Auto Update 2022/07/24 00:15:52

This commit is contained in:
motikan2010-bot 2022-07-24 09:15:52 +09:00
parent b6e23d0bfb
commit 61b032b9a7
20 changed files with 87 additions and 87 deletions

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept code for CVE-2015-0345 (APSB15-07)", "description": "Proof of Concept code for CVE-2015-0345 (APSB15-07)",
"fork": false, "fork": false,
"created_at": "2015-06-11T10:27:49Z", "created_at": "2015-06-11T10:27:49Z",
"updated_at": "2022-07-20T12:16:08Z", "updated_at": "2022-07-23T23:41:36Z",
"pushed_at": "2015-06-12T04:54:51Z", "pushed_at": "2015-06-12T04:54:51Z",
"stargazers_count": 20, "stargazers_count": 21,
"watchers_count": 20, "watchers_count": 21,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 20, "watchers": 21,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12", "description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
"fork": false, "fork": false,
"created_at": "2018-03-12T16:44:12Z", "created_at": "2018-03-12T16:44:12Z",
"updated_at": "2022-07-15T08:52:36Z", "updated_at": "2022-07-23T23:37:22Z",
"pushed_at": "2018-03-12T16:50:20Z", "pushed_at": "2018-03-12T16:50:20Z",
"stargazers_count": 77, "stargazers_count": 78,
"watchers_count": 77, "watchers_count": 78,
"forks_count": 28, "forks_count": 28,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -24,7 +24,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 28, "forks": 28,
"watchers": 77, "watchers": 78,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,13 +17,13 @@
"pushed_at": "2018-07-17T09:02:34Z", "pushed_at": "2018-07-17T09:02:34Z",
"stargazers_count": 49, "stargazers_count": 49,
"watchers_count": 49, "watchers_count": 49,
"forks_count": 12, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 13,
"watchers": 49, "watchers": 49,
"score": 0 "score": 0
} }

View file

@ -17,13 +17,13 @@
"pushed_at": "2020-04-12T21:11:16Z", "pushed_at": "2020-04-12T21:11:16Z",
"stargazers_count": 10, "stargazers_count": 10,
"watchers_count": 10, "watchers_count": 10,
"forks_count": 18, "forks_count": 19,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 18, "forks": 19,
"watchers": 10, "watchers": 10,
"score": 0 "score": 0
}, },

View file

@ -41,10 +41,10 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif", "description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false, "fork": false,
"created_at": "2019-10-04T14:43:57Z", "created_at": "2019-10-04T14:43:57Z",
"updated_at": "2022-07-22T04:08:54Z", "updated_at": "2022-07-23T21:58:18Z",
"pushed_at": "2019-11-30T10:28:01Z", "pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 180, "stargazers_count": 181,
"watchers_count": 180, "watchers_count": 181,
"forks_count": 100, "forks_count": 100,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -52,7 +52,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 100, "forks": 100,
"watchers": 180, "watchers": 181,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-07-11T05:31:21Z", "pushed_at": "2022-07-11T05:31:21Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"forks_count": 5, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 6,
"watchers": 4, "watchers": 4,
"score": 0 "score": 0
} }

View file

@ -101,13 +101,13 @@
"pushed_at": "2020-11-03T09:45:24Z", "pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 943, "stargazers_count": 943,
"watchers_count": 943, "watchers_count": 943,
"forks_count": 262, "forks_count": 263,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 262, "forks": 263,
"watchers": 943, "watchers": 943,
"score": 0 "score": 0
}, },
@ -125,10 +125,10 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon", "description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:57:49Z", "created_at": "2020-09-14T16:57:49Z",
"updated_at": "2022-07-23T11:48:12Z", "updated_at": "2022-07-23T21:28:41Z",
"pushed_at": "2020-11-05T16:37:20Z", "pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 314, "stargazers_count": 315,
"watchers_count": 314, "watchers_count": 315,
"forks_count": 55, "forks_count": 55,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -143,7 +143,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 55, "forks": 55,
"watchers": 314, "watchers": 315,
"score": 0 "score": 0
}, },
{ {

View file

@ -45,13 +45,13 @@
"pushed_at": "2021-07-20T15:28:13Z", "pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1585, "stargazers_count": 1585,
"watchers_count": 1585, "watchers_count": 1585,
"forks_count": 572, "forks_count": 573,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 572, "forks": 573,
"watchers": 1585, "watchers": 1585,
"score": 0 "score": 0
}, },

