
"updated_at" : "2021-12-15T22:30:35Z" ,
"pushed_at" : "2021-12-15T22:30:32Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438480170 ,
"name" : "C1-WS-LOG4SHELL" ,
"full_name" : "JustinDPerkins\/C1-WS-LOG4SHELL" ,
"owner" : {
"login" : "JustinDPerkins" ,
"id" : 60413733 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60413733?v=4" ,
"html_url" : "https:\/\/github.com\/JustinDPerkins" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/JustinDPerkins\/C1-WS-LOG4SHELL" ,
"description" : "Quick Deploy to show case cve-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T03:20:25Z" ,
"updated_at" : "2021-12-17T17:07:45Z" ,
"pushed_at" : "2021-12-17T17:07:42Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438490030 ,
"name" : "Log4j-Updater" ,
"full_name" : "VinniMarcon\/Log4j-Updater" ,
"owner" : {
"login" : "VinniMarcon" ,
"id" : 42422427 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42422427?v=4" ,
"html_url" : "https:\/\/github.com\/VinniMarcon" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/VinniMarcon\/Log4j-Updater" ,
"description" : "Log4J Updater Bash Script to automate the framework update process on numerous machines and prevent the CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T04:08:15Z" ,
"updated_at" : "2021-12-16T17:25:55Z" ,
"pushed_at" : "2021-12-15T06:20:17Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438504265 ,
"name" : "log4j-vul" ,
"full_name" : "bhprin\/log4j-vul" ,
"owner" : {
"login" : "bhprin" ,
"id" : 1876456 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1876456?v=4" ,
"html_url" : "https:\/\/github.com\/bhprin" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/bhprin\/log4j-vul" ,
"description" : "This project is just to show Apache Log4j2 Vulnerability - aka CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T05:19:13Z" ,
"updated_at" : "2021-12-22T04:39:30Z" ,
"pushed_at" : "2023-01-31T08:17:43Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438523356 ,
"name" : "CVE-2021-44228" ,
"full_name" : "avirahul007\/CVE-2021-44228" ,
"owner" : {
"login" : "avirahul007" ,
"id" : 63554722 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63554722?v=4" ,
"html_url" : "https:\/\/github.com\/avirahul007" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/avirahul007\/CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-15T06:40:35Z" ,
"updated_at" : "2021-12-15T06:40:35Z" ,
"pushed_at" : "2021-12-15T06:40:36Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438541418 ,
"name" : "log4j-log4shell-playground" ,
"full_name" : "rgl\/log4j-log4shell-playground" ,
"owner" : {
"login" : "rgl" ,
"id" : 43356 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43356?v=4" ,
"html_url" : "https:\/\/github.com\/rgl" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/rgl\/log4j-log4shell-playground" ,
"description" : "A playground for poking at the Log4Shell (CVE-2021-44228) vulnerability mitigations" ,
"fork" : false ,
"created_at" : "2021-12-15T07:51:12Z" ,
"updated_at" : "2021-12-16T11:59:53Z" ,
"pushed_at" : "2021-12-15T08:44:16Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"log4j" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438541504 ,
"name" : "how-to-check-patch-secure-log4j-CVE-2021-44228" ,
"full_name" : "anuvindhs\/how-to-check-patch-secure-log4j-CVE-2021-44228" ,
"owner" : {
"login" : "anuvindhs" ,
"id" : 46879183 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46879183?v=4" ,
"html_url" : "https:\/\/github.com\/anuvindhs" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/anuvindhs\/how-to-check-patch-secure-log4j-CVE-2021-44228" ,
"description" : "A one-stop repo\/ information hub for all log4j vulnerability-related information." ,
"fork" : false ,
"created_at" : "2021-12-15T07:51:28Z" ,
"updated_at" : "2022-03-17T16:19:51Z" ,
"pushed_at" : "2022-01-14T05:38:05Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"vulnerability-detection"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438593574 ,
"name" : "Get-log4j-Windows.ps1" ,
"full_name" : "KeysAU\/Get-log4j-Windows.ps1" ,
"owner" : {
"login" : "KeysAU" ,
"id" : 38932932 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38932932?v=4" ,
"html_url" : "https:\/\/github.com\/KeysAU" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/KeysAU\/Get-log4j-Windows.ps1" ,
"description" : "Identifying all log4j components across all windows servers, entire domain, can be multi domain. CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T10:49:36Z" ,
"updated_at" : "2022-01-12T12:25:17Z" ,
"pushed_at" : "2021-12-20T06:29:15Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438595299 ,
"name" : "log4j-CVE-2021-44228" ,
"full_name" : "kubearmor\/log4j-CVE-2021-44228" ,
"owner" : {
"login" : "kubearmor" ,
"id" : 86793284 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86793284?v=4" ,
"html_url" : "https:\/\/github.com\/kubearmor" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kubearmor\/log4j-CVE-2021-44228" ,
"description" : "Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T10:55:35Z" ,
"updated_at" : "2024-07-02T20:27:26Z" ,
"pushed_at" : "2021-12-15T16:29:14Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 8 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 438600716 ,
"name" : "logpresso-CVE-2021-44228-Scanner" ,
"full_name" : "jyotisahu98\/logpresso-CVE-2021-44228-Scanner" ,
"owner" : {
"login" : "jyotisahu98" ,
"id" : 96179721 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96179721?v=4" ,
"html_url" : "https:\/\/github.com\/jyotisahu98" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jyotisahu98\/logpresso-CVE-2021-44228-Scanner" ,
"description" : "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T11:15:25Z" ,
"updated_at" : "2021-12-27T14:28:30Z" ,
"pushed_at" : "2021-12-15T11:15:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438605924 ,
"name" : "log4j-resources" ,
"full_name" : "gitlab-de\/log4j-resources" ,
"owner" : {
"login" : "gitlab-de" ,
"id" : 75491323 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75491323?v=4" ,
"html_url" : "https:\/\/github.com\/gitlab-de" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/gitlab-de\/log4j-resources" ,
"description" : "This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 and CVE-2021-45046 (mirror from GitLab.com)" ,
"fork" : false ,
"created_at" : "2021-12-15T11:34:02Z" ,
"updated_at" : "2021-12-18T15:25:17Z" ,
"pushed_at" : "2021-12-18T15:25:14Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"log4j"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438615335 ,
"name" : "Log4JHunt" ,
"full_name" : "redhuntlabs\/Log4JHunt" ,
"owner" : {
"login" : "redhuntlabs" ,
"id" : 36505047 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36505047?v=4" ,
"html_url" : "https:\/\/github.com\/redhuntlabs" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/redhuntlabs\/Log4JHunt" ,
"description" : "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability." ,
"fork" : false ,
"created_at" : "2021-12-15T12:07:05Z" ,
"updated_at" : "2024-05-11T11:36:22Z" ,
"pushed_at" : "2021-12-17T07:41:47Z" ,
"stargazers_count" : 43 ,
"watchers_count" : 43 ,
"has_discussions" : false ,
"forks_count" : 7 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 7 ,
"watchers" : 43 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438635569 ,
"name" : "log4shell-hotfix-side-effect" ,
"full_name" : "mss\/log4shell-hotfix-side-effect" ,
"owner" : {
"login" : "mss" ,
"id" : 5391 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5391?v=4" ,
"html_url" : "https:\/\/github.com\/mss" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mss\/log4shell-hotfix-side-effect" ,
"description" : "Test case to check if the Log4Shell\/CVE-2021-44228 hotfix will raise any unexpected exceptions" ,
"fork" : false ,
"created_at" : "2021-12-15T13:14:34Z" ,
"updated_at" : "2023-02-28T20:50:34Z" ,
"pushed_at" : "2021-12-18T12:02:09Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"java" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438664340 ,
"name" : "log4j-vuln-coverage-check" ,
"full_name" : "MeterianHQ\/log4j-vuln-coverage-check" ,
"owner" : {
"login" : "MeterianHQ" ,
"id" : 28596672 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28596672?v=4" ,
"html_url" : "https:\/\/github.com\/MeterianHQ" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/MeterianHQ\/log4j-vuln-coverage-check" ,
"description" : "A simple project to check coverage of Log4J vuln CVE-2021-44228 (and related)" ,
"fork" : false ,
"created_at" : "2021-12-15T14:44:14Z" ,
"updated_at" : "2021-12-16T14:00:05Z" ,
"pushed_at" : "2022-12-01T09:18:05Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438680847 ,
"name" : "jmeter-fix-cve-2021-44228-windows" ,
"full_name" : "sebiboga\/jmeter-fix-cve-2021-44228-windows" ,
"owner" : {
"login" : "sebiboga" ,
"id" : 41440889 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41440889?v=4" ,
"html_url" : "https:\/\/github.com\/sebiboga" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sebiboga\/jmeter-fix-cve-2021-44228-windows" ,
"description" : "fix cve 44228 for windows" ,
"fork" : false ,
"created_at" : "2021-12-15T15:34:19Z" ,
"updated_at" : "2021-12-15T15:50:19Z" ,
"pushed_at" : "2021-12-15T15:51:46Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438683307 ,
"name" : "log4shell-cloud-scanner" ,
"full_name" : "mitiga\/log4shell-cloud-scanner" ,
"owner" : {
"login" : "mitiga" ,
"id" : 82891013 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82891013?v=4" ,
"html_url" : "https:\/\/github.com\/mitiga" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mitiga\/log4shell-cloud-scanner" ,
"description" : "we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them" ,
"fork" : false ,
"created_at" : "2021-12-15T15:42:06Z" ,
"updated_at" : "2022-01-04T14:01:16Z" ,
"pushed_at" : "2021-12-17T16:00:03Z" ,
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 13 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 438689577 ,
"name" : "Log4j" ,
"full_name" : "isuruwa\/Log4j" ,
"owner" : {
"login" : "isuruwa" ,
"id" : 72663288 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/72663288?v=4" ,
"html_url" : "https:\/\/github.com\/isuruwa" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/isuruwa\/Log4j" ,
"description" : "A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228 " ,
"fork" : false ,
"created_at" : "2021-12-15T16:01:36Z" ,
"updated_at" : "2024-08-12T20:18:56Z" ,
"pushed_at" : "2022-08-06T15:26:04Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"java" ,
"log4j"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438692384 ,
"name" : "log4shell-data" ,
"full_name" : "honeynet\/log4shell-data" ,
"owner" : {
"login" : "honeynet" ,
"id" : 3327517 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3327517?v=4" ,
"html_url" : "https:\/\/github.com\/honeynet" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/honeynet\/log4shell-data" ,
"description" : "Data we are receiving from our honeypots about CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T16:10:54Z" ,
"updated_at" : "2022-10-14T09:19:33Z" ,
"pushed_at" : "2021-12-16T16:08:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 438695688 ,
"name" : "checkmk-log4j-scanner" ,
"full_name" : "inettgmbh\/checkmk-log4j-scanner" ,
"owner" : {
"login" : "inettgmbh" ,
"id" : 12827152 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12827152?v=4" ,
"html_url" : "https:\/\/github.com\/inettgmbh" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/inettgmbh\/checkmk-log4j-scanner" ,
"description" : "Scans for Log4j versions effected by CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T16:21:26Z" ,
"updated_at" : "2024-05-13T12:42:03Z" ,
"pushed_at" : "2024-05-13T12:44:51Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"checkmk" ,
"log4j"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 438719808 ,
"name" : "CVE-2021-44228" ,
"full_name" : "b1tm0n3r\/CVE-2021-44228" ,
"owner" : {
"login" : "b1tm0n3r" ,
"id" : 61518601 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/61518601?v=4" ,
"html_url" : "https:\/\/github.com\/b1tm0n3r" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/b1tm0n3r\/CVE-2021-44228" ,
"description" : "CVE-2021-44228 demo webapp" ,
"fork" : false ,
"created_at" : "2021-12-15T17:42:13Z" ,
"updated_at" : "2021-12-20T19:25:27Z" ,
"pushed_at" : "2021-12-20T19:25:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438739105 ,
"name" : "CVE-2021-44228-Log4j" ,
"full_name" : "VerveIndustrialProtection\/CVE-2021-44228-Log4j" ,
"owner" : {
"login" : "VerveIndustrialProtection" ,
"id" : 96202973 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96202973?v=4" ,
"html_url" : "https:\/\/github.com\/VerveIndustrialProtection" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/VerveIndustrialProtection\/CVE-2021-44228-Log4j" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-15T18:51:07Z" ,
"updated_at" : "2022-01-01T14:37:49Z" ,
"pushed_at" : "2022-01-04T21:10:54Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438745261 ,
"name" : "log4j" ,
"full_name" : "alenazi90\/log4j" ,
"owner" : {
"login" : "alenazi90" ,
"id" : 3836915 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3836915?v=4" ,
"html_url" : "https:\/\/github.com\/alenazi90" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/alenazi90\/log4j" ,
"description" : "An automated header extensive scanner for detecting log4j RCE CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T19:15:00Z" ,
"updated_at" : "2021-12-16T15:10:52Z" ,
"pushed_at" : "2021-12-15T19:21:02Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438747026 ,
"name" : "log4j-cve-2021-44228" ,
"full_name" : "pmontesd\/log4j-cve-2021-44228" ,
"owner" : {
"login" : "pmontesd" ,
"id" : 8183561 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8183561?v=4" ,
"html_url" : "https:\/\/github.com\/pmontesd" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/pmontesd\/log4j-cve-2021-44228" ,
"description" : "Very simple Ansible playbook that scan filesystem for JAR files vulnerable to Log4Shell" ,
"fork" : false ,
"created_at" : "2021-12-15T19:21:39Z" ,
"updated_at" : "2022-01-12T13:13:44Z" ,
"pushed_at" : "2021-12-15T20:39:16Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438756678 ,
"name" : "log4shell" ,
"full_name" : "LiveOverflow\/log4shell" ,
"owner" : {
"login" : "LiveOverflow" ,
"id" : 12161158 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12161158?v=4" ,
"html_url" : "https:\/\/github.com\/LiveOverflow" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/LiveOverflow\/log4shell" ,
"description" : "Small example repo for looking into log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-15T19:59:38Z" ,
2024-12-15 07:31:34 +01:00
"updated_at" : "2024-12-15T03:24:00Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2021-12-24T15:44:53Z" ,
2024-12-15 07:31:34 +01:00
"stargazers_count" : 69 ,
"watchers_count" : 69 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 11 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 11 ,
2024-12-15 07:31:34 +01:00
"watchers" : 69 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438761150 ,
"name" : "kubernetes-log4j-cve-2021-44228-node-agent" ,
"full_name" : "aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent" ,
"owner" : {
"login" : "aws-samples" ,
"id" : 8931462 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8931462?v=4" ,
"html_url" : "https:\/\/github.com\/aws-samples" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-15T20:17:41Z" ,
"updated_at" : "2023-10-19T15:47:11Z" ,
"pushed_at" : "2022-08-26T14:56:01Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 18 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 18 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 438773632 ,
"name" : "Log4Shell-Honeypot" ,
"full_name" : "michaelsanford\/Log4Shell-Honeypot" ,
"owner" : {
"login" : "michaelsanford" ,
"id" : 1800499 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1800499?v=4" ,
"html_url" : "https:\/\/github.com\/michaelsanford" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/michaelsanford\/Log4Shell-Honeypot" ,
"description" : "Dockerized honeypot for CVE-2021-44228." ,
"fork" : false ,
"created_at" : "2021-12-15T21:09:00Z" ,
"updated_at" : "2023-06-22T04:46:02Z" ,
"pushed_at" : "2024-11-25T05:57:14Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"docker" ,
"honeypot" ,
"python"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438791130 ,
"name" : "Log4Pot" ,
"full_name" : "thomaspatzke\/Log4Pot" ,
"owner" : {
"login" : "thomaspatzke" ,
"id" : 1845601 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1845601?v=4" ,
"html_url" : "https:\/\/github.com\/thomaspatzke" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/thomaspatzke\/Log4Pot" ,
"description" : "A honeypot for the Log4Shell vulnerability (CVE-2021-44228)." ,
"fork" : false ,
"created_at" : "2021-12-15T22:30:34Z" ,
2024-12-01 13:33:11 +01:00
"updated_at" : "2024-12-01T11:52:36Z" ,
2024-11-30 01:31:41 +01:00
"pushed_at" : "2024-11-29T22:56:57Z" ,
2024-12-01 13:33:11 +01:00
"stargazers_count" : 91 ,
"watchers_count" : 91 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : true ,
2024-11-29 19:31:55 +01:00
"forks_count" : 28 ,
2024-11-28 19:31:51 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-11-29 19:31:55 +01:00
"forks" : 28 ,
2024-12-01 13:33:11 +01:00
"watchers" : 91 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 438797049 ,
"name" : "cve-2021-44228-rce-poc" ,
"full_name" : "ubitech\/cve-2021-44228-rce-poc" ,
"owner" : {
"login" : "ubitech" ,
"id" : 998323 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/998323?v=4" ,
"html_url" : "https:\/\/github.com\/ubitech" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ubitech\/cve-2021-44228-rce-poc" ,
"description" : "A Remote Code Execution PoC for Log4Shell (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-15T23:00:25Z" ,
"updated_at" : "2024-04-19T14:29:37Z" ,
"pushed_at" : "2021-12-15T23:03:44Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 438825521 ,
"name" : "log4v-vuln-check" ,
"full_name" : "rv4l3r3\/log4v-vuln-check" ,
"owner" : {
"login" : "rv4l3r3" ,
"id" : 90338959 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/90338959?v=4" ,
"html_url" : "https:\/\/github.com\/rv4l3r3" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/rv4l3r3\/log4v-vuln-check" ,
"description" : "This script is used to perform a fast check if your server is possibly affected by CVE-2021-44228 (the log4j vulnerability)." ,
"fork" : false ,
"created_at" : "2021-12-16T01:38:25Z" ,
"updated_at" : "2021-12-20T22:11:34Z" ,
"pushed_at" : "2021-12-20T22:11:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438853805 ,
"name" : "log4j_scanner_wrapper" ,
"full_name" : "dpomnean\/log4j_scanner_wrapper" ,
"owner" : {
"login" : "dpomnean" ,
"id" : 17032114 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17032114?v=4" ,
"html_url" : "https:\/\/github.com\/dpomnean" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dpomnean\/log4j_scanner_wrapper" ,
"description" : "log4j vulnerability wrapper scanner for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-16T03:57:41Z" ,
"updated_at" : "2021-12-17T15:23:34Z" ,
"pushed_at" : "2021-12-16T14:10:25Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438920047 ,
"name" : "CVE-2021-44228" ,
"full_name" : "roxas-tan\/CVE-2021-44228" ,
"owner" : {
"login" : "roxas-tan" ,
"id" : 63656689 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63656689?v=4" ,
"html_url" : "https:\/\/github.com\/roxas-tan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/roxas-tan\/CVE-2021-44228" ,
"description" : "This Log4j RCE exploit originated from https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce" ,
"fork" : false ,
"created_at" : "2021-12-16T08:46:55Z" ,
"updated_at" : "2023-11-29T06:51:14Z" ,
"pushed_at" : "2021-12-16T08:59:14Z" ,
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
"has_discussions" : false ,
"forks_count" : 7 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 7 ,
"watchers" : 10 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438931405 ,
"name" : "CVE-2021-44228" ,
"full_name" : "shamo0\/CVE-2021-44228" ,
"owner" : {
"login" : "shamo0" ,
"id" : 48299520 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4" ,
"html_url" : "https:\/\/github.com\/shamo0" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/shamo0\/CVE-2021-44228" ,
"description" : "log4shell (CVE-2021-44228) scanning tool" ,
"fork" : false ,
"created_at" : "2021-12-16T09:26:37Z" ,
"updated_at" : "2024-08-12T20:18:57Z" ,
"pushed_at" : "2021-12-16T10:00:15Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"2021" ,
"44228" ,
"apache" ,
"code" ,
"cve" ,
"cve-2021-44228" ,
"execution" ,
"exploit" ,
"log" ,
"log4j" ,
"log4j2" ,
"log4shell" ,
"logging" ,
"poc" ,
"rce" ,
"remote" ,
"scanner" ,
"scanning" ,
"tool"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438940454 ,
"name" : "log4j-Scan-Burpsuite" ,
"full_name" : "snow0715\/log4j-Scan-Burpsuite" ,
"owner" : {
"login" : "snow0715" ,
"id" : 54879520 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54879520?v=4" ,
"html_url" : "https:\/\/github.com\/snow0715" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/snow0715\/log4j-Scan-Burpsuite" ,
"description" : "Log4j漏洞( CVE-2021-44228) 的Burpsuite检测插件" ,
"fork" : false ,
"created_at" : "2021-12-16T09:58:02Z" ,
"updated_at" : "2024-04-07T08:54:48Z" ,
"pushed_at" : "2022-01-26T03:51:30Z" ,
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 13 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438951347 ,
"name" : "Log4j-Windows-Scanner" ,
"full_name" : "Joefreedy\/Log4j-Windows-Scanner" ,
"owner" : {
"login" : "Joefreedy" ,
"id" : 47759132 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47759132?v=4" ,
"html_url" : "https:\/\/github.com\/Joefreedy" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Joefreedy\/Log4j-Windows-Scanner" ,
"description" : "CVE-2021-44228 vulnerability in Apache Log4j library | Log4j vulnerability scanner on Windows machines." ,
"fork" : false ,
"created_at" : "2021-12-16T10:37:16Z" ,
"updated_at" : "2022-03-29T19:51:54Z" ,
"pushed_at" : "2022-10-05T11:18:26Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438971911 ,
"name" : "log4fix" ,
"full_name" : "Nanitor\/log4fix" ,
"owner" : {
"login" : "Nanitor" ,
"id" : 6453685 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6453685?v=4" ,
"html_url" : "https:\/\/github.com\/Nanitor" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Nanitor\/log4fix" ,
"description" : "Detect and fix log4j log4shell vulnerability (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-16T11:54:11Z" ,
"updated_at" : "2022-09-22T23:48:42Z" ,
"pushed_at" : "2021-12-24T13:08:46Z" ,
"stargazers_count" : 12 ,
"watchers_count" : 12 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 12 ,
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 438979039 ,
"name" : "scanlist-log4j" ,
"full_name" : "Gyrfalc0n\/scanlist-log4j" ,
"owner" : {
"login" : "Gyrfalc0n" ,
"id" : 46728024 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46728024?v=4" ,
"html_url" : "https:\/\/github.com\/Gyrfalc0n" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Gyrfalc0n\/scanlist-log4j" ,
"description" : "Simple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-16T12:20:00Z" ,
"updated_at" : "2021-12-20T15:36:11Z" ,
"pushed_at" : "2022-01-12T08:53:23Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438985997 ,
"name" : "log4shell-demo" ,
"full_name" : "korteke\/log4shell-demo" ,
"owner" : {
"login" : "korteke" ,
"id" : 2558348 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2558348?v=4" ,
"html_url" : "https:\/\/github.com\/korteke" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/korteke\/log4shell-demo" ,
"description" : "Simple webapp that is vulnerable to Log4Shell (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-16T12:44:24Z" ,
"updated_at" : "2021-12-22T12:14:02Z" ,
"pushed_at" : "2023-02-13T22:30:21Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 438992218 ,
"name" : "vuln_spring_log4j2" ,
"full_name" : "recanavar\/vuln_spring_log4j2" ,
"owner" : {
"login" : "recanavar" ,
"id" : 9977753 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9977753?v=4" ,
"html_url" : "https:\/\/github.com\/recanavar" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/recanavar\/vuln_spring_log4j2" ,
"description" : "Simple Vulnerable Spring Boot Application to Test the CVE-2021-44228 " ,
"fork" : false ,
"created_at" : "2021-12-16T13:05:38Z" ,
"updated_at" : "2021-12-16T15:50:45Z" ,
"pushed_at" : "2021-12-16T14:34:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"java" ,
"log4j2" ,
"spring"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438998103 ,
"name" : "Burp-Log4j-HammerTime" ,
"full_name" : "DXC-StrikeForce\/Burp-Log4j-HammerTime" ,
"owner" : {
"login" : "DXC-StrikeForce" ,
"id" : 77387831 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/77387831?v=4" ,
"html_url" : "https:\/\/github.com\/DXC-StrikeForce" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/DXC-StrikeForce\/Burp-Log4j-HammerTime" ,
"description" : "Burp Active Scan extension to identify Log4j vulnerabilities CVE-2021-44228 and CVE-2021-45046" ,
"fork" : false ,
"created_at" : "2021-12-16T13:25:03Z" ,
"updated_at" : "2022-01-08T17:32:58Z" ,
"pushed_at" : "2021-12-16T17:02:30Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 8 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439018822 ,
"name" : "log4j-filescan" ,
"full_name" : "andalik\/log4j-filescan" ,
"owner" : {
"login" : "andalik" ,
"id" : 12278569 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12278569?v=4" ,
"html_url" : "https:\/\/github.com\/andalik" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/andalik\/log4j-filescan" ,
"description" : "Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)" ,
"fork" : false ,
"created_at" : "2021-12-16T14:29:05Z" ,
"updated_at" : "2022-03-05T22:52:28Z" ,
"pushed_at" : "2022-03-05T23:01:15Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439019569 ,
"name" : "CVE-2021-44228-Apache-Log4j" ,
"full_name" : "lonecloud\/CVE-2021-44228-Apache-Log4j" ,
"owner" : {
"login" : "lonecloud" ,
"id" : 17854123 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17854123?v=4" ,
"html_url" : "https:\/\/github.com\/lonecloud" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lonecloud\/CVE-2021-44228-Apache-Log4j" ,
"description" : "CVE-2021-44228-Apache-Log4j" ,
"fork" : false ,
"created_at" : "2021-12-16T14:31:14Z" ,
"updated_at" : "2021-12-16T14:31:45Z" ,
"pushed_at" : "2021-12-16T14:31:42Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439030654 ,
"name" : "CVE-2021-44228" ,
"full_name" : "gyaansastra\/CVE-2021-44228" ,
"owner" : {
"login" : "gyaansastra" ,
"id" : 35690123 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4" ,
"html_url" : "https:\/\/github.com\/gyaansastra" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/gyaansastra\/CVE-2021-44228" ,
"description" : "Log4Shell CVE-2021-44228 Vulnerability Scanner and POC" ,
"fork" : false ,
"created_at" : "2021-12-16T15:04:23Z" ,
"updated_at" : "2021-12-21T05:46:51Z" ,
"pushed_at" : "2021-12-21T07:03:36Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439060792 ,
"name" : "CVE-2021-44228" ,
"full_name" : "axisops\/CVE-2021-44228" ,
"owner" : {
"login" : "axisops" ,
"id" : 5512152 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5512152?v=4" ,
"html_url" : "https:\/\/github.com\/axisops" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/axisops\/CVE-2021-44228" ,
"description" : "log4j mitigation work" ,
"fork" : false ,
"created_at" : "2021-12-16T16:42:44Z" ,
"updated_at" : "2021-12-16T16:42:44Z" ,
"pushed_at" : "2021-12-16T16:42:46Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439071699 ,
"name" : "MyLog4Shell" ,
"full_name" : "kal1gh0st\/MyLog4Shell" ,
"owner" : {
"login" : "kal1gh0st" ,
"id" : 56889513 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4" ,
"html_url" : "https:\/\/github.com\/kal1gh0st" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kal1gh0st\/MyLog4Shell" ,
"description" : "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading" ,
"fork" : false ,
"created_at" : "2021-12-16T17:21:22Z" ,
"updated_at" : "2022-02-25T00:05:36Z" ,
"pushed_at" : "2021-12-30T23:42:20Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439071959 ,
"name" : "log4shell" ,
"full_name" : "hozyx\/log4shell" ,
"owner" : {
"login" : "hozyx" ,
"id" : 96227119 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96227119?v=4" ,
"html_url" : "https:\/\/github.com\/hozyx" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/hozyx\/log4shell" ,
"description" : "Applications that are vulnerable to the log4j CVE-2021-44228\/45046 issue may be detectable by scanning jar, war, ear, zip files to search for the presence of JndiLookup.class." ,
"fork" : false ,
"created_at" : "2021-12-16T17:22:17Z" ,
"updated_at" : "2021-12-16T19:22:07Z" ,
"pushed_at" : "2021-12-16T19:22:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439077328 ,
"name" : "Log4J_checker" ,
"full_name" : "andypitcher\/Log4J_checker" ,
"owner" : {
"login" : "andypitcher" ,
"id" : 12878731 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12878731?v=4" ,
"html_url" : "https:\/\/github.com\/andypitcher" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/andypitcher\/Log4J_checker" ,
"description" : "Log4J checker for Apache CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-16T17:41:47Z" ,
"updated_at" : "2023-05-07T15:43:13Z" ,
"pushed_at" : "2021-12-16T18:28:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439093094 ,
"name" : "log4j-cve-2021-44228" ,
"full_name" : "Vulnmachines\/log4j-cve-2021-44228" ,
"owner" : {
"login" : "Vulnmachines" ,
"id" : 79006904 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4" ,
"html_url" : "https:\/\/github.com\/Vulnmachines" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Vulnmachines\/log4j-cve-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-16T18:42:08Z" ,
"updated_at" : "2021-12-16T18:42:11Z" ,
"pushed_at" : "2021-12-16T18:42:08Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439112800 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce" ,
"full_name" : "kannthu\/CVE-2021-44228-Apache-Log4j-Rce" ,
"owner" : {
"login" : "kannthu" ,
"id" : 22802035 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22802035?v=4" ,
"html_url" : "https:\/\/github.com\/kannthu" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kannthu\/CVE-2021-44228-Apache-Log4j-Rce" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-16T20:02:09Z" ,
"updated_at" : "2021-12-16T20:05:17Z" ,
"pushed_at" : "2021-12-16T20:05:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439129728 ,
"name" : "CVE-2021-44228" ,
"full_name" : "Kr0ff\/CVE-2021-44228" ,
"owner" : {
"login" : "Kr0ff" ,
"id" : 35173514 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4" ,
"html_url" : "https:\/\/github.com\/Kr0ff" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Kr0ff\/CVE-2021-44228" ,
"description" : "Log4Shell Proof of Concept (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-16T21:19:17Z" ,
"updated_at" : "2023-08-15T12:51:08Z" ,
"pushed_at" : "2022-04-21T13:23:40Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439151562 ,
"name" : "log4shell4shell" ,
"full_name" : "suuhm\/log4shell4shell" ,
"owner" : {
"login" : "suuhm" ,
"id" : 11504990 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11504990?v=4" ,
"html_url" : "https:\/\/github.com\/suuhm" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/suuhm\/log4shell4shell" ,
"description" : "Log4shell - Multi-Toolkit. Find, Fix & Test possible CVE-2021-44228 vulneraries - provides a complete LOG4SHELL test\/attack environment on shell" ,
"fork" : false ,
"created_at" : "2021-12-16T23:13:09Z" ,
"updated_at" : "2022-04-23T23:26:29Z" ,
"pushed_at" : "2021-12-23T00:09:08Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"checker" ,
"hacking" ,
"linux" ,
"log4j" ,
"log4j2" ,
"log4shell" ,
"macos" ,
"patch" ,
"penetration-testing" ,
"pentesting" ,
"proof-of-concept" ,
"scanner" ,
"security" ,
"tomcat" ,
"vulnerability-scanners" ,
"windows"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439179362 ,
