mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/09/02 00:17:03
This commit is contained in:
parent
54e2464444
commit
01e01bfdda
22 changed files with 147 additions and 121 deletions
|
@ -75,13 +75,13 @@
|
|||
"pushed_at": "2022-07-08T09:14:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2015-05-11T22:39:06Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -81,7 +81,7 @@
|
|||
"pushed_at": "2022-08-22T12:00:56Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -99,7 +99,7 @@
|
|||
"snyk-js-jquery-567880"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-08-22T12:00:56Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -35,7 +35,7 @@
|
|||
"snyk-js-jquery-567880"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2021-01-04T10:16:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -134,13 +134,13 @@
|
|||
"pushed_at": "2022-08-30T11:52:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -133,7 +133,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-18T20:40:55Z",
|
||||
"updated_at": "2022-06-30T19:28:30Z",
|
||||
"pushed_at": "2022-01-18T21:15:46Z",
|
||||
"pushed_at": "2022-09-01T21:28:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -75,10 +75,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-08-29T09:11:50Z",
|
||||
"updated_at": "2022-09-01T21:20:55Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1634,
|
||||
"watchers_count": 1634,
|
||||
"stargazers_count": 1635,
|
||||
"watchers_count": 1635,
|
||||
"forks_count": 476,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -86,7 +86,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 476,
|
||||
"watchers": 1634,
|
||||
"watchers": 1635,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4258,5 +4258,42 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 531708844,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "1337Rin\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "1337Rin",
|
||||
"id": 108487881,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108487881?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337Rin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337Rin\/CVE-2021-4034",
|
||||
"description": "pwnkit auto exploiter written in Go, no network connectivity required.",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-01T22:48:09Z",
|
||||
"updated_at": "2022-09-01T22:54:46Z",
|
||||
"pushed_at": "2022-09-01T23:47:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"automation",
|
||||
"cve",
|
||||
"cve-2021-4034",
|
||||
"go",
|
||||
"golang",
|
||||
"linux",
|
||||
"privilege-escalation",
|
||||
"pwnkit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -47,7 +47,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2022-09-01T11:04:52Z",
|
||||
"pushed_at": "2022-04-25T07:53:41Z",
|
||||
"pushed_at": "2022-09-01T21:30:25Z",
|
||||
"stargazers_count": 403,
|
||||
"watchers_count": 403,
|
||||
"forks_count": 77,
|
||||
|
|
|
@ -2360,34 +2360,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438118026,
|
||||
"name": "log4j-urlscanner",
|
||||
"full_name": "Woahd\/log4j-urlscanner",
|
||||
"owner": {
|
||||
"login": "Woahd",
|
||||
"id": 91861246,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91861246?v=4",
|
||||
"html_url": "https:\/\/github.com\/Woahd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Woahd\/log4j-urlscanner",
|
||||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T04:35:20Z",
|
||||
"updated_at": "2021-12-15T04:54:26Z",
|
||||
"pushed_at": "2021-12-15T04:54:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438128189,
|
||||
"name": "Log4j2-CVE-2021-44228-revshell",
|
||||
|
|
|
@ -70,7 +70,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-09-01T16:44:56Z",
|
||||
"updated_at": "2022-09-01T17:43:34Z",
|
||||
"pushed_at": "2022-09-01T18:09:20Z",
|
||||
"pushed_at": "2022-09-01T18:51:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-20T03:01:30Z",
|
||||
"updated_at": "2022-09-01T07:05:57Z",
|
||||
"updated_at": "2022-09-01T18:33:40Z",
|
||||
"pushed_at": "2022-08-26T00:48:33Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-08-30T11:52:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -181,10 +181,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T19:51:39Z",
|
||||
"updated_at": "2022-08-31T13:37:21Z",
|
||||
"updated_at": "2022-09-01T23:29:48Z",
|
||||
"pushed_at": "2022-07-05T19:52:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -192,7 +192,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -69,10 +69,10 @@
|
|||
"description": "CVE-2022-23222, managed with Rust.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-09T19:28:46Z",
|
||||
"updated_at": "2022-07-11T01:59:15Z",
|
||||
"updated_at": "2022-09-01T21:21:15Z",
|
||||
"pushed_at": "2022-08-30T20:56:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -80,7 +80,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,30 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 530742974,
|
||||
"id": 530761622,
|
||||
"name": "CVE-2022-24637",
|
||||
"full_name": "JacobEbben\/CVE-2022-24637",
|
||||
"full_name": "Lay0us1\/CVE-2022-24637",
|
||||
"owner": {
|
||||
"login": "JacobEbben",
|
||||
"id": 112503338,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
|
||||
"html_url": "https:\/\/github.com\/JacobEbben"
|
||||
"login": "Lay0us1",
|
||||
"id": 99304369,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99304369?v=4",
|
||||
"html_url": "https:\/\/github.com\/Lay0us1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-24637",
|
||||
"description": "Unauthenticated RCE in Open Web Analytics (OWA) <1.7.4",
|
||||
"html_url": "https:\/\/github.com\/Lay0us1\/CVE-2022-24637",
|
||||