View file

@ -75,10 +75,10 @@
"description": "CVE-2021-4034 1day", "description": "CVE-2021-4034 1day",
"fork": false, "fork": false,
"created_at": "2022-01-25T23:51:37Z", "created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-07-23T16:37:53Z", "updated_at": "2022-07-23T19:52:06Z",
"pushed_at": "2022-06-08T04:00:28Z", "pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1616, "stargazers_count": 1617,
"watchers_count": 1616, "watchers_count": 1617,
"forks_count": 475, "forks_count": 475,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -86,7 +86,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 475, "forks": 475,
"watchers": 1616, "watchers": 1617,
"score": 0 "score": 0
}, },
{ {
@ -906,10 +906,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2022-01-26T14:26:10Z", "created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-07-23T03:58:48Z", "updated_at": "2022-07-23T19:52:04Z",
"pushed_at": "2022-06-21T14:52:05Z", "pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 567, "stargazers_count": 568,
"watchers_count": 567, "watchers_count": 568,
"forks_count": 116, "forks_count": 116,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -919,7 +919,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 116, "forks": 116,
"watchers": 567, "watchers": 568,
"score": 0 "score": 0
}, },
{ {

View file

@ -97,10 +97,10 @@
"description": "Remote Code Injection In Log4j", "description": "Remote Code Injection In Log4j",
"fork": false, "fork": false,
"created_at": "2021-12-10T05:23:44Z", "created_at": "2021-12-10T05:23:44Z",
"updated_at": "2022-07-18T14:36:20Z", "updated_at": "2022-07-23T19:52:46Z",
"pushed_at": "2022-01-18T12:01:52Z", "pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 385, "stargazers_count": 386,
"watchers_count": 385, "watchers_count": 386,
"forks_count": 120, "forks_count": 120,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -108,7 +108,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 120, "forks": 120,
"watchers": 385, "watchers": 386,
"score": 0 "score": 0
}, },
{ {
@ -254,7 +254,7 @@
"pushed_at": "2022-06-28T17:00:53Z", "pushed_at": "2022-06-28T17:00:53Z",
"stargazers_count": 998, "stargazers_count": 998,
"watchers_count": 998, "watchers_count": 998,
"forks_count": 442, "forks_count": 443,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -262,7 +262,7 @@
"log4shell" "log4shell"
], ],
"visibility": "public", "visibility": "public",
"forks": 442, "forks": 443,
"watchers": 998, "watchers": 998,
"score": 0 "score": 0
}, },
@ -709,11 +709,11 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false, "fork": false,
"created_at": "2021-12-11T07:19:11Z", "created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-07-23T07:30:58Z", "updated_at": "2022-07-23T20:13:05Z",
"pushed_at": "2022-06-02T02:16:13Z", "pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 449, "stargazers_count": 450,
"watchers_count": 449, "watchers_count": 450,
"forks_count": 93, "forks_count": 94,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -724,8 +724,8 @@
"log4jshell" "log4jshell"
], ],
"visibility": "public", "visibility": "public",
"forks": 93, "forks": 94,
"watchers": 449, "watchers": 450,
"score": 0 "score": 0
}, },
{ {
@ -1987,7 +1987,7 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false, "fork": false,
"created_at": "2021-12-13T03:57:50Z", "created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-07-23T06:52:11Z", "updated_at": "2022-07-23T18:48:33Z",
"pushed_at": "2022-07-20T08:14:48Z", "pushed_at": "2022-07-20T08:14:48Z",
"stargazers_count": 2980, "stargazers_count": 2980,
"watchers_count": 2980, "watchers_count": 2980,
@ -2662,14 +2662,14 @@
{ {
"id": 437965181, "id": 437965181,
"name": "log4j2-prosecutor", "name": "log4j2-prosecutor",
"full_name": "trevalkov\/log4j2-prosecutor", "full_name": "rodfer0x80\/log4j2-prosecutor",
"owner": { "owner": {
"login": "trevalkov", "login": "rodfer0x80",
"id": 52704508, "id": 52704508,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52704508?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52704508?v=4",
"html_url": "https:\/\/github.com\/trevalkov" "html_url": "https:\/\/github.com\/rodfer0x80"
}, },
"html_url": "https:\/\/github.com\/trevalkov\/log4j2-prosecutor", "html_url": "https:\/\/github.com\/rodfer0x80\/log4j2-prosecutor",
"description": "CVE-2021-44228", "description": "CVE-2021-44228",
"fork": false, "fork": false,
"created_at": "2021-12-13T17:32:26Z", "created_at": "2021-12-13T17:32:26Z",

View file

@ -14,16 +14,16 @@
"fork": false, "fork": false,
"created_at": "2022-03-16T06:41:50Z", "created_at": "2022-03-16T06:41:50Z",
"updated_at": "2022-07-11T04:01:18Z", "updated_at": "2022-07-11T04:01:18Z",
"pushed_at": "2022-03-16T06:48:01Z", "pushed_at": "2022-07-23T23:14:02Z",
"stargazers_count": 56, "stargazers_count": 56,
"watchers_count": 56, "watchers_count": 56,
"forks_count": 20, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 21,
"watchers": 56, "watchers": 56,
"score": 0 "score": 0
}, },