"name" : "log4shell-test-exploit" ,
"full_name" : "wajda\/log4shell-test-exploit" ,
"owner" : {
"login" : "wajda" ,
"id" : 795479 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/795479?v=4" ,
"html_url" : "https:\/\/github.com\/wajda" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/wajda\/log4shell-test-exploit" ,
"description" : "Test exploit of CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-17T01:50:22Z" ,
"updated_at" : "2021-12-23T13:48:51Z" ,
"pushed_at" : "2021-12-23T13:48:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439208776 ,
"name" : "log4shell-poc-lab" ,
"full_name" : "obscuritylabs\/log4shell-poc-lab" ,
"owner" : {
"login" : "obscuritylabs" ,
"id" : 36056630 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36056630?v=4" ,
"html_url" : "https:\/\/github.com\/obscuritylabs" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/obscuritylabs\/log4shell-poc-lab" ,
"description" : "A lab demonstration of the log4shell vulnerability: CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-17T04:20:40Z" ,
"updated_at" : "2023-07-23T00:49:26Z" ,
"pushed_at" : "2021-12-17T17:21:50Z" ,
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : true ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 9 ,
"score" : 0 ,
"subscribers_count" : 5
} ,
{
"id" : 439217985 ,
"name" : "vCenter-Server-Workaround-Script-CVE-2021-44228" ,
"full_name" : "Fazmin\/vCenter-Server-Workaround-Script-CVE-2021-44228" ,
"owner" : {
"login" : "Fazmin" ,
"id" : 1432117 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1432117?v=4" ,
"html_url" : "https:\/\/github.com\/Fazmin" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Fazmin\/vCenter-Server-Workaround-Script-CVE-2021-44228" ,
"description" : "Script - Workaround instructions to address CVE-2021-44228 in vCenter Server " ,
"fork" : false ,
"created_at" : "2021-12-17T05:14:05Z" ,
"updated_at" : "2023-03-19T00:01:25Z" ,
"pushed_at" : "2022-01-13T14:19:13Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439234639 ,
"name" : "CVE-2021-44228-Log4j-PoC-RCE" ,
"full_name" : "Grupo-Kapa-7\/CVE-2021-44228-Log4j-PoC-RCE" ,
"owner" : {
"login" : "Grupo-Kapa-7" ,
"id" : 80293225 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/80293225?v=4" ,
"html_url" : "https:\/\/github.com\/Grupo-Kapa-7" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Grupo-Kapa-7\/CVE-2021-44228-Log4j-PoC-RCE" ,
"description" : "PoC RCE Log4j CVE-2021-4428 para pruebas" ,
"fork" : false ,
"created_at" : "2021-12-17T06:34:51Z" ,
"updated_at" : "2021-12-17T06:38:25Z" ,
"pushed_at" : "2022-01-04T16:58:10Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 439263342 ,
"name" : "CVE-2021-44228_scanner" ,
"full_name" : "rohan-flutterint\/CVE-2021-44228_scanner" ,
"owner" : {
"login" : "rohan-flutterint" ,
"id" : 82864904 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82864904?v=4" ,
"html_url" : "https:\/\/github.com\/rohan-flutterint" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/rohan-flutterint\/CVE-2021-44228_scanner" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-17T08:32:20Z" ,
"updated_at" : "2021-12-17T08:32:31Z" ,
"pushed_at" : "2021-12-17T08:32:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439273329 ,
"name" : "Fix-Log4j-PowershellScript" ,
"full_name" : "sysadmin0815\/Fix-Log4j-PowershellScript" ,
"owner" : {
"login" : "sysadmin0815" ,
"id" : 81157346 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/81157346?v=4" ,
"html_url" : "https:\/\/github.com\/sysadmin0815" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sysadmin0815\/Fix-Log4j-PowershellScript" ,
"description" : "Log4Shell mitigation (CVE-2021-44228) - search and remove JNDI class from *log4j*.jar files on the system with Powershell (Windows)" ,
"fork" : false ,
"created_at" : "2021-12-17T09:09:56Z" ,
"updated_at" : "2024-05-08T09:50:15Z" ,
"pushed_at" : "2021-12-23T10:44:58Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439273557 ,
"name" : "log4j-lookups-vulnerability" ,
"full_name" : "RenYuH\/log4j-lookups-vulnerability" ,
"owner" : {
"login" : "RenYuH" ,
"id" : 25149383 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25149383?v=4" ,
"html_url" : "https:\/\/github.com\/RenYuH" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/RenYuH\/log4j-lookups-vulnerability" ,
"description" : "Log4j2 Vulnerability (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-17T09:10:50Z" ,
"updated_at" : "2021-12-17T09:52:30Z" ,
"pushed_at" : "2021-12-17T09:52:28Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439288883 ,
"name" : "py-log4shellscanner" ,
"full_name" : "scheibling\/py-log4shellscanner" ,
"owner" : {
"login" : "scheibling" ,
"id" : 24367830 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24367830?v=4" ,
"html_url" : "https:\/\/github.com\/scheibling" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/scheibling\/py-log4shellscanner" ,
"description" : "Scanner for the Log4j vulnerability dubbed Log4Shell (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-17T10:06:07Z" ,
"updated_at" : "2021-12-17T10:40:07Z" ,
"pushed_at" : "2021-12-17T10:40:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439296638 ,
"name" : "CVE-2021-44228" ,
"full_name" : "zaneef\/CVE-2021-44228" ,
"owner" : {
"login" : "zaneef" ,
"id" : 54664755 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54664755?v=4" ,
"html_url" : "https:\/\/github.com\/zaneef" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/zaneef\/CVE-2021-44228" ,
"description" : "Log4Shell (CVE-2021-44228): Descrizione, Exploitation e Mitigazione" ,
"fork" : false ,
"created_at" : "2021-12-17T10:36:16Z" ,
"updated_at" : "2021-12-21T11:08:13Z" ,
"pushed_at" : "2021-12-21T08:50:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"jndi-exploit" ,
"jndi-lookups" ,
"log4j2" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439330776 ,
"name" : "log4j-quick-scan" ,
"full_name" : "metodidavidovic\/log4j-quick-scan" ,
"owner" : {
"login" : "metodidavidovic" ,
"id" : 75225635 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75225635?v=4" ,
"html_url" : "https:\/\/github.com\/metodidavidovic" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/metodidavidovic\/log4j-quick-scan" ,
"description" : "Scan your IP network and determine hosts with possible CVE-2021-44228 vulnerability in log4j library." ,
"fork" : false ,
"created_at" : "2021-12-17T12:49:59Z" ,
"updated_at" : "2021-12-21T14:51:50Z" ,
"pushed_at" : "2021-12-21T14:51:47Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439385857 ,
"name" : "log4shell-iocs" ,
"full_name" : "WatchGuard-Threat-Lab\/log4shell-iocs" ,
"owner" : {
"login" : "WatchGuard-Threat-Lab" ,
"id" : 31286181 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31286181?v=4" ,
"html_url" : "https:\/\/github.com\/WatchGuard-Threat-Lab" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/WatchGuard-Threat-Lab\/log4shell-iocs" ,
"description" : "A collection of IOCs for CVE-2021-44228 also known as Log4Shell" ,
"fork" : false ,
"created_at" : "2021-12-17T15:58:14Z" ,
"updated_at" : "2021-12-17T15:59:33Z" ,
"pushed_at" : "2021-12-17T15:58:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439393950 ,
"name" : "log4j-patched" ,
"full_name" : "Aschen\/log4j-patched" ,
"owner" : {
"login" : "Aschen" ,
"id" : 4447392 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4447392?v=4" ,
"html_url" : "https:\/\/github.com\/Aschen" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Aschen\/log4j-patched" ,
"description" : "Provide patched version of Log4J against CVE-2021-44228 and CVE-2021-45046 as well as a script to manually patch it yourself" ,
"fork" : false ,
"created_at" : "2021-12-17T16:26:12Z" ,
"updated_at" : "2021-12-19T18:29:10Z" ,
"pushed_at" : "2021-12-17T18:41:35Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439409726 ,
"name" : "cve-2021-44228" ,
"full_name" : "Nikolas-Charalambidis\/cve-2021-44228" ,
"owner" : {
"login" : "Nikolas-Charalambidis" ,
"id" : 21295587 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21295587?v=4" ,
"html_url" : "https:\/\/github.com\/Nikolas-Charalambidis" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Nikolas-Charalambidis\/cve-2021-44228" ,
"description" : "A simple simulation of the infamous CVE-2021-44228 issue." ,
"fork" : false ,
"created_at" : "2021-12-17T17:23:47Z" ,
"updated_at" : "2022-12-02T02:40:53Z" ,
"pushed_at" : "2021-12-18T13:45:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"java" ,
"java-11" ,
"log4j" ,
"security"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439420251 ,
"name" : "detect-log4j-exploitable" ,
"full_name" : "m0rath\/detect-log4j-exploitable" ,
"owner" : {
"login" : "m0rath" ,
"id" : 17716312 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17716312?v=4" ,
"html_url" : "https:\/\/github.com\/m0rath" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/m0rath\/detect-log4j-exploitable" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-17T18:03:50Z" ,
"updated_at" : "2021-12-20T17:53:14Z" ,
"pushed_at" : "2021-12-20T17:53:11Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439430099 ,
"name" : "CVE-2021-44228-VULN-APP" ,
"full_name" : "nu11secur1ty\/CVE-2021-44228-VULN-APP" ,
"owner" : {
"login" : "nu11secur1ty" ,
"id" : 3677559 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3677559?v=4" ,
"html_url" : "https:\/\/github.com\/nu11secur1ty" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/nu11secur1ty\/CVE-2021-44228-VULN-APP" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-17T18:45:19Z" ,
"updated_at" : "2024-08-12T20:18:58Z" ,
"pushed_at" : "2023-02-22T12:12:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439444176 ,
"name" : "log4j-docker" ,
"full_name" : "ankur-katiyar\/log4j-docker" ,
"owner" : {
"login" : "ankur-katiyar" ,
"id" : 7027426 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7027426?v=4" ,
"html_url" : "https:\/\/github.com\/ankur-katiyar" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ankur-katiyar\/log4j-docker" ,
"description" : "Docker images and k8s YAMLs for Log4j Vulnerability POC (Log4j (CVE-2021-44228 RCE Vulnerability)" ,
"fork" : false ,
"created_at" : "2021-12-17T19:50:40Z" ,
"updated_at" : "2022-04-21T01:41:08Z" ,
"pushed_at" : "2021-12-20T16:39:28Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439447817 ,
"name" : "Log4j-JNDIServer" ,
"full_name" : "immunityinc\/Log4j-JNDIServer" ,
"owner" : {
"login" : "immunityinc" ,
"id" : 17729016 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17729016?v=4" ,
"html_url" : "https:\/\/github.com\/immunityinc" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/immunityinc\/Log4j-JNDIServer" ,
"description" : "This project will help to test the Log4j CVE-2021-44228 vulnerability." ,
"fork" : false ,
"created_at" : "2021-12-17T20:07:12Z" ,
"updated_at" : "2022-06-30T02:03:56Z" ,
"pushed_at" : "2021-12-22T20:17:36Z" ,
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 9 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 439496578 ,
"name" : "PowerShell-Log4J-Scanner" ,
"full_name" : "DANSI\/PowerShell-Log4J-Scanner" ,
"owner" : {
"login" : "DANSI" ,
"id" : 4057240 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4057240?v=4" ,
"html_url" : "https:\/\/github.com\/DANSI" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/DANSI\/PowerShell-Log4J-Scanner" ,
"description" : "can find, analyse and patch Log4J files because of CVE-2021-44228, CVE-2021-45046" ,
"fork" : false ,
"created_at" : "2021-12-18T00:51:46Z" ,
"updated_at" : "2021-12-31T13:32:41Z" ,
"pushed_at" : "2022-03-29T21:43:32Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439595430 ,
"name" : "scan-log4shell" ,
"full_name" : "suniastar\/scan-log4shell" ,
"owner" : {
"login" : "suniastar" ,
"id" : 19646660 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/19646660?v=4" ,
"html_url" : "https:\/\/github.com\/suniastar" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/suniastar\/scan-log4shell" ,
"description" : "A scanning suite to find servers affected by the log4shell flaw (CVE-2021-44228) with example to test it" ,
"fork" : false ,
"created_at" : "2021-12-18T11:16:06Z" ,
"updated_at" : "2024-11-09T23:59:37Z" ,
"pushed_at" : "2021-12-18T15:54:57Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439596852 ,
"name" : "log4jvulnerability-CVE-2021-44228" ,
"full_name" : "shivakumarjayaraman\/log4jvulnerability-CVE-2021-44228" ,
"owner" : {
"login" : "shivakumarjayaraman" ,
"id" : 63054448 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63054448?v=4" ,
"html_url" : "https:\/\/github.com\/shivakumarjayaraman" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/shivakumarjayaraman\/log4jvulnerability-CVE-2021-44228" ,
"description" : "An attempt to understand the log4j vulnerability by looking through the code" ,
"fork" : false ,
"created_at" : "2021-12-18T11:23:35Z" ,
"updated_at" : "2021-12-18T15:32:08Z" ,
"pushed_at" : "2021-12-18T15:32:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439612080 ,
"name" : "CVE-2021-44228-PoC" ,
"full_name" : "j3kz\/CVE-2021-44228-PoC" ,
"owner" : {
"login" : "j3kz" ,
"id" : 6310563 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6310563?v=4" ,
"html_url" : "https:\/\/github.com\/j3kz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/j3kz\/CVE-2021-44228-PoC" ,
"description" : "Self-contained lab environment that runs the exploit safely, all from docker compose" ,
"fork" : false ,
"created_at" : "2021-12-18T12:42:04Z" ,
"updated_at" : "2021-12-18T14:08:28Z" ,
"pushed_at" : "2021-12-18T14:08:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439658571 ,
"name" : "log4j-pcap-activity" ,
"full_name" : "Apipia\/log4j-pcap-activity" ,
"owner" : {
"login" : "Apipia" ,
"id" : 17787069 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17787069?v=4" ,
"html_url" : "https:\/\/github.com\/Apipia" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Apipia\/log4j-pcap-activity" ,
"description" : "A fun activity using a packet capture file from the log4j exploit (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-18T16:09:49Z" ,
"updated_at" : "2022-10-18T10:59:33Z" ,
"pushed_at" : "2021-12-18T16:51:29Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439698618 ,
"name" : "log4shell-docker-lab" ,
"full_name" : "axelcurmi\/log4shell-docker-lab" ,
"owner" : {
"login" : "axelcurmi" ,
"id" : 23001923 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23001923?v=4" ,
"html_url" : "https:\/\/github.com\/axelcurmi" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/axelcurmi\/log4shell-docker-lab" ,
"description" : "Log4Shell (CVE-2021-44228) docker lab" ,
"fork" : false ,
"created_at" : "2021-12-18T19:30:35Z" ,
"updated_at" : "2022-01-05T14:55:14Z" ,
"pushed_at" : "2021-12-24T10:28:47Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439712818 ,
"name" : "log4j-2021-vulnerability-study" ,
"full_name" : "otaviokr\/log4j-2021-vulnerability-study" ,
"owner" : {
"login" : "otaviokr" ,
"id" : 3641421 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3641421?v=4" ,
"html_url" : "https:\/\/github.com\/otaviokr" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/otaviokr\/log4j-2021-vulnerability-study" ,
"description" : "This is a showcase how the Log4J vulnerability (CVE-2021-44228) could be explored. This code is safe to run, but understand what it does and how it works!" ,
"fork" : false ,
"created_at" : "2021-12-18T20:53:06Z" ,
"updated_at" : "2022-01-22T01:46:53Z" ,
"pushed_at" : "2022-01-22T01:46:50Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439769164 ,
"name" : "log4j_CVE-2021-44228" ,
"full_name" : "kkyehit\/log4j_CVE-2021-44228" ,
"owner" : {
"login" : "kkyehit" ,
"id" : 53825723 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/53825723?v=4" ,
"html_url" : "https:\/\/github.com\/kkyehit" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kkyehit\/log4j_CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-19T03:47:54Z" ,
"updated_at" : "2021-12-19T03:54:50Z" ,
"pushed_at" : "2021-12-19T03:54:47Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439771479 ,
"name" : "inspec-log4j" ,
"full_name" : "trickyearlobe\/inspec-log4j" ,
"owner" : {
"login" : "trickyearlobe" ,
"id" : 3001322 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3001322?v=4" ,
"html_url" : "https:\/\/github.com\/trickyearlobe" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/trickyearlobe\/inspec-log4j" ,
"description" : "An Inspec profile to check for Log4j CVE-2021-44228 and CVE-2021-45046" ,
"fork" : false ,
"created_at" : "2021-12-19T04:04:57Z" ,
"updated_at" : "2022-05-11T09:35:20Z" ,
"pushed_at" : "2021-12-19T05:29:33Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439780948 ,
"name" : "Log4J-Simulation-Tool" ,
"full_name" : "TheInterception\/Log4J-Simulation-Tool" ,
"owner" : {
"login" : "TheInterception" ,
"id" : 58417506 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/58417506?v=4" ,
"html_url" : "https:\/\/github.com\/TheInterception" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/TheInterception\/Log4J-Simulation-Tool" ,
"description" : "Vulnerability analysis, patch management and exploitation tool forCVE-2021-44228 \/ CVE-2021-45046 \/ CVE-2021-4104" ,
"fork" : false ,
"created_at" : "2021-12-19T05:13:25Z" ,
"updated_at" : "2023-08-15T12:50:36Z" ,
"pushed_at" : "2021-12-25T01:51:35Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"attackvector" ,
"cyber-security" ,
"ethical-hacking" ,
"network-analysis" ,
"redteam"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439803220 ,
"name" : "Get-log4j-Windows-local" ,
"full_name" : "KeysAU\/Get-log4j-Windows-local" ,
"owner" : {
"login" : "KeysAU" ,
"id" : 38932932 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38932932?v=4" ,
"html_url" : "https:\/\/github.com\/KeysAU" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/KeysAU\/Get-log4j-Windows-local" ,
"description" : "Identifying all log4j components across on local windows servers. CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-19T07:35:01Z" ,
"updated_at" : "2022-10-28T18:51:03Z" ,
"pushed_at" : "2021-12-19T08:09:11Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439839460 ,
"name" : "Log4Shell-demo" ,
"full_name" : "mschmnet\/Log4Shell-demo" ,
"owner" : {
"login" : "mschmnet" ,
"id" : 11050119 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11050119?v=4" ,
"html_url" : "https:\/\/github.com\/mschmnet" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mschmnet\/Log4Shell-demo" ,
"description" : "Demo to show how Log4Shell \/ CVE-2021-44228 vulnerability works" ,
"fork" : false ,
"created_at" : "2021-12-19T10:57:16Z" ,
"updated_at" : "2022-10-14T01:29:51Z" ,
"pushed_at" : "2021-12-23T11:59:53Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439882882 ,
"name" : "Log4j_scan_Advance" ,
"full_name" : "Rk-000\/Log4j_scan_Advance" ,
"owner" : {
"login" : "Rk-000" ,
"id" : 72359463 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/72359463?v=4" ,
"html_url" : "https:\/\/github.com\/Rk-000" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Rk-000\/Log4j_scan_Advance" ,
"description" : "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-19T14:20:54Z" ,
"updated_at" : "2024-03-21T12:57:10Z" ,
"pushed_at" : "2021-12-19T14:23:37Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439889436 ,
"name" : "Log4jCenter" ,
"full_name" : "puzzlepeaches\/Log4jCenter" ,
"owner" : {
"login" : "puzzlepeaches" ,
"id" : 8538866 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4" ,
"html_url" : "https:\/\/github.com\/puzzlepeaches" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/puzzlepeaches\/Log4jCenter" ,
"description" : "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. " ,
"fork" : false ,
"created_at" : "2021-12-19T14:48:30Z" ,
2024-12-07 01:32:10 +01:00
"updated_at" : "2024-12-06T23:54:00Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2021-12-22T15:56:21Z" ,
2024-12-07 01:32:10 +01:00
"stargazers_count" : 104 ,
"watchers_count" : 104 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 22 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 22 ,
2024-12-07 01:32:10 +01:00
"watchers" : 104 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 439931338 ,
"name" : "log4shell-rmi-poc" ,
"full_name" : "Labout\/log4shell-rmi-poc" ,
"owner" : {
"login" : "Labout" ,
"id" : 28622593 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28622593?v=4" ,
"html_url" : "https:\/\/github.com\/Labout" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Labout\/log4shell-rmi-poc" ,
"description" : "A Proof of Concept of the Log4j vulnerabilities (CVE-2021-44228) over Java-RMI" ,
"fork" : false ,
"created_at" : "2021-12-19T17:53:31Z" ,
"updated_at" : "2024-07-27T04:16:01Z" ,
"pushed_at" : "2021-12-19T22:09:40Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 8 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440009725 ,
"name" : "f-for-java" ,
"full_name" : "TotallyNotAHaxxer\/f-for-java" ,
"owner" : {
"login" : "TotallyNotAHaxxer" ,
"id" : 87203697 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87203697?v=4" ,
"html_url" : "https:\/\/github.com\/TotallyNotAHaxxer" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/TotallyNotAHaxxer\/f-for-java" ,
"description" : "a project written in go and java i abandoned for CVE-2021-44228 try to fix it if you can XD" ,
"fork" : false ,
"created_at" : "2021-12-20T01:31:06Z" ,
"updated_at" : "2021-12-24T18:06:45Z" ,
"pushed_at" : "2022-12-16T03:57:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440029288 ,
"name" : "log4j2-exploit" ,
"full_name" : "spasam\/log4j2-exploit" ,
"owner" : {
"login" : "spasam" ,
"id" : 438507 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/438507?v=4" ,
"html_url" : "https:\/\/github.com\/spasam" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/spasam\/log4j2-exploit" ,
"description" : "log4j2 Log4Shell CVE-2021-44228 proof of concept" ,
"fork" : false ,
"created_at" : "2021-12-20T03:16:01Z" ,
"updated_at" : "2021-12-21T18:32:07Z" ,
"pushed_at" : "2021-12-20T03:19:10Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"log4j2" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440140065 ,
"name" : "cve-2021-44228-log4j-test" ,
"full_name" : "bumheehan\/cve-2021-44228-log4j-test" ,
"owner" : {
"login" : "bumheehan" ,
"id" : 15325225 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15325225?v=4" ,
"html_url" : "https:\/\/github.com\/bumheehan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/bumheehan\/cve-2021-44228-log4j-test" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-20T11:07:21Z" ,
"updated_at" : "2021-12-22T04:27:08Z" ,
"pushed_at" : "2021-12-22T04:27:05Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440154999 ,
"name" : "log4j-dork-scanner" ,
"full_name" : "cergo123\/log4j-dork-scanner" ,
"owner" : {
"login" : "cergo123" ,
"id" : 41321155 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41321155?v=4" ,
"html_url" : "https:\/\/github.com\/cergo123" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/cergo123\/log4j-dork-scanner" ,
"description" : "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks" ,
"fork" : false ,
"created_at" : "2021-12-20T12:01:52Z" ,
"updated_at" : "2024-08-23T22:44:57Z" ,
"pushed_at" : "2021-12-20T12:03:48Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"has_discussions" : false ,
"forks_count" : 7 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"dork-scanner" ,
"log4j" ,
"python-script" ,
"scanner"
] ,
"visibility" : "public" ,
"forks" : 7 ,
"watchers" : 8 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440177006 ,
"name" : "log4shell-war-fixer" ,
"full_name" : "dmitsuo\/log4shell-war-fixer" ,
"owner" : {
"login" : "dmitsuo" ,
"id" : 1348764 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1348764?v=4" ,
"html_url" : "https:\/\/github.com\/dmitsuo" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dmitsuo\/log4shell-war-fixer" ,
"description" : "Shell script to remove JndiLookup class from Log4J 2 jar file, inside WAR file, in order to mitigate CVE-2021-44228, a.k.a., #Log4Shell" ,
"fork" : false ,
"created_at" : "2021-12-20T13:18:57Z" ,
"updated_at" : "2021-12-20T19:21:49Z" ,
"pushed_at" : "2021-12-20T16:04:25Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440183835 ,
"name" : "Log4jShell-Scan" ,
"full_name" : "Y0-kan\/Log4jShell-Scan" ,
"owner" : {
"login" : "Y0-kan" ,
"id" : 96424613 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96424613?v=4" ,
"html_url" : "https:\/\/github.com\/Y0-kan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Y0-kan\/Log4jShell-Scan" ,
"description" : "log4j2 RCE漏洞( CVE-2021-44228)内网扫描器, 可用于在不出网的条件下进行漏洞扫描, 帮助企业内部快速发现Log4jShell漏洞。" ,
"fork" : false ,
"created_at" : "2021-12-20T13:41:35Z" ,
2024-11-29 07:32:01 +01:00
"updated_at" : "2024-11-29T01:08:17Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2021-12-21T06:11:58Z" ,
2024-11-29 07:32:01 +01:00
"stargazers_count" : 37 ,
"watchers_count" : 37 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
2024-11-29 07:32:01 +01:00
"watchers" : 37 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440216413 ,
"name" : "Log4j-Scanner-Exploit" ,
"full_name" : "julian911015\/Log4j-Scanner-Exploit" ,
"owner" : {
"login" : "julian911015" ,
"id" : 26369589 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26369589?v=4" ,
"html_url" : "https:\/\/github.com\/julian911015" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/julian911015\/Log4j-Scanner-Exploit" ,
"description" : "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota." ,
"fork" : false ,
"created_at" : "2021-12-20T15:22:50Z" ,
"updated_at" : "2024-09-19T08:09:04Z" ,
"pushed_at" : "2024-09-03T15:22:31Z" ,
"stargazers_count" : 29 ,
"watchers_count" : 29 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 29 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440220972 ,
"name" : "CVE-2021-44228---detection-with-PowerShell" ,
"full_name" : "intel-xeon\/CVE-2021-44228---detection-with-PowerShell" ,
"owner" : {
"login" : "intel-xeon" ,
"id" : 37773731 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37773731?v=4" ,
"html_url" : "https:\/\/github.com\/intel-xeon" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/intel-xeon\/CVE-2021-44228---detection-with-PowerShell" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-20T15:38:07Z" ,
"updated_at" : "2021-12-23T13:23:27Z" ,
"pushed_at" : "2022-06-24T08:00:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440221338 ,
"name" : "log4j-fix-CVE-2021-44228" ,
"full_name" : "chandru-gunasekaran\/log4j-fix-CVE-2021-44228" ,
"owner" : {
"login" : "chandru-gunasekaran" ,
"id" : 87476739 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87476739?v=4" ,
"html_url" : "https:\/\/github.com\/chandru-gunasekaran" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/chandru-gunasekaran\/log4j-fix-CVE-2021-44228" ,
"description" : "Windows Batch Scrip to Fix the log4j-issue-CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-20T15:39:20Z" ,
"updated_at" : "2023-09-18T10:37:49Z" ,
"pushed_at" : "2021-12-23T09:19:36Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440261792 ,
"name" : "TekiumLog4jApp" ,
"full_name" : "erickrr-bd\/TekiumLog4jApp" ,
"owner" : {
"login" : "erickrr-bd" ,
"id" : 77643346 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/77643346?v=4" ,
"html_url" : "https:\/\/github.com\/erickrr-bd" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/erickrr-bd\/TekiumLog4jApp" ,
"description" : "Java application vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-20T17:59:56Z" ,
"updated_at" : "2022-02-15T20:16:38Z" ,
"pushed_at" : "2022-03-01T00:00:00Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"app" ,
"cve-2021-44228" ,
"docker" ,
"exploitation" ,
"java" ,
"jndi" ,
"log4j2" ,
"security" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440275278 ,
"name" : "damn-vulnerable-log4j-app" ,
"full_name" : "snapattack\/damn-vulnerable-log4j-app" ,
"owner" : {
"login" : "snapattack" ,
"id" : 92945688 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92945688?v=4" ,
"html_url" : "https:\/\/github.com\/snapattack" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/snapattack\/damn-vulnerable-log4j-app" ,
"description" : "Vulnerable web application to test CVE-2021-44228 \/ log4shell and forensic artifacts from an example attack" ,
"fork" : false ,
"created_at" : "2021-12-20T18:51:52Z" ,
"updated_at" : "2024-09-30T06:41:54Z" ,
"pushed_at" : "2021-12-20T18:55:44Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 440373235 ,
"name" : "loguccino" ,
"full_name" : "sassoftware\/loguccino" ,
"owner" : {
"login" : "sassoftware" ,
"id" : 5289877 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5289877?v=4" ,
"html_url" : "https:\/\/github.com\/sassoftware" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sassoftware\/loguccino" ,
"description" : "Scan and patch tool for CVE-2021-44228 and related log4j concerns. " ,
"fork" : false ,
"created_at" : "2021-12-21T03:01:36Z" ,
"updated_at" : "2024-05-15T16:42:25Z" ,
"pushed_at" : "2022-01-24T16:43:41Z" ,
"stargazers_count" : 34 ,
"watchers_count" : 34 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 34 ,
"score" : 0 ,
"subscribers_count" : 16
} ,
{
"id" : 440408111 ,
"name" : "apache-log4j2-CVE-2021-44228" ,
"full_name" : "xx-zhang\/apache-log4j2-CVE-2021-44228" ,
"owner" : {
"login" : "xx-zhang" ,
"id" : 47806549 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47806549?v=4" ,
"html_url" : "https:\/\/github.com\/xx-zhang" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/xx-zhang\/apache-log4j2-CVE-2021-44228" ,
"description" : "相关的复现和文档" ,
"fork" : false ,
"created_at" : "2021-12-21T06:03:18Z" ,
"updated_at" : "2021-12-21T06:03:18Z" ,
"pushed_at" : "2021-12-21T06:03:18Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440439859 ,
"name" : "Log4Shell-Scanner" ,
"full_name" : "r00thunter\/Log4Shell-Scanner" ,
"owner" : {
"login" : "r00thunter" ,
"id" : 33806985 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33806985?v=4" ,
"html_url" : "https:\/\/github.com\/r00thunter" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/r00thunter\/Log4Shell-Scanner" ,
"description" : "Python script to detect Log4Shell Vulnerability CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-21T08:13:35Z" ,
"updated_at" : "2021-12-21T08:15:05Z" ,
"pushed_at" : "2021-12-21T08:15:02Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440555354 ,
"name" : "log4j-spring-vuln-poc" ,
"full_name" : "mn-io\/log4j-spring-vuln-poc" ,
"owner" : {
"login" : "mn-io" ,
"id" : 4397504 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4397504?v=4" ,
"html_url" : "https:\/\/github.com\/mn-io" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mn-io\/log4j-spring-vuln-poc" ,
"description" : "POC for CVE-2021-44228 within Springboot" ,
"fork" : false ,
"created_at" : "2021-12-21T15:00:58Z" ,
"updated_at" : "2022-02-24T22:15:47Z" ,
"pushed_at" : "2021-12-22T08:58:22Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440601926 ,
"name" : "log4j2-hack-springboot" ,
"full_name" : "rejupillai\/log4j2-hack-springboot" ,
"owner" : {
"login" : "rejupillai" ,
"id" : 15153045 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15153045?v=4" ,
"html_url" : "https:\/\/github.com\/rejupillai" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/rejupillai\/log4j2-hack-springboot" ,
"description" : "Log4j2 CVE-2021-44228 hack demo for a springboot app" ,
"fork" : false ,
"created_at" : "2021-12-21T17:40:02Z" ,
"updated_at" : "2021-12-21T19:26:23Z" ,
"pushed_at" : "2023-03-22T05:52:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440663893 ,
"name" : "log4j-cve-2021-44228" ,
"full_name" : "lucab85\/log4j-cve-2021-44228" ,
"owner" : {
"login" : "lucab85" ,
"id" : 24267107 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24267107?v=4" ,
"html_url" : "https:\/\/github.com\/lucab85" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lucab85\/log4j-cve-2021-44228" ,
"description" : "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2021-12-21T22:14:24Z" ,
"updated_at" : "2024-07-07T09:47:47Z" ,
"pushed_at" : "2022-01-10T19:13:04Z" ,
"stargazers_count" : 57 ,
"watchers_count" : 57 ,
"has_discussions" : false ,
"forks_count" : 9 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"ansible" ,
"cve-2021-44228" ,
"devsecops" ,
"log4j" ,
"log4shell" ,
"security"
] ,
"visibility" : "public" ,
"forks" : 9 ,
"watchers" : 57 ,
"score" : 0 ,
"subscribers_count" : 5
} ,
{
"id" : 440722343 ,
"name" : "Log4Shell-CVE-2021-44228-Demo" ,
"full_name" : "BabooPan\/Log4Shell-CVE-2021-44228-Demo" ,
"owner" : {
"login" : "BabooPan" ,
"id" : 16317991 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16317991?v=4" ,
"html_url" : "https:\/\/github.com\/BabooPan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/BabooPan\/Log4Shell-CVE-2021-44228-Demo" ,
"description" : "Log4Shell Demo with AWS" ,
"fork" : false ,
"created_at" : "2021-12-22T03:34:40Z" ,
"updated_at" : "2024-03-12T11:31:53Z" ,
"pushed_at" : "2022-03-28T06:49:06Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440788757 ,
"name" : "log4shell_sentinel" ,
"full_name" : "ossie-git\/log4shell_sentinel" ,
"owner" : {
"login" : "ossie-git" ,
"id" : 25382296 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25382296?v=4" ,
"html_url" : "https:\/\/github.com\/ossie-git" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ossie-git\/log4shell_sentinel" ,
"description" : "A Smart Log4Shell\/Log4j\/CVE-2021-44228 Scanner" ,
"fork" : false ,
"created_at" : "2021-12-22T08:35:04Z" ,
"updated_at" : "2022-10-29T09:47:49Z" ,
"pushed_at" : "2021-12-22T08:40:58Z" ,
"stargazers_count" : 14 ,
"watchers_count" : 14 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 14 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440799948 ,
"name" : "Log4Shell" ,
"full_name" : "r00thunter\/Log4Shell" ,
"owner" : {
"login" : "r00thunter" ,
"id" : 33806985 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33806985?v=4" ,
"html_url" : "https:\/\/github.com\/r00thunter" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/r00thunter\/Log4Shell" ,
"description" : "Generic Scanner for Apache log4j RCE CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-22T09:15:47Z" ,
"updated_at" : "2024-08-24T16:05:08Z" ,
"pushed_at" : "2021-12-22T09:19:15Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440816228 ,
"name" : "cve-2021-44228-fix-jars" ,
"full_name" : "asyzdykov\/cve-2021-44228-fix-jars" ,
"owner" : {
"login" : "asyzdykov" ,
"id" : 1106604 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1106604?v=4" ,
"html_url" : "https:\/\/github.com\/asyzdykov" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/asyzdykov\/cve-2021-44228-fix-jars" ,
"description" : "CVE-2021-44228-FIX-JARS" ,
"fork" : false ,
"created_at" : "2021-12-22T10:16:22Z" ,
"updated_at" : "2021-12-23T09:04:57Z" ,
"pushed_at" : "2021-12-23T09:04:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 440932687 ,
"name" : "log4j-scanner" ,
"full_name" : "BJLIYANLIANG\/log4j-scanner" ,
"owner" : {
"login" : "BJLIYANLIANG" ,
"id" : 34064679 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/34064679?v=4" ,
"html_url" : "https:\/\/github.com\/BJLIYANLIANG" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/BJLIYANLIANG\/log4j-scanner" ,
"description" : "Log4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS" ,
"fork" : false ,
"created_at" : "2021-12-22T17:17:59Z" ,
"updated_at" : "2021-12-24T00:57:34Z" ,
"pushed_at" : "2021-12-19T01:59:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 441001904 ,
"name" : "Apache-Log4j-POC" ,
"full_name" : "badb33f\/Apache-Log4j-POC" ,
"owner" : {
"login" : "badb33f" ,
"id" : 61085462 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/61085462?v=4" ,
"html_url" : "https:\/\/github.com\/badb33f" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/badb33f\/Apache-Log4j-POC" ,
"description" : "Proof of Concept of apache log4j LDAP lookup vulnerability. CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-22T22:44:07Z" ,
"updated_at" : "2023-04-06T19:12:21Z" ,
"pushed_at" : "2021-12-22T22:51:12Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 441034050 ,
"name" : "CVE-2021-44228-log4jVulnScanner-metasploit" ,
"full_name" : "TaroballzChen\/CVE-2021-44228-log4jVulnScanner-metasploit" ,
"owner" : {
"login" : "TaroballzChen" ,
"id" : 27862593 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4" ,
"html_url" : "https:\/\/github.com\/TaroballzChen" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/TaroballzChen\/CVE-2021-44228-log4jVulnScanner-metasploit" ,
"description" : "open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-23T01:59:03Z" ,
"updated_at" : "2024-08-12T20:19:08Z" ,
"pushed_at" : "2021-12-23T07:40:13Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 441188076 ,
"name" : "ansible-role-log4shell" ,
"full_name" : "lucab85\/ansible-role-log4shell" ,
"owner" : {
"login" : "lucab85" ,
"id" : 24267107 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24267107?v=4" ,
"html_url" : "https:\/\/github.com\/lucab85" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lucab85\/ansible-role-log4shell" ,
"description" : "Ansible playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 for Log4Shell (CVE-2021-44228)." ,
"fork" : false ,
"created_at" : "2021-12-23T13:24:41Z" ,
"updated_at" : "2023-05-13T06:51:06Z" ,
"pushed_at" : "2022-01-10T22:21:34Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"devsecops" ,
"log4j" ,
"log4shell" ,
"security"
] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 441364313 ,
"name" : "log4j-CVE-2021-44228-workaround" ,
"full_name" : "grimch\/log4j-CVE-2021-44228-workaround" ,
"owner" : {
"login" : "grimch" ,
"id" : 58831200 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/58831200?v=4" ,
"html_url" : "https:\/\/github.com\/grimch" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/grimch\/log4j-CVE-2021-44228-workaround" ,
"description" : "general purpose workaround for the log4j CVE-2021-44228 vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-24T04:23:17Z" ,
"updated_at" : "2021-12-24T13:35:26Z" ,
"pushed_at" : "2021-12-24T13:35:23Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 441423344 ,
"name" : "log4j-shell-csw" ,
"full_name" : "cybersecurityworks553\/log4j-shell-csw" ,
"owner" : {
"login" : "cybersecurityworks553" ,
"id" : 63910792 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4" ,
"html_url" : "https:\/\/github.com\/cybersecurityworks553" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/cybersecurityworks553\/log4j-shell-csw" ,
"description" : "A Proof-Of-Concept Exploit for CVE-2021-44228 vulnerability." ,
"fork" : false ,
"created_at" : "2021-12-24T09:26:38Z" ,
"updated_at" : "2024-02-26T06:42:44Z" ,
"pushed_at" : "2021-12-24T10:16:10Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 8 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 441453543 ,
"name" : "log4j-scan" ,
"full_name" : "Toolsec\/log4j-scan" ,
"owner" : {
"login" : "Toolsec" ,
"id" : 76109742 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76109742?v=4" ,
"html_url" : "https:\/\/github.com\/Toolsec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Toolsec\/log4j-scan" ,
"description" : "CVE-2021-44228 检查工具" ,
"fork" : false ,
"created_at" : "2021-12-24T11:54:21Z" ,
"updated_at" : "2022-05-09T13:18:05Z" ,
"pushed_at" : "2021-12-24T02:39:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 441470836 ,
"name" : "Log4jUnifi" ,
"full_name" : "puzzlepeaches\/Log4jUnifi" ,
"owner" : {
"login" : "puzzlepeaches" ,
"id" : 8538866 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4" ,
"html_url" : "https:\/\/github.com\/puzzlepeaches" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/puzzlepeaches\/Log4jUnifi" ,
"description" : "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more." ,
"fork" : false ,
"created_at" : "2021-12-24T13:18:49Z" ,
2024-12-07 01:32:10 +01:00
"updated_at" : "2024-12-06T23:54:02Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2024-01-04T17:12:05Z" ,
2024-12-07 01:32:10 +01:00
"stargazers_count" : 143 ,
"watchers_count" : 143 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 29 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 29 ,
2024-12-07 01:32:10 +01:00
"watchers" : 143 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 441536293 ,
"name" : "apache-tomcat-log4j" ,
"full_name" : "many-fac3d-g0d\/apache-tomcat-log4j" ,
"owner" : {
"login" : "many-fac3d-g0d" ,
"id" : 54078651 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54078651?v=4" ,
"html_url" : "https:\/\/github.com\/many-fac3d-g0d" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/many-fac3d-g0d\/apache-tomcat-log4j" ,
"description" : "Log4j2 CVE-2021-44228 Vulnerability POC in Apache Tomcat" ,
"fork" : false ,
"created_at" : "2021-12-24T18:54:46Z" ,
"updated_at" : "2023-07-29T23:22:45Z" ,
"pushed_at" : "2021-12-24T18:57:32Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 441540913 ,
"name" : "CVE-2021-44228" ,
"full_name" : "marcourbano\/CVE-2021-44228" ,
"owner" : {
"login" : "marcourbano" ,
"id" : 22402683 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22402683?v=4" ,
"html_url" : "https:\/\/github.com\/marcourbano" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/marcourbano\/CVE-2021-44228" ,
"description" : "PoC for CVE-2021-44228." ,
"fork" : false ,
"created_at" : "2021-12-24T19:26:36Z" ,
"updated_at" : "2024-04-19T14:48:49Z" ,
"pushed_at" : "2022-09-22T19:16:07Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 441545718 ,
"name" : "log4shell-vulnerable-app" ,
"full_name" : "bsigouin\/log4shell-vulnerable-app" ,
"owner" : {
"login" : "bsigouin" ,
"id" : 48130586 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48130586?v=4" ,
"html_url" : "https:\/\/github.com\/bsigouin" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/bsigouin\/log4shell-vulnerable-app" ,
"description" : "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell." ,
"fork" : false ,
"created_at" : "2021-12-24T20:00:12Z" ,
"updated_at" : "2022-01-06T13:31:29Z" ,
"pushed_at" : "2023-01-20T17:03:41Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 441678815 ,
"name" : "XSYS-Log4J2Shell-Ex" ,
"full_name" : "ToxicEnvelope\/XSYS-Log4J2Shell-Ex" ,
"owner" : {
"login" : "ToxicEnvelope" ,
"id" : 23465872 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23465872?v=4" ,
"html_url" : "https:\/\/github.com\/ToxicEnvelope" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ToxicEnvelope\/XSYS-Log4J2Shell-Ex" ,
"description" : "this repository contains a POC of CVE-2021-44228 (log4j2shell) as part of a security research" ,
"fork" : false ,
"created_at" : "2021-12-25T12:53:13Z" ,
"updated_at" : "2021-12-27T20:08:44Z" ,
"pushed_at" : "2021-12-27T20:08:41Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 442033629 ,
"name" : "ModSec-log4j2" ,
"full_name" : "felipe8398\/ModSec-log4j2" ,
"owner" : {
"login" : "felipe8398" ,
"id" : 24979677 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24979677?v=4" ,
"html_url" : "https:\/\/github.com\/felipe8398" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/felipe8398\/ModSec-log4j2" ,
"description" : "Regra ModSec para proteção log4j2 - CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-27T02:53:24Z" ,
"updated_at" : "2022-06-19T02:08:13Z" ,
"pushed_at" : "2022-03-10T22:09:11Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"docker"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 442071358 ,
"name" : "Log4j_Attacker_IPList" ,
"full_name" : "ceyhuncamli\/Log4j_Attacker_IPList" ,
"owner" : {
"login" : "ceyhuncamli" ,
"id" : 57198926 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57198926?v=4" ,
"html_url" : "https:\/\/github.com\/ceyhuncamli" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ceyhuncamli\/Log4j_Attacker_IPList" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-27T06:29:12Z" ,
"updated_at" : "2021-12-27T06:34:21Z" ,
"pushed_at" : "2021-12-27T06:34:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 442073643 ,
"name" : "log4j-vulnerability" ,
"full_name" : "mazhar-hassan\/log4j-vulnerability" ,
"owner" : {
"login" : "mazhar-hassan" ,
"id" : 32394814 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32394814?v=4" ,
"html_url" : "https:\/\/github.com\/mazhar-hassan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mazhar-hassan\/log4j-vulnerability" ,
"description" : "Log4Shell (CVE-2021-44228) is a zero-day vulnerability in Log4j" ,
"fork" : false ,
"created_at" : "2021-12-27T06:39:40Z" ,
"updated_at" : "2021-12-27T09:33:39Z" ,
"pushed_at" : "2022-08-23T13:47:26Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 442118241 ,
"name" : "VTI-IOCs-CVE-2021-44228" ,
"full_name" : "xungzzz\/VTI-IOCs-CVE-2021-44228" ,
"owner" : {
"login" : "xungzzz" ,
"id" : 78672731 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/78672731?v=4" ,
"html_url" : "https:\/\/github.com\/xungzzz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/xungzzz\/VTI-IOCs-CVE-2021-44228" ,
"description" : "IOCs for CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-27T09:51:13Z" ,
"updated_at" : "2021-12-27T09:51:13Z" ,
"pushed_at" : "2021-12-27T09:51:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 442217104 ,
"name" : "l4s_poc" ,
"full_name" : "s-retlaw\/l4s_poc" ,
"owner" : {
"login" : "s-retlaw" ,
"id" : 73955369 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4" ,
"html_url" : "https:\/\/github.com\/s-retlaw" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/s-retlaw\/l4s_poc" ,
"description" : "Log4Shell (Cve-2021-44228) Proof Of Concept" ,
"fork" : false ,
"created_at" : "2021-12-27T16:45:58Z" ,
"updated_at" : "2022-01-04T14:50:09Z" ,
"pushed_at" : "2023-07-25T20:05:40Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 442222189 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce-main" ,
"full_name" : "Ravid-CheckMarx\/CVE-2021-44228-Apache-Log4j-Rce-main" ,
"owner" : {
"login" : "Ravid-CheckMarx" ,
"id" : 84515813 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/84515813?v=4" ,
"html_url" : "https:\/\/github.com\/Ravid-CheckMarx" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Ravid-CheckMarx\/CVE-2021-44228-Apache-Log4j-Rce-main" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-27T17:06:26Z" ,
"updated_at" : "2021-12-28T08:39:10Z" ,
"pushed_at" : "2021-12-27T17:06:29Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 442235397 ,
"name" : "log4j-payload-generator" ,
"full_name" : "yesspider-hacker\/log4j-payload-generator" ,
"owner" : {
"login" : "yesspider-hacker" ,
"id" : 76931387 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76931387?v=4" ,
"html_url" : "https:\/\/github.com\/yesspider-hacker" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/yesspider-hacker\/log4j-payload-generator" ,
"description" : "log4j-paylaod generator : A generic payload generator for Apache log4j RCE CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2021-12-27T18:02:15Z" ,
"updated_at" : "2023-01-08T10:49:19Z" ,
"pushed_at" : "2021-12-27T18:38:10Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 442255773 ,
"name" : "log4shell_scanner" ,
"full_name" : "LinkMJB\/log4shell_scanner" ,
"owner" : {
"login" : "LinkMJB" ,
"id" : 8824103 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8824103?v=4" ,
"html_url" : "https:\/\/github.com\/LinkMJB" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/LinkMJB\/log4shell_scanner" ,
"description" : "Quick and dirty scanner, hitting common ports looking for Log4Shell (CVE-2021-44228) vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-27T19:36:29Z" ,
"updated_at" : "2021-12-27T19:40:45Z" ,
"pushed_at" : "2021-12-27T19:40:42Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 442317732 ,
"name" : "Vm4J" ,
"full_name" : "NS-Sp4ce\/Vm4J" ,
"owner" : {
"login" : "NS-Sp4ce" ,
"id" : 33349032 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4" ,
"html_url" : "https:\/\/github.com\/NS-Sp4ce" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/NS-Sp4ce\/Vm4J" ,
"description" : "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager" ,
"fork" : false ,
"created_at" : "2021-12-28T01:37:20Z" ,
"updated_at" : "2024-11-16T18:38:44Z" ,
"pushed_at" : "2022-01-24T05:37:34Z" ,
"stargazers_count" : 204 ,
"watchers_count" : 204 ,
"has_discussions" : false ,
"forks_count" : 39 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j2-exp" ,
"log4shell" ,
"vmsa-2021-0028"
] ,
"visibility" : "public" ,
"forks" : 39 ,
"watchers" : 204 ,
"score" : 0 ,
"subscribers_count" : 5
} ,
{
"id" : 442533490 ,
"name" : "LogJackFix" ,
"full_name" : "PoneyClairDeLune\/LogJackFix" ,
"owner" : {
"login" : "PoneyClairDeLune" ,
"id" : 88174309 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/88174309?v=4" ,
"html_url" : "https:\/\/github.com\/PoneyClairDeLune" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/PoneyClairDeLune\/LogJackFix" ,
"description" : "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients." ,
"fork" : false ,
"created_at" : "2021-12-28T17:18:13Z" ,
"updated_at" : "2021-12-28T17:26:16Z" ,
"pushed_at" : "2021-12-28T17:26:14Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 443163405 ,
"name" : "log4j-vulnerability" ,
"full_name" : "MarceloLeite2604\/log4j-vulnerability" ,
"owner" : {
"login" : "MarceloLeite2604" ,
"id" : 13152452 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/13152452?v=4" ,
"html_url" : "https:\/\/github.com\/MarceloLeite2604" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/MarceloLeite2604\/log4j-vulnerability" ,
"description" : "Presents how to exploit CVE-2021-44228 vulnerability." ,
"fork" : false ,
"created_at" : "2021-12-30T19:10:21Z" ,
"updated_at" : "2023-08-15T12:50:39Z" ,
"pushed_at" : "2022-01-03T17:14:51Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 443422203 ,
"name" : "log4shell-vulnerable-app" ,
"full_name" : "romanutti\/log4shell-vulnerable-app" ,
"owner" : {
"login" : "romanutti" ,
"id" : 36601005 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36601005?v=4" ,
"html_url" : "https:\/\/github.com\/romanutti" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/romanutti\/log4shell-vulnerable-app" ,
"description" : "This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as log4shell." ,
"fork" : false ,
"created_at" : "2021-12-31T20:39:44Z" ,
"updated_at" : "2022-01-01T10:57:33Z" ,
"pushed_at" : "2022-05-10T17:20:17Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 443941194 ,
"name" : "log4j2-test" ,
"full_name" : "mklinkj\/log4j2-test" ,
"owner" : {
"login" : "mklinkj" ,
"id" : 96992046 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96992046?v=4" ,
"html_url" : "https:\/\/github.com\/mklinkj" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mklinkj\/log4j2-test" ,
"description" : "Log4j2 LDAP 취약점 테스트 (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2022-01-03T04:36:41Z" ,
"updated_at" : "2024-01-14T11:55:27Z" ,
"pushed_at" : "2024-01-13T19:12:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j2"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 444275342 ,
"name" : "4jfinder.github.io" ,
"full_name" : "4jfinder\/4jfinder.github.io" ,
"owner" : {
"login" : "4jfinder" ,
"id" : 97116800 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/97116800?v=4" ,
"html_url" : "https:\/\/github.com\/4jfinder" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/4jfinder\/4jfinder.github.io" ,
"description" : "Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List" ,
"fork" : false ,
"created_at" : "2022-01-04T03:37:03Z" ,
"updated_at" : "2022-08-17T00:21:21Z" ,
"pushed_at" : "2022-02-25T08:52:45Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 444603389 ,
"name" : "CVE-2021-44228_scanner-main-Modified-" ,
"full_name" : "alexpena5635\/CVE-2021-44228_scanner-main-Modified-" ,
"owner" : {
"login" : "alexpena5635" ,
"id" : 74330769 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/74330769?v=4" ,
"html_url" : "https:\/\/github.com\/alexpena5635" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/alexpena5635\/CVE-2021-44228_scanner-main-Modified-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-01-05T00:14:08Z" ,
"updated_at" : "2022-01-09T01:45:00Z" ,
"pushed_at" : "2022-07-10T22:02:55Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 445474259 ,
"name" : "log4jshell_CVE-2021-44228" ,
"full_name" : "Vulnmachines\/log4jshell_CVE-2021-44228" ,
"owner" : {
"login" : "Vulnmachines" ,
"id" : 79006904 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4" ,
"html_url" : "https:\/\/github.com\/Vulnmachines" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Vulnmachines\/log4jshell_CVE-2021-44228" ,
"description" : "Log4jshell - CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2022-01-07T09:56:30Z" ,
"updated_at" : "2023-03-31T16:40:36Z" ,
"pushed_at" : "2022-07-26T05:17:19Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 445687561 ,
"name" : "log4j-fuzzer" ,
"full_name" : "mr-vill4in\/log4j-fuzzer" ,
"owner" : {
"login" : "mr-vill4in" ,
"id" : 51061936 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51061936?v=4" ,
"html_url" : "https:\/\/github.com\/mr-vill4in" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mr-vill4in\/log4j-fuzzer" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2022-01-08T00:28:32Z" ,
"updated_at" : "2022-08-25T01:38:48Z" ,
"pushed_at" : "2022-03-19T21:10:47Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 446218653 ,
"name" : "log4jhound" ,
"full_name" : "mebibite\/log4jhound" ,
"owner" : {
"login" : "mebibite" ,
"id" : 54244269 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54244269?v=4" ,
"html_url" : "https:\/\/github.com\/mebibite" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mebibite\/log4jhound" ,
"description" : "Created after the disclosure of CVE-2021-44228. Bash script that detects Log4j occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyses their Manifest files." ,
"fork" : false ,
"created_at" : "2022-01-09T22:34:49Z" ,
"updated_at" : "2024-04-22T19:41:40Z" ,
"pushed_at" : "2022-04-01T00:43:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2024-12-16 13:33:27 +01:00
{
"id" : 447404470 ,
"name" : "log4shell" ,
"full_name" : "jxerome\/log4shell" ,
"owner" : {
"login" : "jxerome" ,
"id" : 1355634 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4" ,
"html_url" : "https:\/\/github.com\/jxerome" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jxerome\/log4shell" ,
"description" : "Démo du fonctionnement de log4shell (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2022-01-12T23:44:20Z" ,
"updated_at" : "2022-01-12T23:59:13Z" ,
"pushed_at" : "2022-01-14T14:03:14Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
2024-11-28 19:31:51 +01:00
{
"id" : 447754863 ,
"name" : "log4j_github_repository" ,
"full_name" : "sdogancesur\/log4j_github_repository" ,
"owner" : {
"login" : "sdogancesur" ,
"id" : 34608448 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/34608448?v=4" ,
"html_url" : "https:\/\/github.com\/sdogancesur" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sdogancesur\/log4j_github_repository" ,
"description" : "This work includes testing and improvement tools for CVE-2021-44228(log4j)." ,
"fork" : false ,
"created_at" : "2022-01-13T21:16:26Z" ,
"updated_at" : "2023-05-29T16:42:26Z" ,
"pushed_at" : "2022-01-15T18:52:17Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 448039430 ,
"name" : "Search-log4Jvuln-AppScanSTD" ,
"full_name" : "jrocia\/Search-log4Jvuln-AppScanSTD" ,
"owner" : {
"login" : "jrocia" ,
"id" : 69405400 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69405400?v=4" ,
"html_url" : "https:\/\/github.com\/jrocia" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jrocia\/Search-log4Jvuln-AppScanSTD" ,
"description" : "This Pwsh script run AppScan Standard scans against a list of web sites (URLs.txt) checking for Log4J (CVE-2021-44228) vulnerability" ,
"fork" : false ,
"created_at" : "2022-01-14T16:47:20Z" ,
"updated_at" : "2022-01-14T16:54:21Z" ,
"pushed_at" : "2022-01-14T18:34:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 448612058 ,
"name" : "log4stdin" ,
"full_name" : "aajuvonen\/log4stdin" ,
"owner" : {
"login" : "aajuvonen" ,
"id" : 97843492 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/97843492?v=4" ,
"html_url" : "https:\/\/github.com\/aajuvonen" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/aajuvonen\/log4stdin" ,
"description" : "A Java application intentionally vulnerable to CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2022-01-16T16:39:19Z" ,
"updated_at" : "2022-04-02T16:13:36Z" ,
"pushed_at" : "2023-03-17T09:09:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4shell" ,
"vulnerable-application"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 448890655 ,
"name" : "PS-CVE-2021-44228" ,
"full_name" : "arnaudluti\/PS-CVE-2021-44228" ,
"owner" : {
"login" : "arnaudluti" ,
"id" : 41639163 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41639163?v=4" ,
"html_url" : "https:\/\/github.com\/arnaudluti" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/arnaudluti\/PS-CVE-2021-44228" ,
"description" : "Static detection of vulnerable log4j librairies on Windows servers, members of an AD domain." ,
"fork" : false ,
"created_at" : "2022-01-17T12:46:20Z" ,
"updated_at" : "2022-01-19T08:30:13Z" ,
"pushed_at" : "2022-01-19T08:31:33Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 449417650 ,
"name" : "CVE-2021-44228-Log4Shell-POC" ,
"full_name" : "ColdFusionX\/CVE-2021-44228-Log4Shell-POC" ,
"owner" : {
"login" : "ColdFusionX" ,
"id" : 8522240 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4" ,
"html_url" : "https:\/\/github.com\/ColdFusionX" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ColdFusionX\/CVE-2021-44228-Log4Shell-POC" ,
"description" : "POC for Infamous Log4j CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2022-01-18T19:22:38Z" ,
"updated_at" : "2024-08-12T20:19:51Z" ,
"pushed_at" : "2022-01-20T15:28:58Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"jndi-exploit" ,
"jndi-lookups" ,
"ldap" ,
"log4j" ,
"log4j2" ,
"log4shell" ,
"poc" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 450033114 ,
"name" : "cve-2021-44228-waf-tests" ,
"full_name" : "robrankin\/cve-2021-44228-waf-tests" ,
"owner" : {
"login" : "robrankin" ,
"id" : 1881181 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1881181?v=4" ,
"html_url" : "https:\/\/github.com\/robrankin" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/robrankin\/cve-2021-44228-waf-tests" ,
"description" : "Testing WAF protection against CVE-2021-44228 Log4Shell" ,
"fork" : false ,
"created_at" : "2022-01-20T09:30:44Z" ,
"updated_at" : "2023-08-24T16:30:43Z" ,
"pushed_at" : "2022-01-20T12:29:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 452823928 ,
"name" : "log4j-polkit-poc" ,
"full_name" : "0xalwayslucky\/log4j-polkit-poc" ,
"owner" : {
"login" : "0xalwayslucky" ,
"id" : 28390940 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28390940?v=4" ,
"html_url" : "https:\/\/github.com\/0xalwayslucky" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xalwayslucky\/log4j-polkit-poc" ,
"description" : "vulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034" ,
"fork" : false ,
"created_at" : "2022-01-27T19:54:16Z" ,
"updated_at" : "2022-01-29T06:29:58Z" ,
"pushed_at" : "2022-01-28T15:08:53Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 453952325 ,
"name" : "yLog4j" ,
"full_name" : "y-security\/yLog4j" ,
"owner" : {
"login" : "y-security" ,
"id" : 86777723 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86777723?v=4" ,
"html_url" : "https:\/\/github.com\/y-security" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/y-security\/yLog4j" ,
"description" : "PortSwigger Burp Plugin for the Log4j (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2022-01-31T09:54:19Z" ,
"updated_at" : "2023-05-02T06:58:40Z" ,
"pushed_at" : "2022-01-31T10:23:27Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 458405084 ,
"name" : "Log4Shell" ,
"full_name" : "FeryaelJustice\/Log4Shell" ,
"owner" : {
"login" : "FeryaelJustice" ,
"id" : 47835172 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47835172?v=4" ,
"html_url" : "https:\/\/github.com\/FeryaelJustice" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/FeryaelJustice\/Log4Shell" ,
"description" : "This repository is for Log4j 2021 (CVE-2021-44228) Vulnerability demonstration and mitigation." ,
"fork" : false ,
"created_at" : "2022-02-12T03:02:24Z" ,
"updated_at" : "2022-02-12T03:02:24Z" ,
"pushed_at" : "2022-02-12T04:11:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 458500087 ,
"name" : "CVE-2021-44228-white-box" ,
"full_name" : "hotpotcookie\/CVE-2021-44228-white-box" ,
"owner" : {
"login" : "hotpotcookie" ,
"id" : 68333318 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68333318?v=4" ,
"html_url" : "https:\/\/github.com\/hotpotcookie" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/hotpotcookie\/CVE-2021-44228-white-box" ,
"description" : "Log4j vulner testing environment based on CVE-2021-44228. It provide guidance to build the sample infrastructure and the exploit scripts. Supporting cooki3 script as the main exploit tools & integration" ,
"fork" : false ,
"created_at" : "2022-02-12T11:19:41Z" ,
"updated_at" : "2024-04-28T06:08:38Z" ,
"pushed_at" : "2023-09-06T11:47:42Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"badusb" ,
"cooki3" ,
"cve-2021-44228" ,
"java" ,
"ldap-authentication" ,
"log4j2" ,
"log4shell" ,
"penetration-testing" ,
"ptes"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 459806805 ,
"name" : "l4srs" ,
"full_name" : "s-retlaw\/l4srs" ,
"owner" : {
"login" : "s-retlaw" ,
"id" : 73955369 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4" ,
"html_url" : "https:\/\/github.com\/s-retlaw" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/s-retlaw\/l4srs" ,
"description" : "Rust implementation of the Log 4 Shell (log 4 j - CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2022-02-16T01:13:08Z" ,
"updated_at" : "2022-02-16T01:21:29Z" ,
"pushed_at" : "2023-01-14T19:59:34Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 463165453 ,
"name" : "Log-4j-scanner" ,
"full_name" : "Ananya-0306\/Log-4j-scanner" ,
"owner" : {
"login" : "Ananya-0306" ,
"id" : 74227338 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/74227338?v=4" ,
"html_url" : "https:\/\/github.com\/Ananya-0306" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Ananya-0306\/Log-4j-scanner" ,
"description" : "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2022-02-24T13:49:14Z" ,
"updated_at" : "2024-09-06T22:37:21Z" ,
"pushed_at" : "2022-03-04T13:30:17Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"bugbounty" ,
"cybersecurity" ,
"fork-for-contribution" ,
"log4j" ,
"open-source" ,
"trending-repositories"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 467749739 ,
"name" : "log4shellwithlog4j2_13_3" ,
"full_name" : "paulvkitor\/log4shellwithlog4j2_13_3" ,
"owner" : {
"login" : "paulvkitor" ,
"id" : 101220344 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/101220344?v=4" ,
"html_url" : "https:\/\/github.com\/paulvkitor" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/paulvkitor\/log4shellwithlog4j2_13_3" ,
"description" : "Springboot web application accepts a name get parameter and logs its value to log4j2. Vulnerable to CVE-2021-44228." ,
"fork" : false ,
"created_at" : "2022-03-09T02:29:58Z" ,
"updated_at" : "2022-03-09T04:11:03Z" ,
"pushed_at" : "2022-03-09T04:11:00Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 468389206 ,
"name" : "vulescanjndilookup" ,
"full_name" : "MiguelM001\/vulescanjndilookup" ,
"owner" : {
"login" : "MiguelM001" ,
"id" : 22323920 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22323920?v=4" ,
"html_url" : "https:\/\/github.com\/MiguelM001" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/MiguelM001\/vulescanjndilookup" ,
"description" : "HERRAMIENTA AUTOMATIZADA PARA LA DETECCION DE LA VULNERABILIDAD CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2022-03-10T14:57:30Z" ,
"updated_at" : "2022-03-10T15:56:57Z" ,
"pushed_at" : "2022-03-11T17:49:10Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 468746734 ,
"name" : "CVE-2021-44228" ,
"full_name" : "Jun-5heng\/CVE-2021-44228" ,
"owner" : {
"login" : "Jun-5heng" ,
"id" : 88525975 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4" ,
"html_url" : "https:\/\/github.com\/Jun-5heng" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Jun-5heng\/CVE-2021-44228" ,
"description" : "Log4j2组件命令执行RCE \/ Code By:Jun_sheng" ,
"fork" : false ,
"created_at" : "2022-03-11T12:43:15Z" ,
"updated_at" : "2022-03-11T13:24:13Z" ,
"pushed_at" : "2022-03-11T13:24:09Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 469576160 ,
"name" : "CVE-2021-44228" ,
"full_name" : "honypot\/CVE-2021-44228" ,
"owner" : {
"login" : "honypot" ,
"id" : 101309325 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4" ,
"html_url" : "https:\/\/github.com\/honypot" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/honypot\/CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-14T04:09:36Z" ,
"updated_at" : "2022-03-14T04:09:57Z" ,
"pushed_at" : "2022-03-14T04:10:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 469576898 ,
"name" : "CVE-2021-44228-vuln-app" ,
"full_name" : "honypot\/CVE-2021-44228-vuln-app" ,
"owner" : {
"login" : "honypot" ,
"id" : 101309325 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4" ,
"html_url" : "https:\/\/github.com\/honypot" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/honypot\/CVE-2021-44228-vuln-app" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-14T04:13:13Z" ,
"updated_at" : "2022-03-14T04:13:24Z" ,
"pushed_at" : "2022-03-14T04:16:02Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 482498767 ,
"name" : "log4j-scanner" ,
"full_name" : "manishkanyal\/log4j-scanner" ,
"owner" : {
"login" : "manishkanyal" ,
"id" : 39938426 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39938426?v=4" ,
"html_url" : "https:\/\/github.com\/manishkanyal" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/manishkanyal\/log4j-scanner" ,
"description" : "A Log4j vulnerability scanner is used to identify the CVE-2021-44228 and CVE_2021_45046" ,
"fork" : false ,
"created_at" : "2022-04-17T11:01:24Z" ,
"updated_at" : "2022-11-10T04:02:56Z" ,
"pushed_at" : "2022-04-17T11:27:22Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 487163916 ,
"name" : "Writing-Sample-1" ,
"full_name" : "TPower2112\/Writing-Sample-1" ,
"owner" : {
"login" : "TPower2112" ,
"id" : 20917633 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20917633?v=4" ,
"html_url" : "https:\/\/github.com\/TPower2112" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/TPower2112\/Writing-Sample-1" ,
"description" : "CVE-2021-44228 Log4j Summary" ,
"fork" : false ,
"created_at" : "2022-04-30T02:35:38Z" ,
"updated_at" : "2022-12-15T00:15:39Z" ,
"pushed_at" : "2022-11-19T19:37:19Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"log4j2" ,
"markdown" ,
"mitigations"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 487921535 ,
"name" : "Log4j-Exploit-CVE-2021-44228" ,
"full_name" : "Willian-2-0-0-1\/Log4j-Exploit-CVE-2021-44228" ,
"owner" : {
"login" : "Willian-2-0-0-1" ,
"id" : 39037497 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39037497?v=4" ,
"html_url" : "https:\/\/github.com\/Willian-2-0-0-1" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Willian-2-0-0-1\/Log4j-Exploit-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-05-02T16:53:26Z" ,
"updated_at" : "2022-05-02T16:53:26Z" ,
"pushed_at" : "2022-05-14T13:18:17Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 490330900 ,
"name" : "Log4Shell-obfuscated-payloads-generator" ,
"full_name" : "r3kind1e\/Log4Shell-obfuscated-payloads-generator" ,
"owner" : {
"login" : "r3kind1e" ,
"id" : 85721156 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/85721156?v=4" ,
"html_url" : "https:\/\/github.com\/r3kind1e" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/r3kind1e\/Log4Shell-obfuscated-payloads-generator" ,
"description" : "Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection." ,
"fork" : false ,
"created_at" : "2022-05-09T15:02:29Z" ,
"updated_at" : "2024-07-16T09:47:08Z" ,
"pushed_at" : "2022-05-26T03:18:31Z" ,
"stargazers_count" : 21 ,
"watchers_count" : 21 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"log4j" ,
"log4shell" ,
"vulnerability-research" ,
"waf-bypass"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 21 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 491872919 ,
"name" : "CVE-2021-44228" ,
"full_name" : "Phineas09\/CVE-2021-44228" ,
"owner" : {
"login" : "Phineas09" ,
"id" : 40483676 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/40483676?v=4" ,
"html_url" : "https:\/\/github.com\/Phineas09" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Phineas09\/CVE-2021-44228" ,
"description" : "Log4Shell Proof-Of-Concept derived from https:\/\/github.com\/kozmer\/log4j-shell-poc" ,
"fork" : false ,
"created_at" : "2022-05-13T11:35:22Z" ,
"updated_at" : "2022-05-13T11:40:56Z" ,
"pushed_at" : "2022-05-13T16:49:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 496048138 ,
"name" : "CVE-2021-44228-Apache-Log4j-Rce" ,
"full_name" : "yuuki1967\/CVE-2021-44228-Apache-Log4j-Rce" ,
"owner" : {
"login" : "yuuki1967" ,
"id" : 11524508 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11524508?v=4" ,
"html_url" : "https:\/\/github.com\/yuuki1967" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/yuuki1967\/CVE-2021-44228-Apache-Log4j-Rce" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-05-25T01:56:14Z" ,
"updated_at" : "2022-05-25T01:56:32Z" ,
"pushed_at" : "2023-05-26T05:20:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 500852820 ,
"name" : "tf-log4j-aws-poc" ,
"full_name" : "moshuum\/tf-log4j-aws-poc" ,
"owner" : {
"login" : "moshuum" ,
"id" : 1893265 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1893265?v=4" ,
"html_url" : "https:\/\/github.com\/moshuum" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/moshuum\/tf-log4j-aws-poc" ,
"description" : "This project files demostrate a proof-of-concept of log4j vulnerability (CVE-2021-44228) on AWS using Terraform Infrastructure-as-a-code means." ,
"fork" : false ,
"created_at" : "2022-06-07T13:30:37Z" ,
"updated_at" : "2022-06-07T23:24:00Z" ,
"pushed_at" : "2022-06-08T04:14:11Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 501054329 ,
"name" : "CVE-2021-44228" ,
"full_name" : "jaehnri\/CVE-2021-44228" ,
"owner" : {
"login" : "jaehnri" ,
"id" : 30930799 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/30930799?v=4" ,
"html_url" : "https:\/\/github.com\/jaehnri" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jaehnri\/CVE-2021-44228" ,
"description" : "Proof of concept of the Log4Shell vulnerability (CVE-2021-44228)" ,
"fork" : false ,
"created_at" : "2022-06-08T01:09:28Z" ,
"updated_at" : "2023-06-01T16:45:21Z" ,
"pushed_at" : "2022-07-07T03:35:14Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 502589993 ,
"name" : "Log4Shell-CVE-2021-44228-Demo" ,
"full_name" : "ra890927\/Log4Shell-CVE-2021-44228-Demo" ,
"owner" : {
"login" : "ra890927" ,
"id" : 48157503 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48157503?v=4" ,
"html_url" : "https:\/\/github.com\/ra890927" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ra890927\/Log4Shell-CVE-2021-44228-Demo" ,
"description" : "Log4Shell CVE-2021-44228 Demo" ,
"fork" : false ,
"created_at" : "2022-06-12T10:57:07Z" ,
"updated_at" : "2022-12-11T13:51:49Z" ,
"pushed_at" : "2022-06-13T02:37:18Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"docker" ,
"log4shell"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 515491317 ,
"name" : "Ethical-Hacking-Report-Log4j" ,
"full_name" : "vidrez\/Ethical-Hacking-Report-Log4j" ,
"owner" : {
"login" : "vidrez" ,
"id" : 36509217 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36509217?v=4" ,
"html_url" : "https:\/\/github.com\/vidrez" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/vidrez\/Ethical-Hacking-Report-Log4j" ,
"description" : ":page_with_curl: A report about CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2022-07-19T08:03:05Z" ,
"updated_at" : "2024-04-29T17:22:54Z" ,
"pushed_at" : "2022-07-19T08:08:12Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 520582575 ,
"name" : "CVE-2021-44228" ,
"full_name" : "vino-theva\/CVE-2021-44228" ,
"owner" : {
"login" : "vino-theva" ,
"id" : 106059311 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/106059311?v=4" ,
"html_url" : "https:\/\/github.com\/vino-theva" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/vino-theva\/CVE-2021-44228" ,
"description" : "Apache Log4j is a logging tool written in Java. This paper focuses on what is Log4j and log4shell vulnerability and how it works, how it affects the victim, and how can this be mitigated" ,
"fork" : false ,
"created_at" : "2022-08-02T17:03:55Z" ,
"updated_at" : "2022-08-02T17:03:55Z" ,
"pushed_at" : "2022-08-02T17:12:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 526103436 ,
"name" : "tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228" ,
"full_name" : "tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228" ,
"owner" : {
"login" : "tharindudh" ,
"id" : 71964544 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/71964544?v=4" ,
"html_url" : "https:\/\/github.com\/tharindudh" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-08-18T07:27:32Z" ,
"updated_at" : "2022-08-18T07:27:32Z" ,
"pushed_at" : "2022-08-18T07:30:16Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 529025141 ,
"name" : "jankybank" ,
"full_name" : "eurogig\/jankybank" ,
"owner" : {
"login" : "eurogig" ,
"id" : 9045562 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9045562?v=4" ,
"html_url" : "https:\/\/github.com\/eurogig" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/eurogig\/jankybank" ,
"description" : "Simple Java Front and Back end with bad log4j version featuring CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2022-08-25T21:35:32Z" ,
"updated_at" : "2022-08-25T21:37:58Z" ,
"pushed_at" : "2024-03-12T11:22:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 533987858 ,
"name" : "Log4j-CVE-2021-44228-Remediation" ,
"full_name" : "digital-dev\/Log4j-CVE-2021-44228-Remediation" ,
"owner" : {
"login" : "digital-dev" ,
"id" : 18492599 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18492599?v=4" ,
"html_url" : "https:\/\/github.com\/digital-dev" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/digital-dev\/Log4j-CVE-2021-44228-Remediation" ,
"description" : "This powershell script is intended to be used by anyone looking to remediate the Log4j Vulnerability within their environment. It can target multiple machines and run remotely as a job on all or only affected devices." ,
"fork" : false ,
"created_at" : "2022-09-08T00:22:57Z" ,
"updated_at" : "2022-09-08T00:23:02Z" ,
"pushed_at" : "2024-01-26T02:09:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 539366249 ,
"name" : "log4j-shell-poc" ,
"full_name" : "ocastel\/log4j-shell-poc" ,
"owner" : {
"login" : "ocastel" ,
"id" : 3749321 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3749321?v=4" ,
"html_url" : "https:\/\/github.com\/ocastel" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ocastel\/log4j-shell-poc" ,
"description" : "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. " ,
"fork" : false ,
"created_at" : "2022-09-21T07:43:15Z" ,
"updated_at" : "2022-09-21T09:04:17Z" ,
"pushed_at" : "2022-09-21T14:45:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 539674997 ,
"name" : "CVE-2021-44228-poc" ,
"full_name" : "bcdunbar\/CVE-2021-44228-poc" ,
"owner" : {
"login" : "bcdunbar" ,
"id" : 8393928 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8393928?v=4" ,
"html_url" : "https:\/\/github.com\/bcdunbar" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/bcdunbar\/CVE-2021-44228-poc" ,
"description" : "CVE-2021-44228 POC \/ Example" ,
"fork" : false ,
"created_at" : "2022-09-21T20:33:06Z" ,
"updated_at" : "2022-09-29T22:57:36Z" ,
"pushed_at" : "2022-09-29T22:57:31Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 563424783 ,
"name" : "CVE-2021-44228" ,
"full_name" : "srcporter\/CVE-2021-44228" ,
"owner" : {
"login" : "srcporter" ,
"id" : 42175824 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42175824?v=4" ,
"html_url" : "https:\/\/github.com\/srcporter" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/srcporter\/CVE-2021-44228" ,
"description" : "DO NOT USE FOR ANYTHING REAL. Simple springboot sample app with vulnerability CVE-2021-44228 aka \"Log4Shell\" " ,
"fork" : false ,
"created_at" : "2022-11-08T15:29:42Z" ,
"updated_at" : "2024-08-22T18:40:38Z" ,
"pushed_at" : "2024-08-22T18:40:35Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 583519721 ,
"name" : "log4j2_CVE-2021-44228" ,
"full_name" : "Nexolanta\/log4j2_CVE-2021-44228" ,
"owner" : {
"login" : "Nexolanta" ,
"id" : 73454853 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73454853?v=4" ,
"html_url" : "https:\/\/github.com\/Nexolanta" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Nexolanta\/log4j2_CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-12-30T02:46:33Z" ,
"updated_at" : "2022-12-30T02:54:02Z" ,
"pushed_at" : "2022-12-30T02:48:29Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 595794114 ,
"name" : "Log4j-Vulnerability" ,
"full_name" : "demining\/Log4j-Vulnerability" ,
"owner" : {
"login" : "demining" ,
"id" : 87700947 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87700947?v=4" ,
"html_url" : "https:\/\/github.com\/demining" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/demining\/Log4j-Vulnerability" ,
"description" : "Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string." ,
"fork" : false ,
"created_at" : "2023-01-31T20:29:26Z" ,
"updated_at" : "2024-08-12T20:29:35Z" ,
"pushed_at" : "2023-01-31T20:35:59Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"attack" ,
"bitcoin" ,
"blockchain" ,
"cve-2021-44228" ,
"hack" ,
"hacking" ,
"log4j" ,
"log4js" ,
"log4shell" ,
"mining" ,
"vulnerability" ,
"vulnerability-scanner" ,
"vulnerable"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 599082211 ,
"name" : "Log4Shell-CVE-2021-44228-PoC" ,
"full_name" : "pierpaolosestito-dev\/Log4Shell-CVE-2021-44228-PoC" ,
"owner" : {
"login" : "pierpaolosestito-dev" ,
"id" : 112246529 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/112246529?v=4" ,
"html_url" : "https:\/\/github.com\/pierpaolosestito-dev" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/pierpaolosestito-dev\/Log4Shell-CVE-2021-44228-PoC" ,
"description" : "CVE 2021-44228 Proof-of-Concept. Log4Shell is an attack against Servers that uses vulnerable versions of Log4J. " ,
"fork" : false ,
"created_at" : "2023-02-08T12:19:32Z" ,
"updated_at" : "2024-03-25T10:24:18Z" ,
"pushed_at" : "2023-02-08T12:20:31Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"attack" ,
"java" ,
"jndi-exploit" ,
"jndi-lookups" ,
"ldap" ,
"log4j-rce" ,
"security" ,
"vulnerabilities"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 605052737 ,
"name" : "LOG4J-CVE-2021-44228" ,
"full_name" : "Sumitpathania03\/LOG4J-CVE-2021-44228" ,
"owner" : {
"login" : "Sumitpathania03" ,
"id" : 126046383 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/126046383?v=4" ,
"html_url" : "https:\/\/github.com\/Sumitpathania03" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Sumitpathania03\/LOG4J-CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-02-22T10:45:46Z" ,
"updated_at" : "2024-11-26T09:46:55Z" ,
"pushed_at" : "2023-04-11T09:21:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 614031542 ,
"name" : "Log4j-PoC" ,
"full_name" : "Sma-Das\/Log4j-PoC" ,
"owner" : {
"login" : "Sma-Das" ,
"id" : 20164942 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20164942?v=4" ,
"html_url" : "https:\/\/github.com\/Sma-Das" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Sma-Das\/Log4j-PoC" ,
"description" : "An educational Proof of Concept for the Log4j Vulnerability (CVE-2021-44228) in Minecraft" ,
"fork" : false ,
"created_at" : "2023-03-14T18:49:36Z" ,
"updated_at" : "2023-08-15T12:50:40Z" ,
"pushed_at" : "2023-03-14T18:50:34Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"gradle" ,
"java" ,
"log4j" ,
"log4j2" ,
"minecraft" ,
"poc"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 616502386 ,
"name" : "log4shell-vulnweb" ,
"full_name" : "53buahapel\/log4shell-vulnweb" ,
"owner" : {
"login" : "53buahapel" ,
"id" : 55012507 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55012507?v=4" ,
"html_url" : "https:\/\/github.com\/53buahapel" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/53buahapel\/log4shell-vulnweb" ,
"description" : "this web is vulnerable against CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2023-03-20T14:09:30Z" ,
"updated_at" : "2023-06-17T19:43:29Z" ,
"pushed_at" : "2023-04-03T19:33:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 622718899 ,
"name" : "Log4ShellRemediation" ,
"full_name" : "demonrvm\/Log4ShellRemediation" ,
"owner" : {
"login" : "demonrvm" ,
"id" : 129688147 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/129688147?v=4" ,
"html_url" : "https:\/\/github.com\/demonrvm" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/demonrvm\/Log4ShellRemediation" ,
"description" : "A vulnerable Spring Boot application that uses log4j and is vulnerable to CVE-2021-44228, CVE-2021-44832, CVE-2021-45046 and CVE-2021-45105" ,
"fork" : false ,
"created_at" : "2023-04-02T23:03:28Z" ,
"updated_at" : "2023-04-17T15:19:43Z" ,
"pushed_at" : "2023-04-04T00:04:34Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 628273977 ,
"name" : "log4j-exploit-fork-bomb" ,
"full_name" : "funcid\/log4j-exploit-fork-bomb" ,
"owner" : {
"login" : "funcid" ,
"id" : 42806772 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42806772?v=4" ,
"html_url" : "https:\/\/github.com\/funcid" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/funcid\/log4j-exploit-fork-bomb" ,
"description" : "💣💥💀 Proof of Concept: пример запуска fork-бомбы на удаленном сервере благодаря уязвимости CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2023-04-15T12:47:39Z" ,
"updated_at" : "2023-05-06T18:26:50Z" ,
"pushed_at" : "2023-05-02T21:46:29Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 660080340 ,
"name" : "PY-Log4j-RCE-Scanner" ,
"full_name" : "MrHarshvardhan\/PY-Log4j-RCE-Scanner" ,
"owner" : {
"login" : "MrHarshvardhan" ,
"id" : 49817411 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/49817411?v=4" ,
"html_url" : "https:\/\/github.com\/MrHarshvardhan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/MrHarshvardhan\/PY-Log4j-RCE-Scanner" ,
"description" : "Using this tool, you can scan for remote command execution vulnerability CVE-2021-44228 on Apache Log4j at multiple addresses." ,
"fork" : false ,
"created_at" : "2023-06-29T07:46:40Z" ,
"updated_at" : "2024-03-11T16:09:06Z" ,
"pushed_at" : "2023-06-29T08:14:23Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 668405235 ,
"name" : "Log4j_CVE-2021-44228" ,
"full_name" : "Muhammad-Ali007\/Log4j_CVE-2021-44228" ,
"owner" : {
"login" : "Muhammad-Ali007" ,
"id" : 64638296 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64638296?v=4" ,
"html_url" : "https:\/\/github.com\/Muhammad-Ali007" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Muhammad-Ali007\/Log4j_CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-07-19T18:18:16Z" ,
"updated_at" : "2023-07-21T21:40:52Z" ,
"pushed_at" : "2023-07-21T21:55:57Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 701169649 ,
"name" : "CVE-2021-44228" ,
"full_name" : "Tai-e\/CVE-2021-44228" ,
"owner" : {
"login" : "Tai-e" ,
"id" : 100122463 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/100122463?v=4" ,
"html_url" : "https:\/\/github.com\/Tai-e" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Tai-e\/CVE-2021-44228" ,
"description" : "Utilize Tai-e to identify the Log4shell (a.k.a. CVE-2021-44228) Vulnerability" ,
"fork" : false ,
"created_at" : "2023-10-06T04:36:31Z" ,
"updated_at" : "2024-11-07T04:36:16Z" ,
"pushed_at" : "2023-10-06T09:30:27Z" ,
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"java" ,
"log4shell" ,
"security" ,
"taint-analysis"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 9 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 718233980 ,
"name" : "CVE-2021-44228" ,
"full_name" : "LucasPDiniz\/CVE-2021-44228" ,
"owner" : {
"login" : "LucasPDiniz" ,
"id" : 57265360 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4" ,
"html_url" : "https:\/\/github.com\/LucasPDiniz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/LucasPDiniz\/CVE-2021-44228" ,
"description" : "Log4j Vulnerability RCE - CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2023-11-13T16:57:22Z" ,
"updated_at" : "2024-06-30T21:52:24Z" ,
"pushed_at" : "2024-06-30T21:52:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"2021" ,
"cve-2021-44228" ,
"log4j" ,
"rce" ,
"solaris" ,
"solr" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 721701932 ,
"name" : "log4shell-minecraft-demo" ,
"full_name" : "felixslama\/log4shell-minecraft-demo" ,
"owner" : {
"login" : "felixslama" ,
"id" : 79058712 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79058712?v=4" ,
"html_url" : "https:\/\/github.com\/felixslama" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/felixslama\/log4shell-minecraft-demo" ,
"description" : "Log4Shell (CVE-2021-44228) minecraft demo. Used for education fairs" ,
"fork" : false ,
"created_at" : "2023-11-21T15:45:31Z" ,
2024-12-07 19:32:04 +01:00
"updated_at" : "2024-12-07T12:27:41Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2023-11-21T18:30:32Z" ,
2024-12-07 19:32:04 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-12-07 19:32:04 +01:00
"watchers" : 1 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 725731160 ,
"name" : "log4shell_lab" ,
"full_name" : "ShlomiRex\/log4shell_lab" ,
"owner" : {
"login" : "ShlomiRex" ,
"id" : 17744127 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17744127?v=4" ,
"html_url" : "https:\/\/github.com\/ShlomiRex" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ShlomiRex\/log4shell_lab" ,
"description" : "CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2023-11-30T18:55:40Z" ,
"updated_at" : "2024-07-15T07:35:10Z" ,
"pushed_at" : "2024-07-15T07:35:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 728564712 ,
"name" : "CVE-Lab" ,
"full_name" : "dcm2406\/CVE-Lab" ,
"owner" : {
"login" : "dcm2406" ,
"id" : 106772368 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/106772368?v=4" ,
"html_url" : "https:\/\/github.com\/dcm2406" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dcm2406\/CVE-Lab" ,
"description" : "Instructions for exploiting vulnerabilities CVE-2021-44228 and CVE-2023-46604" ,
"fork" : false ,
"created_at" : "2023-12-07T08:02:53Z" ,
"updated_at" : "2024-03-21T06:45:44Z" ,
"pushed_at" : "2024-03-20T06:20:44Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 732890890 ,
"name" : "l4j-tp1" ,
"full_name" : "scabench\/l4j-tp1" ,
"owner" : {
"login" : "scabench" ,
"id" : 154115874 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/154115874?v=4" ,
"html_url" : "https:\/\/github.com\/scabench" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/scabench\/l4j-tp1" ,
"description" : "jee web project with log4shell (CVE-2021-44228) vulnerability" ,
"fork" : false ,
"created_at" : "2023-12-18T05:07:59Z" ,
"updated_at" : "2023-12-27T22:59:23Z" ,
"pushed_at" : "2024-01-09T04:10:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 736198962 ,
"name" : "l4j-fp1" ,
"full_name" : "scabench\/l4j-fp1" ,
"owner" : {
"login" : "scabench" ,
"id" : 154115874 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/154115874?v=4" ,
"html_url" : "https:\/\/github.com\/scabench" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/scabench\/l4j-fp1" ,
"description" : "jee web project with sanitised log4shell (CVE-2021-44228) vulnerability" ,
"fork" : false ,
"created_at" : "2023-12-27T08:49:38Z" ,
"updated_at" : "2023-12-27T22:59:37Z" ,
"pushed_at" : "2024-01-14T23:40:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 772721921 ,
"name" : "l4s-vulnapp" ,
"full_name" : "KtokKawu\/l4s-vulnapp" ,
"owner" : {
"login" : "KtokKawu" ,
"id" : 16015720 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16015720?v=4" ,
"html_url" : "https:\/\/github.com\/KtokKawu" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/KtokKawu\/l4s-vulnapp" ,
"description" : "This is a potentially vulnerable Java web application containing Log4j affected by log4shell(CVE-2021-44228)." ,
"fork" : false ,
"created_at" : "2024-03-15T18:57:11Z" ,
"updated_at" : "2024-03-15T19:37:44Z" ,
"pushed_at" : "2024-03-15T19:37:40Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 776289709 ,
"name" : "CVE-2021-44228-POC" ,
"full_name" : "sec13b\/CVE-2021-44228-POC" ,
"owner" : {
"login" : "sec13b" ,
"id" : 123419537 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/123419537?v=4" ,
"html_url" : "https:\/\/github.com\/sec13b" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sec13b\/CVE-2021-44228-POC" ,
"description" : "exploit CVE-2021-44228 " ,
"fork" : false ,
"created_at" : "2024-03-23T05:03:44Z" ,
"updated_at" : "2024-11-06T18:16:06Z" ,
"pushed_at" : "2024-11-06T18:16:03Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 777920527 ,
"name" : "Wireshark" ,
"full_name" : "KirkDJohnson\/Wireshark" ,
"owner" : {
"login" : "KirkDJohnson" ,
"id" : 164972007 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/164972007?v=4" ,
"html_url" : "https:\/\/github.com\/KirkDJohnson" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/KirkDJohnson\/Wireshark" ,
"description" : "Downloaded a packet capture (.pcapng) file from malware-traffic-analysis.net which was an example of an attempted attack against a webserver using the Log4J vulnerability (CVE-2021-44228). I examined teh amount of endpoints communicating with the server and knowing jnidi as a common in the vulnerbilty found it in clear text" ,
"fork" : false ,
"created_at" : "2024-03-26T18:47:20Z" ,
"updated_at" : "2024-09-14T11:49:45Z" ,
"pushed_at" : "2024-05-22T23:57:30Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 780990164 ,
"name" : "LOGJ4_PocShell_CVE-2021-44228" ,
"full_name" : "YangHyperData\/LOGJ4_PocShell_CVE-2021-44228" ,
"owner" : {
"login" : "YangHyperData" ,
"id" : 131573711 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/131573711?v=4" ,
"html_url" : "https:\/\/github.com\/YangHyperData" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/YangHyperData\/LOGJ4_PocShell_CVE-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-04-02T14:44:10Z" ,
"updated_at" : "2024-07-04T13:20:01Z" ,
"pushed_at" : "2024-07-04T13:19:58Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 807102558 ,
"name" : "CVE-2021-44228-demo" ,
"full_name" : "Hoanle396\/CVE-2021-44228-demo" ,
"owner" : {
"login" : "Hoanle396" ,
"id" : 89791546 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89791546?v=4" ,
"html_url" : "https:\/\/github.com\/Hoanle396" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Hoanle396\/CVE-2021-44228-demo" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-05-28T13:40:20Z" ,
"updated_at" : "2024-05-28T13:43:00Z" ,
"pushed_at" : "2024-05-28T13:42:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 812482563 ,
"name" : "Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment" ,
"full_name" : "tadash10\/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment" ,
"owner" : {
"login" : "tadash10" ,
"id" : 126980610 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/126980610?v=4" ,
"html_url" : "https:\/\/github.com\/tadash10" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/tadash10\/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment" ,
"description" : "Objective: Demonstrate the exploitation of the Log4Shell vulnerability (CVE-2021-44228) within a simulated banking application environment." ,
"fork" : false ,
"created_at" : "2024-06-09T02:49:42Z" ,
"updated_at" : "2024-08-25T03:41:02Z" ,
"pushed_at" : "2024-06-14T02:52:27Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 815657442 ,
"name" : "cve-2021-44228" ,
"full_name" : "cve-2021-44228\/cve-2021-44228" ,
"owner" : {
"login" : "cve-2021-44228" ,
"id" : 66845682 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66845682?v=4" ,
"html_url" : "https:\/\/github.com\/cve-2021-44228" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/cve-2021-44228\/cve-2021-44228" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-06-15T18:39:23Z" ,
2024-11-29 13:32:27 +01:00
"updated_at" : "2024-11-29T07:17:14Z" ,
"pushed_at" : "2024-11-29T07:17:11Z" ,
2024-11-28 19:31:51 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 834267924 ,
"name" : "CVE-2021-44228" ,
"full_name" : "asd58584388\/CVE-2021-44228" ,
"owner" : {
"login" : "asd58584388" ,
"id" : 43491476 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43491476?v=4" ,
"html_url" : "https:\/\/github.com\/asd58584388" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/asd58584388\/CVE-2021-44228" ,
"description" : "CVE-2021-44228 vulnerability study" ,
"fork" : false ,
"created_at" : "2024-07-26T19:59:47Z" ,
"updated_at" : "2024-07-26T20:57:53Z" ,
"pushed_at" : "2024-07-26T20:57:47Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 855503144 ,
"name" : "CVE-2021-44228-Log4Shell-" ,
"full_name" : "OtisSymbos\/CVE-2021-44228-Log4Shell-" ,
"owner" : {
"login" : "OtisSymbos" ,
"id" : 78093502 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/78093502?v=4" ,
"html_url" : "https:\/\/github.com\/OtisSymbos" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/OtisSymbos\/CVE-2021-44228-Log4Shell-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-09-11T01:13:35Z" ,
"updated_at" : "2024-09-11T01:20:42Z" ,
"pushed_at" : "2024-09-11T01:14:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 855573158 ,
"name" : "log4j-shell-poc" ,
"full_name" : "safeer-accuknox\/log4j-shell-poc" ,
"owner" : {
"login" : "safeer-accuknox" ,
"id" : 180378107 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4" ,
"html_url" : "https:\/\/github.com\/safeer-accuknox" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/safeer-accuknox\/log4j-shell-poc" ,
"description" : "Log4J exploit CVE-2021-44228" ,
"fork" : false ,
"created_at" : "2024-09-11T05:06:50Z" ,
"updated_at" : "2024-09-11T09:39:58Z" ,
"pushed_at" : "2024-09-11T09:39:55Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 869690102 ,
"name" : "TPASLog4ShellPoC" ,
"full_name" : "Carlos-Mesquita\/TPASLog4ShellPoC" ,
"owner" : {
"login" : "Carlos-Mesquita" ,
"id" : 75860783 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75860783?v=4" ,
"html_url" : "https:\/\/github.com\/Carlos-Mesquita" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Carlos-Mesquita\/TPASLog4ShellPoC" ,
"description" : "Proof of Concept (PoC) for the Log4Shell vulnerability (CVE-2021-44228), developed as part of the coursework for the curricular unit TPAS in the Master's degree in Information Security at FCUP." ,
"fork" : false ,
"created_at" : "2024-10-08T18:07:21Z" ,
"updated_at" : "2024-10-10T14:53:56Z" ,
"pushed_at" : "2024-10-08T18:19:15Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 886209908 ,
"name" : "-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-" ,
"full_name" : "AhmedMansour93\/-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-" ,
"owner" : {
"login" : "AhmedMansour93" ,
"id" : 179945455 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/179945455?v=4" ,
"html_url" : "https:\/\/github.com\/AhmedMansour93" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/AhmedMansour93\/-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-" ,
"description" : "In December 2021, the world of cybersecurity was shaken by the discovery of the Log4Shell vulnerability (CVE-2021-44228), embedded within the widely-used Apache Log4j library. With a CVSS score of 10" ,
"fork" : false ,
"created_at" : "2024-11-10T13:45:59Z" ,
"updated_at" : "2024-11-10T13:47:01Z" ,
"pushed_at" : "2024-11-10T13:46:58Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 888768773 ,
"name" : "cve-2021-44228" ,
"full_name" : "Super-Binary\/cve-2021-44228" ,
"owner" : {
"login" : "Super-Binary" ,
"id" : 188337454 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/188337454?v=4" ,
"html_url" : "https:\/\/github.com\/Super-Binary" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Super-Binary\/cve-2021-44228" ,
"description" : "这是安徽大学 “漏洞分析实验”( 大三秋冬) 期中作业归档。完整文档位于https:\/\/testgames.me\/2024\/11\/10\/cve-2021-44228\/" ,
"fork" : false ,
"created_at" : "2024-11-15T01:11:25Z" ,
"updated_at" : "2024-11-23T13:31:31Z" ,
"pushed_at" : "2024-11-23T13:31:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
}
]