"description": "Unauthenticated RCE in Open Web Analytics (OWA) 1.7.3",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-30T16:38:01Z",
|
||||
"updated_at": "2022-08-31T09:20:50Z",
|
||||
"pushed_at": "2022-09-01T00:34:42Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"created_at": "2022-08-30T17:31:14Z",
|
||||
"updated_at": "2022-08-30T17:31:08Z",
|
||||
"pushed_at": "2022-08-30T17:09:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
38
2022/CVE-2022-25260.json
Normal file
38
2022/CVE-2022-25260.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"id": 531686651,
|
||||
"name": "CVE-2022-25260",
|
||||
"full_name": "yuriisanin\/CVE-2022-25260",
|
||||
"owner": {
|
||||
"login": "yuriisanin",
|
||||
"id": 11749007,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4",
|
||||
"html_url": "https:\/\/github.com\/yuriisanin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-25260",
|
||||
"description": "PoC for CVE-2022-25260: semi-blind SSRF in JetBrains Hub",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-01T21:08:19Z",
|
||||
"updated_at": "2022-09-01T21:16:39Z",
|
||||
"pushed_at": "2022-09-01T21:14:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2022-25260",
|
||||
"exploit",
|
||||
"jetbrains",
|
||||
"jetbrains-hub",
|
||||
"ssrf",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -150,10 +150,10 @@
|
|||
"description": "CVE-2022-26134 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T13:59:19Z",
|
||||
"updated_at": "2022-08-31T09:55:50Z",
|
||||
"updated_at": "2022-09-01T22:22:36Z",
|
||||
"pushed_at": "2022-06-06T16:38:49Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -165,7 +165,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-08-26T04:01:17Z",
|
||||
"updated_at": "2022-09-01T19:49:56Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 303,
|
||||
"watchers": 304,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -27,34 +27,6 @@
|
|||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 512156451,
|
||||
"name": "CVE-2022-34265-modified",
|
||||
"full_name": "raheel0x01\/CVE-2022-34265-modified",
|
||||
"owner": {
|
||||
"login": "raheel0x01",
|
||||
"id": 65211256,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
|
||||
"html_url": "https:\/\/github.com\/raheel0x01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/raheel0x01\/CVE-2022-34265-modified",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-09T10:25:48Z",
|
||||
"updated_at": "2022-09-01T18:03:42Z",
|
||||
"pushed_at": "2022-09-01T18:01:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 513523694,
|
||||
"name": "CVE-2022-34265",
|
||||
|
|
15
README.md
15
README.md
|
@ -1578,7 +1578,7 @@ Denial of Service (DoS) in the Z-Wave S0 NonceGet protocol specification in Sili
|
|||
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
|
||||
</code>
|
||||
|
||||
- [JacobEbben/CVE-2022-24637](https://github.com/JacobEbben/CVE-2022-24637)
|
||||
- [Lay0us1/CVE-2022-24637](https://github.com/Lay0us1/CVE-2022-24637)
|
||||
|
||||
### CVE-2022-24644 (2022-03-07)
|
||||
|
||||
|
@ -1803,6 +1803,14 @@ An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel be
|
|||
|
||||
- [szymonh/d-os-descriptor](https://github.com/szymonh/d-os-descriptor)
|
||||
|
||||
### CVE-2022-25260 (2022-02-25)
|
||||
|
||||
<code>
|
||||
JetBrains Hub before 2021.1.14276 was vulnerable to blind Server-Side Request Forgery (SSRF).
|
||||
</code>
|
||||
|
||||
- [yuriisanin/CVE-2022-25260](https://github.com/yuriisanin/CVE-2022-25260)
|
||||
|
||||
### CVE-2022-25262 (2022-02-25)
|
||||
|
||||
<code>
|
||||
|
@ -3194,7 +3202,6 @@ An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Tr
|
|||
</code>
|
||||
|
||||
- [aeyesec/CVE-2022-34265](https://github.com/aeyesec/CVE-2022-34265)
|
||||
- [raheel0x01/CVE-2022-34265-modified](https://github.com/raheel0x01/CVE-2022-34265-modified)
|
||||
- [traumatising/CVE-2022-34265](https://github.com/traumatising/CVE-2022-34265)
|
||||
- [ZhaoQi99/CVE-2022-34265](https://github.com/ZhaoQi99/CVE-2022-34265)
|
||||
|
||||
|
@ -3348,7 +3355,7 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit
|
|||
### CVE-2022-37177 (2022-08-29)
|
||||
|
||||
<code>
|
||||
HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm.
|
||||
** DISPUTED ** HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. NOTE: the is disputed by the vendor for multiple reasons, e.g., it is inconsistent with CVE ID assignment rules for cloud services and no product with version V1.0 exists.
|
||||
</code>
|
||||
|
||||
- [JC175/CVE-2022-37177](https://github.com/JC175/CVE-2022-37177)
|
||||
|
@ -4541,6 +4548,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
|
|||
- [Silencecyber/cve-2021-4034](https://github.com/Silencecyber/cve-2021-4034)
|
||||
- [Geni0r/cve-2021-4034-poc](https://github.com/Geni0r/cve-2021-4034-poc)
|
||||
- [Naughty-SEC/pkexec-shell-executor](https://github.com/Naughty-SEC/pkexec-shell-executor)
|
||||
- [1337Rin/CVE-2021-4034](https://github.com/1337Rin/CVE-2021-4034)
|
||||
|
||||
### CVE-2021-4043 (2022-02-04)
|
||||
|
||||
|
@ -7384,7 +7392,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)
|
||||
- [alpacamybags118/log4j-cve-2021-44228-sample](https://github.com/alpacamybags118/log4j-cve-2021-44228-sample)
|
||||
- [roticagas/CVE-2021-44228-Demo](https://github.com/roticagas/CVE-2021-44228-Demo)
|
||||
- [Woahd/log4j-urlscanner](https://github.com/Woahd/log4j-urlscanner)
|
||||
- [faisalfs10x/Log4j2-CVE-2021-44228-revshell](https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell)
|
||||
- [0xInfection/LogMePwn](https://github.com/0xInfection/LogMePwn)
|
||||
- [codiobert/log4j-scanner](https://github.com/codiobert/log4j-scanner)
|
||||
|
|
Loading…
Reference in a new issue