View file

@ -89,10 +89,10 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false, "fork": false,
"created_at": "2022-01-17T02:28:50Z", "created_at": "2022-01-17T02:28:50Z",
"updated_at": "2022-07-23T12:34:54Z", "updated_at": "2022-07-23T19:52:20Z",
"pushed_at": "2022-01-20T02:07:59Z", "pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 364, "stargazers_count": 365,
"watchers_count": 364, "watchers_count": 365,
"forks_count": 99, "forks_count": 99,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -100,7 +100,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 99, "forks": 99,
"watchers": 364, "watchers": 365,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"", "description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false, "fork": false,
"created_at": "2022-02-26T20:37:42Z", "created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-07-20T15:02:25Z", "updated_at": "2022-07-23T20:02:04Z",
"pushed_at": "2022-02-26T20:45:19Z", "pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 277, "stargazers_count": 278,
"watchers_count": 277, "watchers_count": 278,
"forks_count": 61, "forks_count": 61,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 61, "forks": 61,
"watchers": 277, "watchers": 278,
"score": 0 "score": 0
}, },
{ {

View file

@ -74,10 +74,10 @@
"description": "CVE-2022-22978 POC Project", "description": "CVE-2022-22978 POC Project",
"fork": false, "fork": false,
"created_at": "2022-07-13T12:38:26Z", "created_at": "2022-07-13T12:38:26Z",
"updated_at": "2022-07-16T02:57:20Z", "updated_at": "2022-07-23T21:14:00Z",
"pushed_at": "2022-07-14T02:21:13Z", "pushed_at": "2022-07-14T02:21:13Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -85,7 +85,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 2, "watchers": 3,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false, "fork": false,
"created_at": "2022-05-31T07:44:01Z", "created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-07-23T17:23:02Z", "updated_at": "2022-07-24T00:13:58Z",
"pushed_at": "2022-07-20T12:42:06Z", "pushed_at": "2022-07-20T12:42:06Z",
"stargazers_count": 492, "stargazers_count": 495,
"watchers_count": 492, "watchers_count": 495,
"forks_count": 84, "forks_count": 84,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -44,7 +44,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 84, "forks": 84,
"watchers": 492, "watchers": 495,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Atlassian Questions Hardcoded Password (CVE-2022-26138)", "description": "Atlassian Questions Hardcoded Password (CVE-2022-26138)",
"fork": false, "fork": false,
"created_at": "2022-07-21T09:28:06Z", "created_at": "2022-07-21T09:28:06Z",
"updated_at": "2022-07-23T15:01:00Z", "updated_at": "2022-07-23T19:36:18Z",
"pushed_at": "2022-07-21T09:48:55Z", "pushed_at": "2022-07-21T09:48:55Z",
"stargazers_count": 16, "stargazers_count": 18,
"watchers_count": 16, "watchers_count": 18,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 16, "watchers": 18,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,8 +13,8 @@
"description": "PoC for CVE-202230507", "description": "PoC for CVE-202230507",
"fork": false, "fork": false,
"created_at": "2022-07-16T15:55:28Z", "created_at": "2022-07-16T15:55:28Z",
"updated_at": "2022-07-16T21:43:48Z", "updated_at": "2022-07-23T23:27:20Z",
"pushed_at": "2022-07-16T17:57:19Z", "pushed_at": "2022-07-23T22:36:39Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6", "description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6",
"fork": false, "fork": false,
"created_at": "2022-07-21T13:09:50Z", "created_at": "2022-07-21T13:09:50Z",
"updated_at": "2022-07-23T16:57:28Z", "updated_at": "2022-07-24T00:16:32Z",
"pushed_at": "2022-07-21T13:44:32Z", "pushed_at": "2022-07-21T13:44:32Z",
"stargazers_count": 50, "stargazers_count": 53,
"watchers_count": 50, "watchers_count": 53,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -24,7 +24,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 50, "watchers": 53,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,18 +13,18 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2022-07-19T12:46:45Z", "created_at": "2022-07-19T12:46:45Z",
"updated_at": "2022-07-23T17:42:37Z", "updated_at": "2022-07-23T21:50:39Z",
"pushed_at": "2022-07-20T08:00:18Z", "pushed_at": "2022-07-20T08:00:18Z",
"stargazers_count": 122, "stargazers_count": 130,
"watchers_count": 122, "watchers_count": 130,
"forks_count": 15, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 16,
"watchers": 122, "watchers": 130,
"score": 0 "score": 0
}, },
{ {

View file

@ -6768,7 +6768,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod) - [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod)
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell) - [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228) - [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
- [trevalkov/log4j2-prosecutor](https://github.com/trevalkov/log4j2-prosecutor) - [rodfer0x80/log4j2-prosecutor](https://github.com/rodfer0x80/log4j2-prosecutor)
- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell) - [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker) - [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs) - [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs)