[ { "id": 436666301, "name": "CVE-2021-44228-Apache-Log4j-Rce", "full_name": "tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce", "owner": { "login": "tangxiaofeng7", "id": 45926593, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4", "html_url": "https:\/\/github.com\/tangxiaofeng7", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce", "description": "Apache Log4j 远程代码执行", "fork": false, "created_at": "2021-12-09T15:27:38Z", "updated_at": "2025-01-04T23:49:10Z", "pushed_at": "2023-05-14T04:54:32Z", "stargazers_count": 77, "watchers_count": 77, "has_discussions": false, "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 26, "watchers": 77, "score": 0, "subscribers_count": 2 }, { "id": 436771097, "name": "Healer", "full_name": "Glease\/Healer", "owner": { "login": "Glease", "id": 4586901, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4586901?v=4", "html_url": "https:\/\/github.com\/Glease", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Glease\/Healer", "description": "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2", "fork": false, "created_at": "2021-12-09T21:49:33Z", "updated_at": "2025-01-12T00:24:04Z", "pushed_at": "2023-01-27T17:34:36Z", "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 18, "score": 0, "subscribers_count": 2 }, { "id": 436798675, "name": "L4J-Vuln-Patch", "full_name": "jacobtread\/L4J-Vuln-Patch", "owner": { "login": "jacobtread", "id": 33708767, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33708767?v=4", "html_url": "https:\/\/github.com\/jacobtread", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jacobtread\/L4J-Vuln-Patch", "description": "This tool patches the CVE-2021-44228 Log4J vulnerability present in all minecraft versions NOTE THIS TOOL MUST BE RE-RUN after downloading or updating versions of minecraft as its not a perminent patch", "fork": false, "created_at": "2021-12-10T00:14:06Z", "updated_at": "2023-08-17T23:00:04Z", "pushed_at": "2021-12-15T03:10:47Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 436860437, "name": "Log4j2-CVE-2021-44228", "full_name": "jas502n\/Log4j2-CVE-2021-44228", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jas502n\/Log4j2-CVE-2021-44228", "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", "updated_at": "2025-01-08T03:40:14Z", "pushed_at": "2022-01-18T12:01:52Z", "stargazers_count": 462, "watchers_count": 462, "has_discussions": false, "forks_count": 121, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 121, "watchers": 462, "score": 0, "subscribers_count": 8 }, { "id": 436871682, "name": "Log4J-RCE-Proof-Of-Concept", "full_name": "HyCraftHD\/Log4J-RCE-Proof-Of-Concept", "owner": { "login": "HyCraftHD", "id": 7681220, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7681220?v=4", "html_url": "https:\/\/github.com\/HyCraftHD", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HyCraftHD\/Log4J-RCE-Proof-Of-Concept", "description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information", "fork": false, "created_at": "2021-12-10T06:15:38Z", "updated_at": "2024-08-12T20:18:43Z", "pushed_at": "2021-12-16T01:33:48Z", "stargazers_count": 179, "watchers_count": 179, "has_discussions": false, "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2021-44228", "cves", "exploit", "log4j", "log4j2", "minecraft" ], "visibility": "public", "forks": 31, "watchers": 179, "score": 0, "subscribers_count": 6 }, { "id": 436877979, "name": "cloudrasp-log4j2", "full_name": "boundaryx\/cloudrasp-log4j2", "owner": { "login": "boundaryx", "id": 95878655, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95878655?v=4", "html_url": "https:\/\/github.com\/boundaryx", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/boundaryx\/cloudrasp-log4j2", "description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.", "fork": false, "created_at": "2021-12-10T06:42:37Z", "updated_at": "2024-10-15T07:29:44Z", "pushed_at": "2021-12-11T02:49:41Z", "stargazers_count": 122, "watchers_count": 122, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "defense", "hardening", "java", "log4j", "log4j2", "protection", "rasp", "rce", "security", "security-tools", "vulnerability" ], "visibility": "public", "forks": 20, "watchers": 122, "score": 0, "subscribers_count": 6 }, { "id": 436881928, "name": "CVE-2021-44228", "full_name": "dbgee\/CVE-2021-44228", "owner": { "login": "dbgee", "id": 46910972, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46910972?v=4", "html_url": "https:\/\/github.com\/dbgee", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dbgee\/CVE-2021-44228", "description": "Apache Log4j 2 a remote code execution vulnerability via the ldap JNDI parser.", "fork": false, "created_at": "2021-12-10T06:59:10Z", "updated_at": "2022-11-09T18:14:39Z", "pushed_at": "2022-01-19T09:58:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 436918458, "name": "Log4jPatcher", "full_name": "CreeperHost\/Log4jPatcher", "owner": { "login": "CreeperHost", "id": 7502613, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7502613?v=4", "html_url": "https:\/\/github.com\/CreeperHost", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CreeperHost\/Log4jPatcher", "description": "A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)", "fork": false, "created_at": "2021-12-10T09:16:46Z", "updated_at": "2024-06-28T10:26:36Z", "pushed_at": "2022-11-10T11:16:17Z", "stargazers_count": 47, "watchers_count": 47, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "log4j2", "log4shell" ], "visibility": "public", "forks": 6, "watchers": 47, "score": 0, "subscribers_count": 3 }, { "id": 436919597, "name": "RCE", "full_name": "DragonSurvivalEU\/RCE", "owner": { "login": "DragonSurvivalEU", "id": 92676019, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92676019?v=4", "html_url": "https:\/\/github.com\/DragonSurvivalEU", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DragonSurvivalEU\/RCE", "description": "CVE-2021-44228 fix", "fork": false, "created_at": "2021-12-10T09:20:40Z", "updated_at": "2024-08-12T20:18:43Z", "pushed_at": "2021-12-20T00:38:10Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 436933689, "name": "Log4jPatch", "full_name": "simonis\/Log4jPatch", "owner": { "login": "simonis", "id": 3178197, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3178197?v=4", "html_url": "https:\/\/github.com\/simonis", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/simonis\/Log4jPatch", "description": "Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process", "fork": false, "created_at": "2021-12-10T10:10:19Z", "updated_at": "2024-06-06T03:59:54Z", "pushed_at": "2021-12-12T10:33:02Z", "stargazers_count": 108, "watchers_count": 108, "has_discussions": false, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 108, "score": 0, "subscribers_count": 4 }, { "id": 436973468, "name": "CVE-2021-44228-Test-Server", "full_name": "zlepper\/CVE-2021-44228-Test-Server", "owner": { "login": "zlepper", "id": 1499810, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1499810?v=4", "html_url": "https:\/\/github.com\/zlepper", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zlepper\/CVE-2021-44228-Test-Server", "description": "A small server for verifing if a given java program is succeptibel to CVE-2021-44228", "fork": false, "created_at": "2021-12-10T12:35:30Z", "updated_at": "2023-08-04T05:22:46Z", "pushed_at": "2021-12-10T12:39:25Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 436974241, "name": "log4shell-vulnerable-app", "full_name": "christophetd\/log4shell-vulnerable-app", "owner": { "login": "christophetd", "id": 136675, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4", "html_url": "https:\/\/github.com\/christophetd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app", "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-10T12:38:20Z", "updated_at": "2025-01-15T10:51:26Z", "pushed_at": "2024-04-26T03:16:26Z", "stargazers_count": 1113, "watchers_count": 1113, "has_discussions": false, "forks_count": 536, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "log4shell" ], "visibility": "public", "forks": 536, "watchers": 1113, "score": 0, "subscribers_count": 23 }, { "id": 437005376, "name": "log4jcheck", "full_name": "NorthwaveSecurity\/log4jcheck", "owner": { "login": "NorthwaveSecurity", "id": 44571169, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44571169?v=4", "html_url": "https:\/\/github.com\/NorthwaveSecurity", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NorthwaveSecurity\/log4jcheck", "description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.", "fork": false, "created_at": "2021-12-10T14:22:49Z", "updated_at": "2024-11-22T12:39:18Z", "pushed_at": "2021-12-14T15:16:15Z", "stargazers_count": 125, "watchers_count": 125, "has_discussions": false, "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "checker", "cve-2021-44228", "log4j", "log4shell", "rce", "scanner" ], "visibility": "public", "forks": 26, "watchers": 125, "score": 0, "subscribers_count": 7 }, { "id": 437026730, "name": "VictimApp", "full_name": "nkoneko\/VictimApp", "owner": { "login": "nkoneko", "id": 1922341, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4", "html_url": "https:\/\/github.com\/nkoneko", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nkoneko\/VictimApp", "description": "Vulnerable to CVE-2021-44228. trustURLCodebase is not required.", "fork": false, "created_at": "2021-12-10T15:32:03Z", "updated_at": "2022-11-09T18:14:41Z", "pushed_at": "2021-12-10T22:40:15Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 437031223, "name": "pulsar-docker-images-patch-CVE-2021-44228", "full_name": "lhotari\/pulsar-docker-images-patch-CVE-2021-44228", "owner": { "login": "lhotari", "id": 66864, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4", "html_url": "https:\/\/github.com\/lhotari", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lhotari\/pulsar-docker-images-patch-CVE-2021-44228", "description": "Patch Pulsar Docker images with Log4J 2.17.1 update to mitigate Apache Log4J Security Vulnerabilities including Log4Shell", "fork": false, "created_at": "2021-12-10T15:46:49Z", "updated_at": "2024-08-24T16:05:13Z", "pushed_at": "2022-01-13T06:40:43Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "docker", "log4shell" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 3 }, { "id": 437034295, "name": "Apache-Log4j2-RCE", "full_name": "1in9e\/Apache-Log4j2-RCE", "owner": { "login": "1in9e", "id": 15817052, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15817052?v=4", "html_url": "https:\/\/github.com\/1in9e", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/1in9e\/Apache-Log4j2-RCE", "description": "Apache Log4j2 RCE( CVE-2021-44228)验证环境", "fork": false, "created_at": "2021-12-10T15:57:14Z", "updated_at": "2024-08-12T20:18:44Z", "pushed_at": "2021-12-10T15:58:25Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "bugbounty", "cve-2021-44228", "java", "log4j2", "rce", "security" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 437056774, "name": "CVE-2021-44228-example", "full_name": "KosmX\/CVE-2021-44228-example", "owner": { "login": "KosmX", "id": 15692868, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15692868?v=4", "html_url": "https:\/\/github.com\/KosmX", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KosmX\/CVE-2021-44228-example", "description": "vulnerability POC", "fork": false, "created_at": "2021-12-10T17:13:18Z", "updated_at": "2023-08-15T12:50:54Z", "pushed_at": "2021-12-17T17:16:30Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2021-44228", "rce" ], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 2 }, { "id": 437060009, "name": "CVE-2021-44228", "full_name": "greymd\/CVE-2021-44228", "owner": { "login": "greymd", "id": 3874767, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4", "html_url": "https:\/\/github.com\/greymd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/greymd\/CVE-2021-44228", "description": "Vulnerability CVE-2021-44228 checker", "fork": false, "created_at": "2021-12-10T17:24:47Z", "updated_at": "2024-08-12T20:18:44Z", "pushed_at": "2021-12-13T15:16:23Z", "stargazers_count": 35, "watchers_count": 35, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 35, "score": 0, "subscribers_count": 2 }, { "id": 437071396, "name": "CVE-2021-44228-Log4Shell-Hashes", "full_name": "mubix\/CVE-2021-44228-Log4Shell-Hashes", "owner": { "login": "mubix", "id": 679319, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/679319?v=4", "html_url": "https:\/\/github.com\/mubix", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mubix\/CVE-2021-44228-Log4Shell-Hashes", "description": "Hashes for vulnerable LOG4J versions", "fork": false, "created_at": "2021-12-10T18:06:06Z", "updated_at": "2025-01-06T02:36:36Z", "pushed_at": "2021-12-17T17:02:24Z", "stargazers_count": 153, "watchers_count": 153, "has_discussions": false, "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 35, "watchers": 153, "score": 0, "subscribers_count": 14 }, { "id": 437091396, "name": "mc-log4j-patcher", "full_name": "OopsieWoopsie\/mc-log4j-patcher", "owner": { "login": "OopsieWoopsie", "id": 15069175, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15069175?v=4", "html_url": "https:\/\/github.com\/OopsieWoopsie", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/OopsieWoopsie\/mc-log4j-patcher", "description": "CVE-2021-44228 server-side fix for minecraft servers.", "fork": false, "created_at": "2021-12-10T19:25:31Z", "updated_at": "2023-11-08T22:32:59Z", "pushed_at": "2021-12-10T19:47:45Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "fix", "log4j2", "minecraft", "paper", "spigot" ], "visibility": "public", "forks": 1, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 437097787, "name": "CVE-2021-44228-kusto", "full_name": "wheez-y\/CVE-2021-44228-kusto", "owner": { "login": "wheez-y", "id": 77060088, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77060088?v=4", "html_url": "https:\/\/github.com\/wheez-y", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wheez-y\/CVE-2021-44228-kusto", "description": null, "fork": false, "created_at": "2021-12-10T19:53:32Z", "updated_at": "2021-12-10T19:55:16Z", "pushed_at": "2021-12-10T19:55:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437108119, "name": "log4shell-mitigation", "full_name": "izzyacademy\/log4shell-mitigation", "owner": { "login": "izzyacademy", "id": 44282278, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44282278?v=4", "html_url": "https:\/\/github.com\/izzyacademy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/izzyacademy\/log4shell-mitigation", "description": "Mitigation for Log4Shell Security Vulnerability CVE-2021-44228 ", "fork": false, "created_at": "2021-12-10T20:39:56Z", "updated_at": "2021-12-11T16:21:03Z", "pushed_at": "2021-12-11T16:21:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437116864, "name": "CVE-2021-44228-poc", "full_name": "Kadantte\/CVE-2021-44228-poc", "owner": { "login": "Kadantte", "id": 11579313, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11579313?v=4", "html_url": "https:\/\/github.com\/Kadantte", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Kadantte\/CVE-2021-44228-poc", "description": "log4shell sample application (CVE-2021-44228)", "fork": false, "created_at": "2021-12-10T21:20:05Z", "updated_at": "2021-12-10T21:20:06Z", "pushed_at": "2021-12-10T21:15:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437122153, "name": "log4j-detect", "full_name": "takito1812\/log4j-detect", "owner": { "login": "takito1812", "id": 56491288, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56491288?v=4", "html_url": "https:\/\/github.com\/takito1812", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/takito1812\/log4j-detect", "description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading", "fork": false, "created_at": "2021-12-10T21:46:18Z", "updated_at": "2024-10-27T02:07:47Z", "pushed_at": "2021-12-13T22:27:25Z", "stargazers_count": 195, "watchers_count": 195, "has_discussions": false, "forks_count": 57, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 57, "watchers": 195, "score": 0, "subscribers_count": 6 }, { "id": 437124793, "name": "log4noshell", "full_name": "winnpixie\/log4noshell", "owner": { "login": "winnpixie", "id": 31022473, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4", "html_url": "https:\/\/github.com\/winnpixie", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/winnpixie\/log4noshell", "description": "A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 (\"Log4Shell\").", "fork": false, "created_at": "2021-12-10T21:59:31Z", "updated_at": "2024-10-30T09:59:36Z", "pushed_at": "2024-10-30T09:59:33Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "cve", "log4j", "patch", "security", "vulnerability" ], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 437128632, "name": "CVE-2021-44228-DFIR-Notes", "full_name": "Azeemering\/CVE-2021-44228-DFIR-Notes", "owner": { "login": "Azeemering", "id": 31852867, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31852867?v=4", "html_url": "https:\/\/github.com\/Azeemering", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Azeemering\/CVE-2021-44228-DFIR-Notes", "description": "CVE-2021-44228 DFIR Notes", "fork": false, "created_at": "2021-12-10T22:19:16Z", "updated_at": "2024-08-12T20:18:45Z", "pushed_at": "2021-12-14T12:15:16Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 7, "score": 0, "subscribers_count": 3 }, { "id": 437131550, "name": "CVE-2021-44228-PoC-log4j-bypass-words", "full_name": "Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words", "owner": { "login": "Puliczek", "id": 12344862, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12344862?v=4", "html_url": "https:\/\/github.com\/Puliczek", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words", "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", "updated_at": "2025-01-14T03:16:00Z", "pushed_at": "2022-01-15T16:18:44Z", "stargazers_count": 935, "watchers_count": 935, "has_discussions": false, "forks_count": 141, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bugbounttips", "bugbounty", "bugbounty-writeups", "cve", "cve-2021-44228", "cve-2021-45046", "cve-2021-45105", "cybersecurity", "exploit", "hacking", "log4j", "payload", "pentest", "pentesting", "poc", "red-team", "security", "security-writeups", "writeups" ], "visibility": "public", "forks": 141, "watchers": 935, "score": 0, "subscribers_count": 25 }, { "id": 437139341, "name": "log4j-shell-poc", "full_name": "kozmer\/log4j-shell-poc", "owner": { "login": "kozmer", "id": 87979263, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4", "html_url": "https:\/\/github.com\/kozmer", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kozmer\/log4j-shell-poc", "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", "updated_at": "2025-01-13T14:46:25Z", "pushed_at": "2024-02-12T22:37:25Z", "stargazers_count": 1815, "watchers_count": 1815, "has_discussions": false, "forks_count": 530, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "java", "log4j", "security" ], "visibility": "public", "forks": 530, "watchers": 1815, "score": 0, "subscribers_count": 26 }, { "id": 437141854, "name": "cve-2021-44228-workaround-buildpack", "full_name": "alexandreroman\/cve-2021-44228-workaround-buildpack", "owner": { "login": "alexandreroman", "id": 665131, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/665131?v=4", "html_url": "https:\/\/github.com\/alexandreroman", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alexandreroman\/cve-2021-44228-workaround-buildpack", "description": "Buildpack providing a workaround for CVE-2021-44228 (Log4j RCE exploit)", "fork": false, "created_at": "2021-12-10T23:34:52Z", "updated_at": "2022-10-06T19:08:01Z", "pushed_at": "2021-12-10T23:47:14Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 3 }, { "id": 437141974, "name": "minecraft-log4j-honeypot", "full_name": "Adikso\/minecraft-log4j-honeypot", "owner": { "login": "Adikso", "id": 1407751, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1407751?v=4", "html_url": "https:\/\/github.com\/Adikso", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Adikso\/minecraft-log4j-honeypot", "description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam", "fork": false, "created_at": "2021-12-10T23:35:31Z", "updated_at": "2024-09-02T19:21:15Z", "pushed_at": "2021-12-14T13:43:35Z", "stargazers_count": 101, "watchers_count": 101, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "exploit", "log4j", "minecraft" ], "visibility": "public", "forks": 20, "watchers": 101, "score": 0, "subscribers_count": 3 }, { "id": 437142312, "name": "CVE-2021-44228", "full_name": "racoon-rac\/CVE-2021-44228", "owner": { "login": "racoon-rac", "id": 64579294, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4", "html_url": "https:\/\/github.com\/racoon-rac", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-10T23:37:55Z", "updated_at": "2021-12-11T01:11:19Z", "pushed_at": "2023-08-29T19:02:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437142703, "name": "CVE-2021-44228-PoC", "full_name": "TheArqsz\/CVE-2021-44228-PoC", "owner": { "login": "TheArqsz", "id": 38382850, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38382850?v=4", "html_url": "https:\/\/github.com\/TheArqsz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TheArqsz\/CVE-2021-44228-PoC", "description": null, "fork": false, "created_at": "2021-12-10T23:40:39Z", "updated_at": "2021-12-17T15:29:24Z", "pushed_at": "2021-12-17T15:29:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 437155858, "name": "log4shelldetect", "full_name": "1lann\/log4shelldetect", "owner": { "login": "1lann", "id": 804919, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/804919?v=4", "html_url": "https:\/\/github.com\/1lann", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/1lann\/log4shelldetect", "description": "Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or \"that Log4j JNDI exploit\" by inspecting the class paths inside files", "fork": false, "created_at": "2021-12-11T01:08:00Z", "updated_at": "2024-11-15T10:28:16Z", "pushed_at": "2022-01-05T23:07:50Z", "stargazers_count": 45, "watchers_count": 45, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "cve-2021-45046", "log4j", "log4j2", "log4shell", "scanner", "vulnerability-scanners" ], "visibility": "public", "forks": 8, "watchers": 45, "score": 0, "subscribers_count": 6 }, { "id": 437164940, "name": "Log4j2-RCE", "full_name": "binganao\/Log4j2-RCE", "owner": { "login": "binganao", "id": 70050083, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4", "html_url": "https:\/\/github.com\/binganao", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/binganao\/Log4j2-RCE", "description": "Log4j2 CVE-2021-44228 复现和回显利用", "fork": false, "created_at": "2021-12-11T02:08:41Z", "updated_at": "2021-12-27T05:55:01Z", "pushed_at": "2021-12-11T03:38:03Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 437170557, "name": "sample-ldap-exploit", "full_name": "phoswald\/sample-ldap-exploit", "owner": { "login": "phoswald", "id": 12776329, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4", "html_url": "https:\/\/github.com\/phoswald", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/phoswald\/sample-ldap-exploit", "description": "A short demo of CVE-2021-44228", "fork": false, "created_at": "2021-12-11T02:45:39Z", "updated_at": "2024-08-12T20:18:45Z", "pushed_at": "2021-12-13T09:20:35Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0, "subscribers_count": 3 }, { "id": 437174339, "name": "jndi-ldap-test-server", "full_name": "rakutentech\/jndi-ldap-test-server", "owner": { "login": "rakutentech", "id": 1415441, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1415441?v=4", "html_url": "https:\/\/github.com\/rakutentech", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rakutentech\/jndi-ldap-test-server", "description": "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.", "fork": false, "created_at": "2021-12-11T03:08:14Z", "updated_at": "2024-06-11T12:40:21Z", "pushed_at": "2021-12-13T16:17:03Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "jndi", "ldap", "log4j", "log4j2", "vulnerability-detection" ], "visibility": "public", "forks": 4, "watchers": 11, "score": 0, "subscribers_count": 6 }, { "id": 437186290, "name": "cve-2021-44228--spring-hibernate", "full_name": "uint0\/cve-2021-44228--spring-hibernate", "owner": { "login": "uint0", "id": 11325389, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4", "html_url": "https:\/\/github.com\/uint0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uint0\/cve-2021-44228--spring-hibernate", "description": "CVE-2021-44228 POC - Spring \/ Hibernate", "fork": false, "created_at": "2021-12-11T04:23:22Z", "updated_at": "2021-12-15T05:36:58Z", "pushed_at": "2021-12-11T06:25:12Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 437214791, "name": "log4j-vulnerability-patcher-agent", "full_name": "saharNooby\/log4j-vulnerability-patcher-agent", "owner": { "login": "saharNooby", "id": 10616794, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10616794?v=4", "html_url": "https:\/\/github.com\/saharNooby", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/saharNooby\/log4j-vulnerability-patcher-agent", "description": "Fixes CVE-2021-44228 in log4j by patching JndiLookup class", "fork": false, "created_at": "2021-12-11T07:16:21Z", "updated_at": "2023-06-19T16:50:28Z", "pushed_at": "2021-12-11T07:34:01Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "agent", "bytecode", "cve", "fix", "log4j", "patch" ], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 437215271, "name": "log4j2burpscanner", "full_name": "f0ng\/log4j2burpscanner", "owner": { "login": "f0ng", "id": 48286013, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4", "html_url": "https:\/\/github.com\/f0ng", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/f0ng\/log4j2burpscanner", "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", "updated_at": "2025-01-15T09:32:37Z", "pushed_at": "2023-06-13T09:17:54Z", "stargazers_count": 811, "watchers_count": 811, "has_discussions": false, "forks_count": 111, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "burp-extensions", "burp-plugin", "log4j2", "log4jshell" ], "visibility": "public", "forks": 111, "watchers": 811, "score": 0, "subscribers_count": 11 }, { "id": 437221795, "name": "CVE-2021-44228-Log4j-lookup-Rce", "full_name": "M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce", "owner": { "login": "M1ngGod", "id": 81064151, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81064151?v=4", "html_url": "https:\/\/github.com\/M1ngGod", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce", "description": null, "fork": false, "created_at": "2021-12-11T07:55:45Z", "updated_at": "2023-08-15T12:51:02Z", "pushed_at": "2021-12-11T08:07:20Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 437244092, "name": "CVE-2021-44228-Apache-Log4j-Rce", "full_name": "byteboycn\/CVE-2021-44228-Apache-Log4j-Rce", "owner": { "login": "byteboycn", "id": 14987996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14987996?v=4", "html_url": "https:\/\/github.com\/byteboycn", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/byteboycn\/CVE-2021-44228-Apache-Log4j-Rce", "description": null, "fork": false, "created_at": "2021-12-11T09:52:36Z", "updated_at": "2023-06-20T16:41:33Z", "pushed_at": "2021-12-11T09:53:39Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 437248883, "name": "log4shell-mitigation-tester", "full_name": "lhotari\/log4shell-mitigation-tester", "owner": { "login": "lhotari", "id": 66864, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4", "html_url": "https:\/\/github.com\/lhotari", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester", "description": "Log4Shell CVE-2021-44228 mitigation tester", "fork": false, "created_at": "2021-12-11T10:16:58Z", "updated_at": "2021-12-21T20:05:48Z", "pushed_at": "2021-12-13T17:24:37Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 16, "score": 0, "subscribers_count": 3 }, { "id": 437249303, "name": "log4j-rce-detect-waf-bypass", "full_name": "toramanemre\/log4j-rce-detect-waf-bypass", "owner": { "login": "toramanemre", "id": 24626967, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4", "html_url": "https:\/\/github.com\/toramanemre", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/toramanemre\/log4j-rce-detect-waf-bypass", "description": "A Nuclei Template for Apache Log4j RCE (CVE-2021-44228) Detection with WAF Bypass Payloads", "fork": false, "created_at": "2021-12-11T10:19:01Z", "updated_at": "2024-08-12T20:18:46Z", "pushed_at": "2021-12-11T10:19:51Z", "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 22, "score": 0, "subscribers_count": 3 }, { "id": 437261211, "name": "CVE-2021-44228-Scanner", "full_name": "logpresso\/CVE-2021-44228-Scanner", "owner": { "login": "logpresso", "id": 14171714, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14171714?v=4", "html_url": "https:\/\/github.com\/logpresso", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner", "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "fork": false, "created_at": "2021-12-11T11:18:46Z", "updated_at": "2025-01-11T20:21:07Z", "pushed_at": "2022-04-07T14:47:03Z", "stargazers_count": 853, "watchers_count": 853, "has_discussions": false, "forks_count": 173, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-4104", "cve-2021-42550", "cve-2021-44228", "cve-2021-44832", "cve-2021-45046", "cve-2021-45105", "cve-2022-23302", "cve-2022-23305", "cve-2022-23307", "log4j2", "patch", "scanner" ], "visibility": "public", "forks": 173, "watchers": 853, "score": 0, "subscribers_count": 33 }, { "id": 437265194, "name": "Log4j_CVE-2021-44228", "full_name": "vorburger\/Log4j_CVE-2021-44228", "owner": { "login": "vorburger", "id": 298598, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/298598?v=4", "html_url": "https:\/\/github.com\/vorburger", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vorburger\/Log4j_CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-11T11:38:16Z", "updated_at": "2024-08-12T20:18:46Z", "pushed_at": "2022-02-16T21:58:54Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": true, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 3 }, { "id": 437265792, "name": "log4j2021_vul_test", "full_name": "gauthamg\/log4j2021_vul_test", "owner": { "login": "gauthamg", "id": 8748677, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4", "html_url": "https:\/\/github.com\/gauthamg", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test", "description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228", "fork": false, "created_at": "2021-12-11T11:41:04Z", "updated_at": "2021-12-13T06:49:35Z", "pushed_at": "2021-12-13T06:49:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437273514, "name": "CVE-2021-44228-playground", "full_name": "b-abderrahmane\/CVE-2021-44228-playground", "owner": { "login": "b-abderrahmane", "id": 10504574, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10504574?v=4", "html_url": "https:\/\/github.com\/b-abderrahmane", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/b-abderrahmane\/CVE-2021-44228-playground", "description": null, "fork": false, "created_at": "2021-12-11T12:16:45Z", "updated_at": "2024-04-29T17:48:37Z", "pushed_at": "2025-01-10T17:39:32Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 3 }, { "id": 437278973, "name": "CVE-2021-44228-Advisories", "full_name": "leetxyz\/CVE-2021-44228-Advisories", "owner": { "login": "leetxyz", "id": 46599191, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46599191?v=4", "html_url": "https:\/\/github.com\/leetxyz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/leetxyz\/CVE-2021-44228-Advisories", "description": "List of company advisories log4j", "fork": false, "created_at": "2021-12-11T12:41:38Z", "updated_at": "2024-08-12T20:18:46Z", "pushed_at": "2021-12-12T09:46:17Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 437283982, "name": "log4shell", "full_name": "cado-security\/log4shell", "owner": { "login": "cado-security", "id": 63289041, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63289041?v=4", "html_url": "https:\/\/github.com\/cado-security", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cado-security\/log4shell", "description": "Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228", "fork": false, "created_at": "2021-12-11T13:03:31Z", "updated_at": "2022-03-02T21:45:15Z", "pushed_at": "2021-12-11T14:52:30Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "log4shell", "vulnerability" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 4 }, { "id": 437289885, "name": "Log4J_0day_RCE", "full_name": "WYSIIWYG\/Log4J_0day_RCE", "owner": { "login": "WYSIIWYG", "id": 95032387, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95032387?v=4", "html_url": "https:\/\/github.com\/WYSIIWYG", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WYSIIWYG\/Log4J_0day_RCE", "description": "Log4j-RCE (CVE-2021-44228) Proof of Concept", "fork": false, "created_at": "2021-12-11T13:28:52Z", "updated_at": "2024-08-12T20:18:46Z", "pushed_at": "2021-12-11T13:31:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437296454, "name": "log4j-vulnerable-app-cve-2021-44228-terraform", "full_name": "mkhazamipour\/log4j-vulnerable-app-cve-2021-44228-terraform", "owner": { "login": "mkhazamipour", "id": 23025217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23025217?v=4", "html_url": "https:\/\/github.com\/mkhazamipour", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mkhazamipour\/log4j-vulnerable-app-cve-2021-44228-terraform", "description": "A Terraform to deploy vulnerable app and a JDNIExploit to work with CVE-2021-44228", "fork": false, "created_at": "2021-12-11T13:56:28Z", "updated_at": "2022-01-25T17:42:11Z", "pushed_at": "2021-12-11T14:53:38Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 437310436, "name": "log4j-CVE-2021-44228-Public-IoCs", "full_name": "Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs", "owner": { "login": "Sh0ckFR", "id": 10033649, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10033649?v=4", "html_url": "https:\/\/github.com\/Sh0ckFR", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs", "description": "Public IoCs about log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-11T14:54:45Z", "updated_at": "2024-08-12T20:18:46Z", "pushed_at": "2021-12-17T10:14:30Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 9, "score": 0, "subscribers_count": 1 }, { "id": 437316134, "name": "log4j2-vulnerable-spring-app", "full_name": "zzzz0317\/log4j2-vulnerable-spring-app", "owner": { "login": "zzzz0317", "id": 16097046, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4", "html_url": "https:\/\/github.com\/zzzz0317", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app", "description": "CVE-2021-44228", "fork": false, "created_at": "2021-12-11T15:18:42Z", "updated_at": "2023-10-23T06:12:54Z", "pushed_at": "2021-12-13T02:14:14Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 437319619, "name": "test-44228", "full_name": "datadavev\/test-44228", "owner": { "login": "datadavev", "id": 605409, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/605409?v=4", "html_url": "https:\/\/github.com\/datadavev", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/datadavev\/test-44228", "description": "Simple demo of CVE-2021-44228", "fork": false, "created_at": "2021-12-11T15:33:17Z", "updated_at": "2021-12-11T15:42:35Z", "pushed_at": "2022-01-04T16:56:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 437323133, "name": "JndiRemover", "full_name": "LemonCraftRu\/JndiRemover", "owner": { "login": "LemonCraftRu", "id": 73554117, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73554117?v=4", "html_url": "https:\/\/github.com\/LemonCraftRu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LemonCraftRu\/JndiRemover", "description": "Небольшой мод направленный на устранение уязвимости CVE-2021-44228", "fork": false, "created_at": "2021-12-11T15:48:03Z", "updated_at": "2022-01-08T19:26:15Z", "pushed_at": "2022-02-07T20:44:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "jndi-exploit", "log4j", "minecraft-mod" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 437327955, "name": "Log4j-Rec-CVE-2021-44228", "full_name": "zhangxvx\/Log4j-Rec-CVE-2021-44228", "owner": { "login": "zhangxvx", "id": 19684449, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19684449?v=4", "html_url": "https:\/\/github.com\/zhangxvx", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zhangxvx\/Log4j-Rec-CVE-2021-44228", "description": "Apache Log4j CVE-2021-44228 漏洞复现", "fork": false, "created_at": "2021-12-11T16:08:34Z", "updated_at": "2021-12-12T03:50:45Z", "pushed_at": "2021-12-12T03:49:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437327995, "name": "Log4j-CVE-Detect", "full_name": "darkarnium\/Log4j-CVE-Detect", "owner": { "login": "darkarnium", "id": 3048394, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3048394?v=4", "html_url": "https:\/\/github.com\/darkarnium", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/darkarnium\/Log4j-CVE-Detect", "description": "Detections for CVE-2021-44228 inside of nested binaries", "fork": false, "created_at": "2021-12-11T16:08:47Z", "updated_at": "2024-08-12T20:18:47Z", "pushed_at": "2021-12-18T22:20:25Z", "stargazers_count": 34, "watchers_count": 34, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "binary", "cve-2021-44228", "cve-2021-45046", "detection", "devops", "python", "sca", "security" ], "visibility": "public", "forks": 6, "watchers": 34, "score": 0, "subscribers_count": 3 }, { "id": 437381453, "name": "CVE-2021-44228_Example", "full_name": "chilliwebs\/CVE-2021-44228_Example", "owner": { "login": "chilliwebs", "id": 6079309, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6079309?v=4", "html_url": "https:\/\/github.com\/chilliwebs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/chilliwebs\/CVE-2021-44228_Example", "description": null, "fork": false, "created_at": "2021-12-11T20:25:08Z", "updated_at": "2022-01-03T13:51:27Z", "pushed_at": "2021-12-15T20:27:59Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 437397347, "name": "f5-waf-enforce-sig-CVE-2021-44228", "full_name": "irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228", "owner": { "login": "irgoncalves", "id": 23459099, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4", "html_url": "https:\/\/github.com\/irgoncalves", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228", "description": "This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device", "fork": false, "created_at": "2021-12-11T21:59:19Z", "updated_at": "2024-04-07T21:37:20Z", "pushed_at": "2021-12-15T18:56:57Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 437407625, "name": "log4j-docker-vaccine", "full_name": "jeffbryner\/log4j-docker-vaccine", "owner": { "login": "jeffbryner", "id": 566889, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/566889?v=4", "html_url": "https:\/\/github.com\/jeffbryner", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jeffbryner\/log4j-docker-vaccine", "description": "docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228", "fork": false, "created_at": "2021-12-11T23:06:23Z", "updated_at": "2022-05-22T02:50:49Z", "pushed_at": "2021-12-12T00:15:23Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 437419010, "name": "log4j-detector", "full_name": "mergebase\/log4j-detector", "owner": { "login": "mergebase", "id": 73667397, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4", "html_url": "https:\/\/github.com\/mergebase", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mergebase\/log4j-detector", "description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC", "fork": false, "created_at": "2021-12-12T00:29:03Z", "updated_at": "2025-01-02T19:19:01Z", "pushed_at": "2022-03-10T18:44:50Z", "stargazers_count": 638, "watchers_count": 638, "has_discussions": false, "forks_count": 98, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "cve-2021-45046", "cve-2021-45105", "cybersecurity", "detector", "log4j", "log4shell", "pentest", "sca", "scanner", "vulnerability-scanner" ], "visibility": "public", "forks": 98, "watchers": 638, "score": 0, "subscribers_count": 28 }, { "id": 437426248, "name": "log4j2-rce-poc", "full_name": "unlimitedsola\/log4j2-rce-poc", "owner": { "login": "unlimitedsola", "id": 3632663, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3632663?v=4", "html_url": "https:\/\/github.com\/unlimitedsola", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/unlimitedsola\/log4j2-rce-poc", "description": "A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228\/Log4Shell).", "fork": false, "created_at": "2021-12-12T01:23:45Z", "updated_at": "2023-04-17T21:10:43Z", "pushed_at": "2021-12-12T09:59:26Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j2", "log4shell", "poc", "proof-of-concept", "rce", "remote-code-execution" ], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 437426359, "name": "log4j2burpscanner", "full_name": "Jeromeyoung\/log4j2burpscanner", "owner": { "login": "Jeromeyoung", "id": 39945364, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4", "html_url": "https:\/\/github.com\/Jeromeyoung", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Jeromeyoung\/log4j2burpscanner", "description": "CVE-2021-44228,log4j2 burp插件 Java版本,dnslog选取了非dnslog.cn域名", "fork": false, "created_at": "2021-12-12T01:24:39Z", "updated_at": "2024-11-29T09:15:29Z", "pushed_at": "2021-12-11T10:39:41Z", "stargazers_count": 31, "watchers_count": 31, "has_discussions": false, "forks_count": 38, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 38, "watchers": 31, "score": 0, "subscribers_count": 1 }, { "id": 437426386, "name": "hotpatch-for-apache-log4j2", "full_name": "corretto\/hotpatch-for-apache-log4j2", "owner": { "login": "corretto", "id": 44104058, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44104058?v=4", "html_url": "https:\/\/github.com\/corretto", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/corretto\/hotpatch-for-apache-log4j2", "description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.", "fork": false, "created_at": "2021-12-12T01:24:51Z", "updated_at": "2025-01-07T15:57:52Z", "pushed_at": "2022-10-24T02:25:53Z", "stargazers_count": 493, "watchers_count": 493, "has_discussions": false, "forks_count": 72, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 72, "watchers": 493, "score": 0, "subscribers_count": 25 }, { "id": 437438829, "name": "python-log4rce", "full_name": "alexandre-lavoie\/python-log4rce", "owner": { "login": "alexandre-lavoie", "id": 36684879, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36684879?v=4", "html_url": "https:\/\/github.com\/alexandre-lavoie", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alexandre-lavoie\/python-log4rce", "description": "An All-In-One Pure Python PoC for CVE-2021-44228", "fork": false, "created_at": "2021-12-12T02:57:49Z", "updated_at": "2024-11-25T23:28:13Z", "pushed_at": "2021-12-16T18:34:46Z", "stargazers_count": 175, "watchers_count": 175, "has_discussions": false, "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cli", "cve-2021-44228", "log4j", "python", "rce" ], "visibility": "public", "forks": 29, "watchers": 175, "score": 0, "subscribers_count": 10 }, { "id": 437439106, "name": "Log4Shell_CVE-2021-44228_related_attacks_IOCs", "full_name": "RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs", "owner": { "login": "RedDrip7", "id": 51360411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51360411?v=4", "html_url": "https:\/\/github.com\/RedDrip7", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs", "description": null, "fork": false, "created_at": "2021-12-12T02:59:54Z", "updated_at": "2024-10-15T07:30:11Z", "pushed_at": "2021-12-15T10:19:51Z", "stargazers_count": 45, "watchers_count": 45, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 45, "score": 0, "subscribers_count": 7 }, { "id": 437440782, "name": "CVE-2021-44228-Demo", "full_name": "mzlogin\/CVE-2021-44228-Demo", "owner": { "login": "mzlogin", "id": 1646590, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1646590?v=4", "html_url": "https:\/\/github.com\/mzlogin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mzlogin\/CVE-2021-44228-Demo", "description": "Apache Log4j2 CVE-2021-44228 RCE Demo with RMI and LDAP", "fork": false, "created_at": "2021-12-12T03:11:14Z", "updated_at": "2024-08-12T20:18:49Z", "pushed_at": "2021-12-12T03:22:59Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "jndi", "ldap", "rmi" ], "visibility": "public", "forks": 3, "watchers": 2, "score": 0, "subscribers_count": 3 }, { "id": 437451451, "name": "vcenter-log4j", "full_name": "blake-fm\/vcenter-log4j", "owner": { "login": "blake-fm", "id": 89286531, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89286531?v=4", "html_url": "https:\/\/github.com\/blake-fm", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/blake-fm\/vcenter-log4j", "description": "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228", "fork": false, "created_at": "2021-12-12T04:23:10Z", "updated_at": "2022-08-17T05:28:16Z", "pushed_at": "2021-12-15T12:17:19Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 16, "score": 0, "subscribers_count": 3 }, { "id": 437479258, "name": "CVE-2021-44228-Apache-Log4j-Rce__review", "full_name": "creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review", "owner": { "login": "creamIcec", "id": 42510470, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42510470?v=4", "html_url": "https:\/\/github.com\/creamIcec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review", "description": "log4j2漏洞复现", "fork": false, "created_at": "2021-12-12T07:20:03Z", "updated_at": "2021-12-12T07:20:03Z", "pushed_at": "2021-12-12T07:20:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437501121, "name": "cve-2021-44228-helpers", "full_name": "uint0\/cve-2021-44228-helpers", "owner": { "login": "uint0", "id": 11325389, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4", "html_url": "https:\/\/github.com\/uint0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/uint0\/cve-2021-44228-helpers", "description": null, "fork": false, "created_at": "2021-12-12T09:21:09Z", "updated_at": "2021-12-13T00:01:22Z", "pushed_at": "2021-12-13T00:01:19Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437511755, "name": "apache-log4j-poc", "full_name": "RK800-DEV\/apache-log4j-poc", "owner": { "login": "RK800-DEV", "id": 85429713, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85429713?v=4", "html_url": "https:\/\/github.com\/RK800-DEV", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RK800-DEV\/apache-log4j-poc", "description": "CVE-2021-44228(Apache Log4j Remote Code Execution)", "fork": false, "created_at": "2021-12-12T10:17:13Z", "updated_at": "2021-12-12T10:17:47Z", "pushed_at": "2021-12-12T10:17:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 437512798, "name": "log4j-CVE-2021-44228", "full_name": "sud0x00\/log4j-CVE-2021-44228", "owner": { "login": "sud0x00", "id": 91898207, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91898207?v=4", "html_url": "https:\/\/github.com\/sud0x00", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sud0x00\/log4j-CVE-2021-44228", "description": "CVE-2021-44228", "fork": false, "created_at": "2021-12-12T10:22:45Z", "updated_at": "2023-11-07T01:40:01Z", "pushed_at": "2021-12-12T14:08:08Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2021-44228", "security" ], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 437518939, "name": "CVE-2021-44228-docker-example", "full_name": "DiCanio\/CVE-2021-44228-docker-example", "owner": { "login": "DiCanio", "id": 6052859, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6052859?v=4", "html_url": "https:\/\/github.com\/DiCanio", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DiCanio\/CVE-2021-44228-docker-example", "description": null, "fork": false, "created_at": "2021-12-12T10:53:15Z", "updated_at": "2021-12-13T03:58:51Z", "pushed_at": "2021-12-13T00:03:51Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 437525008, "name": "cve-2021-44228-minecraft-poc", "full_name": "myyxl\/cve-2021-44228-minecraft-poc", "owner": { "login": "myyxl", "id": 22593897, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22593897?v=4", "html_url": "https:\/\/github.com\/myyxl", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/myyxl\/cve-2021-44228-minecraft-poc", "description": "Log4J CVE-2021-44228 Minecraft PoC", "fork": false, "created_at": "2021-12-12T11:22:51Z", "updated_at": "2022-02-15T06:41:00Z", "pushed_at": "2021-12-12T11:34:50Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "log4shell", "poc" ], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 437525445, "name": "Awesome-CVE-2021-44228", "full_name": "RrUZi\/Awesome-CVE-2021-44228", "owner": { "login": "RrUZi", "id": 43235635, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43235635?v=4", "html_url": "https:\/\/github.com\/RrUZi", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RrUZi\/Awesome-CVE-2021-44228", "description": "An awesome curated list of repos for CVE-2021-44228. ``Apache Log4j 2``", "fork": false, "created_at": "2021-12-12T11:25:00Z", "updated_at": "2021-12-12T11:35:58Z", "pushed_at": "2021-12-12T11:33:43Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j2" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 437525803, "name": "CVE-2021-44228", "full_name": "future-client\/CVE-2021-44228", "owner": { "login": "future-client", "id": 122487775, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122487775?v=4", "html_url": "https:\/\/github.com\/future-client", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/future-client\/CVE-2021-44228", "description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ", "fork": false, "created_at": "2021-12-12T11:26:42Z", "updated_at": "2024-06-06T12:50:41Z", "pushed_at": "2021-12-12T17:37:11Z", "stargazers_count": 67, "watchers_count": 67, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "exploit", "jndi", "ldap", "log4j", "minecraft", "rce" ], "visibility": "public", "forks": 3, "watchers": 67, "score": 0, "subscribers_count": 1 }, { "id": 437526168, "name": "Log4JShell-Bytecode-Detector", "full_name": "CodeShield-Security\/Log4JShell-Bytecode-Detector", "owner": { "login": "CodeShield-Security", "id": 60257643, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60257643?v=4", "html_url": "https:\/\/github.com\/CodeShield-Security", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CodeShield-Security\/Log4JShell-Bytecode-Detector", "description": "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T11:28:34Z", "updated_at": "2024-12-28T13:09:40Z", "pushed_at": "2022-02-23T19:10:53Z", "stargazers_count": 49, "watchers_count": 49, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bytecode", "cve-2021-44228", "log4j2", "log4jshell", "log4shell", "scanner", "security" ], "visibility": "public", "forks": 9, "watchers": 49, "score": 0, "subscribers_count": 8 }, { "id": 437526871, "name": "log4j-poc", "full_name": "Crane-Mocker\/log4j-poc", "owner": { "login": "Crane-Mocker", "id": 46662246, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46662246?v=4", "html_url": "https:\/\/github.com\/Crane-Mocker", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Crane-Mocker\/log4j-poc", "description": "Poc of log4j2 (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T11:31:45Z", "updated_at": "2023-01-27T21:00:19Z", "pushed_at": "2021-12-12T12:19:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 437536404, "name": "divd-2021-00038--log4j-scanner", "full_name": "dtact\/divd-2021-00038--log4j-scanner", "owner": { "login": "dtact", "id": 65305480, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65305480?v=4", "html_url": "https:\/\/github.com\/dtact", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dtact\/divd-2021-00038--log4j-scanner", "description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.", "fork": false, "created_at": "2021-12-12T12:16:07Z", "updated_at": "2023-08-09T21:34:19Z", "pushed_at": "2021-12-28T22:21:52Z", "stargazers_count": 50, "watchers_count": 50, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 50, "score": 0, "subscribers_count": 5 }, { "id": 437538957, "name": "CVE-2021-44228-log4Shell", "full_name": "kali-dass\/CVE-2021-44228-log4Shell", "owner": { "login": "kali-dass", "id": 28717904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28717904?v=4", "html_url": "https:\/\/github.com\/kali-dass", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kali-dass\/CVE-2021-44228-log4Shell", "description": "Sample log4j shell exploit", "fork": false, "created_at": "2021-12-12T12:27:39Z", "updated_at": "2022-09-07T20:25:29Z", "pushed_at": "2021-12-13T16:37:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 437546559, "name": "log4j2-CVE-2021-44228", "full_name": "pravin-pp\/log4j2-CVE-2021-44228", "owner": { "login": "pravin-pp", "id": 12995541, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4", "html_url": "https:\/\/github.com\/pravin-pp", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-12T13:00:38Z", "updated_at": "2021-12-13T04:00:49Z", "pushed_at": "2021-12-12T13:25:27Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 437550473, "name": "Exploitation-of-Log4j2-CVE-2021-44228", "full_name": "Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228", "owner": { "login": "Malwar3Ninja", "id": 34618086, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34618086?v=4", "html_url": "https:\/\/github.com\/Malwar3Ninja", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228", "description": "IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 ", "fork": false, "created_at": "2021-12-12T13:17:18Z", "updated_at": "2024-08-04T16:04:11Z", "pushed_at": "2021-12-19T12:42:02Z", "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 15, "score": 0, "subscribers_count": 3 }, { "id": 437551037, "name": "docker-log4shell", "full_name": "urholaukkarinen\/docker-log4shell", "owner": { "login": "urholaukkarinen", "id": 5576504, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5576504?v=4", "html_url": "https:\/\/github.com\/urholaukkarinen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/urholaukkarinen\/docker-log4shell", "description": "Dockerized Go app for testing the CVE-2021-44228 vulnerability", "fork": false, "created_at": "2021-12-12T13:19:50Z", "updated_at": "2021-12-12T13:23:50Z", "pushed_at": "2021-12-12T13:21:28Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437553138, "name": "scan4log4j", "full_name": "ssl\/scan4log4j", "owner": { "login": "ssl", "id": 25695071, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25695071?v=4", "html_url": "https:\/\/github.com\/ssl", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ssl\/scan4log4j", "description": "Python script that sends CVE-2021-44228 log4j payload requests to url list", "fork": false, "created_at": "2021-12-12T13:28:31Z", "updated_at": "2024-09-28T10:29:18Z", "pushed_at": "2021-12-12T13:39:45Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 6, "score": 0, "subscribers_count": 2 }, { "id": 437557116, "name": "nginx-mitigate-log4shell", "full_name": "infiniroot\/nginx-mitigate-log4shell", "owner": { "login": "infiniroot", "id": 29702565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29702565?v=4", "html_url": "https:\/\/github.com\/infiniroot", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/infiniroot\/nginx-mitigate-log4shell", "description": "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script", "fork": false, "created_at": "2021-12-12T13:45:08Z", "updated_at": "2024-05-10T08:52:50Z", "pushed_at": "2021-12-15T08:14:56Z", "stargazers_count": 38, "watchers_count": 38, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4shell", "lua", "mitigation", "nginx", "vulnerability" ], "visibility": "public", "forks": 6, "watchers": 38, "score": 0, "subscribers_count": 15 }, { "id": 437560690, "name": "log4j-cve-2021-44228", "full_name": "lohanichaten\/log4j-cve-2021-44228", "owner": { "login": "lohanichaten", "id": 70852336, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70852336?v=4", "html_url": "https:\/\/github.com\/lohanichaten", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lohanichaten\/log4j-cve-2021-44228", "description": null, "fork": false, "created_at": "2021-12-12T13:59:38Z", "updated_at": "2021-12-12T14:03:46Z", "pushed_at": "2021-12-12T14:03:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437562080, "name": "log4j-log4shell-affected", "full_name": "authomize\/log4j-log4shell-affected", "owner": { "login": "authomize", "id": 57180096, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57180096?v=4", "html_url": "https:\/\/github.com\/authomize", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/authomize\/log4j-log4shell-affected", "description": "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability ", "fork": false, "created_at": "2021-12-12T14:05:05Z", "updated_at": "2024-08-19T11:32:50Z", "pushed_at": "2021-12-19T07:40:25Z", "stargazers_count": 54, "watchers_count": 54, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "log4j-rce" ], "visibility": "public", "forks": 8, "watchers": 54, "score": 0, "subscribers_count": 22 }, { "id": 437567489, "name": "CVE-2021-44228_IoCs", "full_name": "guardicode\/CVE-2021-44228_IoCs", "owner": { "login": "guardicode", "id": 64462782, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64462782?v=4", "html_url": "https:\/\/github.com\/guardicode", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/guardicode\/CVE-2021-44228_IoCs", "description": "Known IoCs for log4j framework vulnerability ", "fork": false, "created_at": "2021-12-12T14:27:28Z", "updated_at": "2022-01-02T08:53:49Z", "pushed_at": "2022-01-18T13:34:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 0, "score": 0, "subscribers_count": 4 }, { "id": 437574258, "name": "log4j-poc", "full_name": "fireflyingup\/log4j-poc", "owner": { "login": "fireflyingup", "id": 48504204, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4", "html_url": "https:\/\/github.com\/fireflyingup", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc", "description": "CVE-2021-44228 test demo", "fork": false, "created_at": "2021-12-12T14:54:25Z", "updated_at": "2021-12-13T05:10:53Z", "pushed_at": "2021-12-13T05:10:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437575607, "name": "cve-2021-44228-qingteng-patch", "full_name": "qingtengyun\/cve-2021-44228-qingteng-patch", "owner": { "login": "qingtengyun", "id": 18526503, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4", "html_url": "https:\/\/github.com\/qingtengyun", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-patch", "description": null, "fork": false, "created_at": "2021-12-12T15:00:04Z", "updated_at": "2024-12-11T07:07:04Z", "pushed_at": "2021-12-12T16:03:21Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 9, "score": 0, "subscribers_count": 1 }, { "id": 437582859, "name": "log4j-jndi-be-gone", "full_name": "nccgroup\/log4j-jndi-be-gone", "owner": { "login": "nccgroup", "id": 4067082, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4", "html_url": "https:\/\/github.com\/nccgroup", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nccgroup\/log4j-jndi-be-gone", "description": "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability.", "fork": false, "created_at": "2021-12-12T15:29:20Z", "updated_at": "2023-11-03T08:18:38Z", "pushed_at": "2022-01-04T02:03:58Z", "stargazers_count": 71, "watchers_count": 71, "has_discussions": false, "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 17, "watchers": 71, "score": 0, "subscribers_count": 12 }, { "id": 437583301, "name": "cve-2021-44228-qingteng-online-patch", "full_name": "qingtengyun\/cve-2021-44228-qingteng-online-patch", "owner": { "login": "qingtengyun", "id": 18526503, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4", "html_url": "https:\/\/github.com\/qingtengyun", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-online-patch", "description": "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.", "fork": false, "created_at": "2021-12-12T15:30:55Z", "updated_at": "2024-12-11T07:07:15Z", "pushed_at": "2022-01-19T09:07:14Z", "stargazers_count": 26, "watchers_count": 26, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "log4j", "log4jshell" ], "visibility": "public", "forks": 4, "watchers": 26, "score": 0, "subscribers_count": 2 }, { "id": 437586734, "name": "horrors-log4shell", "full_name": "tasooshi\/horrors-log4shell", "owner": { "login": "tasooshi", "id": 44586478, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44586478?v=4", "html_url": "https:\/\/github.com\/tasooshi", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tasooshi\/horrors-log4shell", "description": "A micro lab for CVE-2021-44228 (log4j)", "fork": false, "created_at": "2021-12-12T15:44:49Z", "updated_at": "2022-03-15T19:14:39Z", "pushed_at": "2022-02-22T00:27:58Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "log4shell" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 3 }, { "id": 437602257, "name": "evil-rmi-server", "full_name": "Hydragyrum\/evil-rmi-server", "owner": { "login": "Hydragyrum", "id": 4928181, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4", "html_url": "https:\/\/github.com\/Hydragyrum", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Hydragyrum\/evil-rmi-server", "description": "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228", "fork": false, "created_at": "2021-12-12T16:49:45Z", "updated_at": "2024-08-12T20:18:50Z", "pushed_at": "2021-12-12T21:48:06Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 12, "score": 0, "subscribers_count": 2 }, { "id": 437603411, "name": "spring-boot-log4j-cve-2021-44228-docker-lab", "full_name": "twseptian\/spring-boot-log4j-cve-2021-44228-docker-lab", "owner": { "login": "twseptian", "id": 9025301, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4", "html_url": "https:\/\/github.com\/twseptian", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/twseptian\/spring-boot-log4j-cve-2021-44228-docker-lab", "description": "Spring Boot Log4j - CVE-2021-44228 Docker Lab ", "fork": false, "created_at": "2021-12-12T16:54:33Z", "updated_at": "2025-01-05T11:01:16Z", "pushed_at": "2021-12-17T13:59:44Z", "stargazers_count": 26, "watchers_count": 26, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "spring-boot-log4j" ], "visibility": "public", "forks": 20, "watchers": 26, "score": 0, "subscribers_count": 2 }, { "id": 437630669, "name": "log4jcheck", "full_name": "OlafHaalstra\/log4jcheck", "owner": { "login": "OlafHaalstra", "id": 6420723, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6420723?v=4", "html_url": "https:\/\/github.com\/OlafHaalstra", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/OlafHaalstra\/log4jcheck", "description": "Check list of URLs against Log4j vulnerability CVE-2021-44228", "fork": false, "created_at": "2021-12-12T18:57:05Z", "updated_at": "2023-06-25T13:56:28Z", "pushed_at": "2021-12-20T17:32:06Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 2 }, { "id": 437649883, "name": "Prove-CVE-2021-44228", "full_name": "Panyaprach\/Prove-CVE-2021-44228", "owner": { "login": "Panyaprach", "id": 9110880, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9110880?v=4", "html_url": "https:\/\/github.com\/Panyaprach", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Panyaprach\/Prove-CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-12T20:31:19Z", "updated_at": "2024-04-28T19:39:24Z", "pushed_at": "2022-01-14T10:08:06Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 437660117, "name": "Log4j-RCE", "full_name": "momos1337\/Log4j-RCE", "owner": { "login": "momos1337", "id": 64172550, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64172550?v=4", "html_url": "https:\/\/github.com\/momos1337", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/momos1337\/Log4j-RCE", "description": "Log4j RCE - (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T21:26:44Z", "updated_at": "2024-08-12T20:18:50Z", "pushed_at": "2021-12-13T00:54:22Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bughunter", "cve-2021-44228", "exploit", "hacking", "log4j", "log4j-rce", "rce", "remote-code-execution" ], "visibility": "public", "forks": 5, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 437660360, "name": "cve-2021-44228-log4j-mitigation", "full_name": "palominoinc\/cve-2021-44228-log4j-mitigation", "owner": { "login": "palominoinc", "id": 7401270, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7401270?v=4", "html_url": "https:\/\/github.com\/palominoinc", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/palominoinc\/cve-2021-44228-log4j-mitigation", "description": "Mitigate against log4j vulnerability", "fork": false, "created_at": "2021-12-12T21:28:09Z", "updated_at": "2021-12-16T15:15:07Z", "pushed_at": "2021-12-16T15:15:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 4 }, { "id": 437663314, "name": "log4j-poc", "full_name": "cyberxml\/log4j-poc", "owner": { "login": "cyberxml", "id": 10391872, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10391872?v=4", "html_url": "https:\/\/github.com\/cyberxml", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyberxml\/log4j-poc", "description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell", "fork": false, "created_at": "2021-12-12T21:45:33Z", "updated_at": "2024-12-02T12:28:32Z", "pushed_at": "2022-12-21T21:11:58Z", "stargazers_count": 69, "watchers_count": 69, "has_discussions": false, "forks_count": 34, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "exploit", "log4j", "log4shell", "poc" ], "visibility": "public", "forks": 34, "watchers": 69, "score": 0, "subscribers_count": 4 }, { "id": 437664611, "name": "Log4J-CVE-2021-44228-RCE", "full_name": "corneacristian\/Log4J-CVE-2021-44228-RCE", "owner": { "login": "corneacristian", "id": 59137279, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59137279?v=4", "html_url": "https:\/\/github.com\/corneacristian", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/corneacristian\/Log4J-CVE-2021-44228-RCE", "description": "Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)", "fork": false, "created_at": "2021-12-12T21:52:53Z", "updated_at": "2023-07-20T04:33:57Z", "pushed_at": "2021-12-12T22:36:02Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 437674455, "name": "nse-log4shell", "full_name": "Diverto\/nse-log4shell", "owner": { "login": "Diverto", "id": 11384089, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11384089?v=4", "html_url": "https:\/\/github.com\/Diverto", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Diverto\/nse-log4shell", "description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T22:52:02Z", "updated_at": "2024-10-04T14:26:27Z", "pushed_at": "2021-12-20T15:34:21Z", "stargazers_count": 349, "watchers_count": 349, "has_discussions": false, "forks_count": 48, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 48, "watchers": 349, "score": 0, "subscribers_count": 7 }, { "id": 437674999, "name": "log4py", "full_name": "dotPY-hax\/log4py", "owner": { "login": "dotPY-hax", "id": 67259802, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67259802?v=4", "html_url": "https:\/\/github.com\/dotPY-hax", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dotPY-hax\/log4py", "description": "pythonic pure python RCE exploit for CVE-2021-44228 log4shell", "fork": false, "created_at": "2021-12-12T22:55:25Z", "updated_at": "2022-11-09T18:14:43Z", "pushed_at": "2021-12-12T23:49:01Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "exploit", "log4j", "python", "pythonic", "rce" ], "visibility": "public", "forks": 3, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 437681598, "name": "CVE-2021-44228-PoC", "full_name": "sunnyvale-it\/CVE-2021-44228-PoC", "owner": { "login": "sunnyvale-it", "id": 44291039, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4", "html_url": "https:\/\/github.com\/sunnyvale-it", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC", "description": "CVE-2021-44228 (Log4Shell) Proof of Concept", "fork": false, "created_at": "2021-12-12T23:37:39Z", "updated_at": "2025-01-06T06:01:47Z", "pushed_at": "2021-12-13T21:23:25Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cybersecurity", "java", "log4j", "log4j2", "security" ], "visibility": "public", "forks": 5, "watchers": 8, "score": 0, "subscribers_count": 0 }, { "id": 437685288, "name": "log4j2-CVE-2021-44228", "full_name": "maxant\/log4j2-CVE-2021-44228", "owner": { "login": "maxant", "id": 1108507, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1108507?v=4", "html_url": "https:\/\/github.com\/maxant", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/maxant\/log4j2-CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-13T00:02:54Z", "updated_at": "2021-12-19T19:56:12Z", "pushed_at": "2021-12-19T19:56:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437687048, "name": "fail2ban-log4j", "full_name": "atnetws\/fail2ban-log4j", "owner": { "login": "atnetws", "id": 44603839, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44603839?v=4", "html_url": "https:\/\/github.com\/atnetws", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/atnetws\/fail2ban-log4j", "description": "fail2ban filter that catches attacks againts log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-13T00:14:31Z", "updated_at": "2022-07-21T09:23:18Z", "pushed_at": "2022-01-06T20:00:17Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 8, "score": 0, "subscribers_count": 2 }, { "id": 437687082, "name": "cve-2021-44228", "full_name": "kimobu\/cve-2021-44228", "owner": { "login": "kimobu", "id": 18669130, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18669130?v=4", "html_url": "https:\/\/github.com\/kimobu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kimobu\/cve-2021-44228", "description": "Some files for red team\/blue team investigations into CVE-2021-44228", "fork": false, "created_at": "2021-12-13T00:14:45Z", "updated_at": "2023-08-15T12:50:48Z", "pushed_at": "2021-12-14T19:46:02Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 437688500, "name": "anti-jndi", "full_name": "ph0lk3r\/anti-jndi", "owner": { "login": "ph0lk3r", "id": 1352675, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1352675?v=4", "html_url": "https:\/\/github.com\/ph0lk3r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ph0lk3r\/anti-jndi", "description": "Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers.", "fork": false, "created_at": "2021-12-13T00:23:20Z", "updated_at": "2021-12-13T22:21:20Z", "pushed_at": "2021-12-13T22:21:17Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 437704633, "name": "Log4j-check", "full_name": "bigsizeme\/Log4j-check", "owner": { "login": "bigsizeme", "id": 17845094, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4", "html_url": "https:\/\/github.com\/bigsizeme", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check", "description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload", "fork": false, "created_at": "2021-12-13T01:55:51Z", "updated_at": "2024-12-21T14:58:38Z", "pushed_at": "2021-12-13T09:18:19Z", "stargazers_count": 68, "watchers_count": 68, "has_discussions": false, "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 17, "watchers": 68, "score": 0, "subscribers_count": 2 }, { "id": 437709337, "name": "exploit-CVE-2021-44228", "full_name": "pedrohavay\/exploit-CVE-2021-44228", "owner": { "login": "pedrohavay", "id": 18234370, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4", "html_url": "https:\/\/github.com\/pedrohavay", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pedrohavay\/exploit-CVE-2021-44228", "description": "This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).", "fork": false, "created_at": "2021-12-13T02:18:57Z", "updated_at": "2024-01-30T05:00:44Z", "pushed_at": "2021-12-13T16:35:58Z", "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 20, "score": 0, "subscribers_count": 1 }, { "id": 437721429, "name": "log4j-nullroute", "full_name": "0xRyan\/log4j-nullroute", "owner": { "login": "0xRyan", "id": 87556614, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87556614?v=4", "html_url": "https:\/\/github.com\/0xRyan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xRyan\/log4j-nullroute", "description": "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes", "fork": false, "created_at": "2021-12-13T03:15:42Z", "updated_at": "2024-08-12T20:18:50Z", "pushed_at": "2021-12-14T23:03:03Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 437729534, "name": "CVE-2021-44228", "full_name": "fireeye\/CVE-2021-44228", "owner": { "login": "fireeye", "id": 4984788, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4984788?v=4", "html_url": "https:\/\/github.com\/fireeye", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fireeye\/CVE-2021-44228", "description": "OpenIOC rules to facilitate hunting for indicators of compromise", "fork": false, "created_at": "2021-12-13T03:55:32Z", "updated_at": "2024-08-05T03:09:51Z", "pushed_at": "2022-01-07T14:25:33Z", "stargazers_count": 38, "watchers_count": 38, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 38, "score": 0, "subscribers_count": 8 }, { "id": 437729997, "name": "log4j-scan", "full_name": "fullhunt\/log4j-scan", "owner": { "login": "fullhunt", "id": 34830403, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34830403?v=4", "html_url": "https:\/\/github.com\/fullhunt", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fullhunt\/log4j-scan", "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", "updated_at": "2025-01-15T07:32:58Z", "pushed_at": "2022-11-23T18:23:24Z", "stargazers_count": 3408, "watchers_count": 3408, "has_discussions": true, "forks_count": 739, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 739, "watchers": 3408, "score": 0, "subscribers_count": 55 }, { "id": 437733080, "name": "log4j_checker_beta", "full_name": "rubo77\/log4j_checker_beta", "owner": { "login": "rubo77", "id": 1591563, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1591563?v=4", "html_url": "https:\/\/github.com\/rubo77", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rubo77\/log4j_checker_beta", "description": "a fast check, if your server could be vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-13T04:14:18Z", "updated_at": "2024-10-12T16:42:12Z", "pushed_at": "2022-01-21T11:43:49Z", "stargazers_count": 250, "watchers_count": 250, "has_discussions": true, "forks_count": 90, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 90, "watchers": 250, "score": 0, "subscribers_count": 8 }, { "id": 437766799, "name": "Log4j-RCE-Exploiter", "full_name": "thecyberneh\/Log4j-RCE-Exploiter", "owner": { "login": "thecyberneh", "id": 75005384, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75005384?v=4", "html_url": "https:\/\/github.com\/thecyberneh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thecyberneh\/Log4j-RCE-Exploiter", "description": "Scanner for Log4j RCE CVE-2021-44228", "fork": false, "created_at": "2021-12-13T06:53:01Z", "updated_at": "2024-08-12T20:18:51Z", "pushed_at": "2022-07-06T00:37:55Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 11, "score": 0, "subscribers_count": 2 }, { "id": 437769581, "name": "log4j2", "full_name": "halibobor\/log4j2", "owner": { "login": "halibobor", "id": 96046545, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96046545?v=4", "html_url": "https:\/\/github.com\/halibobor", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/halibobor\/log4j2", "description": "CVE-2021-44228", "fork": false, "created_at": "2021-12-13T07:03:50Z", "updated_at": "2021-12-13T09:39:44Z", "pushed_at": "2021-12-13T09:30:28Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "jmi", "log4j2" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 437771197, "name": "log4j-cve-code-search-resources", "full_name": "sourcegraph\/log4j-cve-code-search-resources", "owner": { "login": "sourcegraph", "id": 3979584, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3979584?v=4", "html_url": "https:\/\/github.com\/sourcegraph", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sourcegraph\/log4j-cve-code-search-resources", "description": "Using code search to help fix\/mitigate log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-13T07:10:11Z", "updated_at": "2022-11-09T18:14:44Z", "pushed_at": "2024-04-01T21:00:27Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 1, "score": 0, "subscribers_count": 41 }, { "id": 437774679, "name": "Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832", "full_name": "thedevappsecguy\/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832", "owner": { "login": "thedevappsecguy", "id": 27088213, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27088213?v=4", "html_url": "https:\/\/github.com\/thedevappsecguy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thedevappsecguy\/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832", "description": "Log4J CVE-2021-44228 : Mitigation Cheat Sheet", "fork": false, "created_at": "2021-12-13T07:24:02Z", "updated_at": "2022-10-26T08:46:27Z", "pushed_at": "2022-01-03T17:43:06Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 437781188, "name": "CVE-2021-44228", "full_name": "helsecert\/CVE-2021-44228", "owner": { "login": "helsecert", "id": 2202200, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4", "html_url": "https:\/\/github.com\/helsecert", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/helsecert\/CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-13T07:48:49Z", "updated_at": "2021-12-19T23:28:13Z", "pushed_at": "2022-01-04T08:15:11Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 6 }, { "id": 437784907, "name": "aws-log4j-mitigations", "full_name": "markuman\/aws-log4j-mitigations", "owner": { "login": "markuman", "id": 3920157, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4", "html_url": "https:\/\/github.com\/markuman", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/markuman\/aws-log4j-mitigations", "description": "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible", "fork": false, "created_at": "2021-12-13T08:01:55Z", "updated_at": "2021-12-13T08:05:42Z", "pushed_at": "2021-12-13T08:03:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "ansible", "aws", "cve-2021-44228", "log4j", "mitigation", "waf" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 3 }, { "id": 437788180, "name": "Log4shell", "full_name": "tuyenee\/Log4shell", "owner": { "login": "tuyenee", "id": 29719729, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29719729?v=4", "html_url": "https:\/\/github.com\/tuyenee", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tuyenee\/Log4shell", "description": "A lab for playing around with the Log4J CVE-2021-44228", "fork": false, "created_at": "2021-12-13T08:13:07Z", "updated_at": "2024-08-12T20:18:51Z", "pushed_at": "2021-12-13T09:26:24Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437795998, "name": "Log4j-CVE-2021-44228", "full_name": "JiuBanSec\/Log4j-CVE-2021-44228", "owner": { "login": "JiuBanSec", "id": 57030243, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4", "html_url": "https:\/\/github.com\/JiuBanSec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JiuBanSec\/Log4j-CVE-2021-44228", "description": "Log4j Remote Code Injection (Apache Log4j 2.x < 2.15.0-rc2)", "fork": false, "created_at": "2021-12-13T08:40:13Z", "updated_at": "2023-08-15T12:50:45Z", "pushed_at": "2021-12-13T12:01:19Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 437797086, "name": "Log4Shell-CVE-2021-44228-ENV", "full_name": "ycdxsb\/Log4Shell-CVE-2021-44228-ENV", "owner": { "login": "ycdxsb", "id": 32149596, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4", "html_url": "https:\/\/github.com\/ycdxsb", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ycdxsb\/Log4Shell-CVE-2021-44228-ENV", "description": "Log4Shell Docker Env", "fork": false, "created_at": "2021-12-13T08:43:45Z", "updated_at": "2023-08-15T12:50:53Z", "pushed_at": "2021-12-14T02:54:48Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 437797971, "name": "Sitecore.Solr-log4j-mitigation", "full_name": "avwolferen\/Sitecore.Solr-log4j-mitigation", "owner": { "login": "avwolferen", "id": 11447968, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11447968?v=4", "html_url": "https:\/\/github.com\/avwolferen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/avwolferen\/Sitecore.Solr-log4j-mitigation", "description": "This repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228", "fork": false, "created_at": "2021-12-13T08:46:41Z", "updated_at": "2022-01-05T17:02:45Z", "pushed_at": "2022-10-19T14:57:20Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 3 }, { "id": 437799663, "name": "log4j-scanner-CVE-2021-44228", "full_name": "kek-Sec\/log4j-scanner-CVE-2021-44228", "owner": { "login": "kek-Sec", "id": 28791067, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28791067?v=4", "html_url": "https:\/\/github.com\/kek-Sec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kek-Sec\/log4j-scanner-CVE-2021-44228", "description": "Simple tool for scanning entire directories for attempts of CVE-2021-44228", "fork": false, "created_at": "2021-12-13T08:51:56Z", "updated_at": "2024-08-12T20:18:51Z", "pushed_at": "2021-12-14T07:57:25Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 437816961, "name": "log4shell-spring-framework-research", "full_name": "Camphul\/log4shell-spring-framework-research", "owner": { "login": "Camphul", "id": 23475815, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23475815?v=4", "html_url": "https:\/\/github.com\/Camphul", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Camphul\/log4shell-spring-framework-research", "description": "Research into the implications of CVE-2021-44228 in Spring based applications.", "fork": false, "created_at": "2021-12-13T09:48:04Z", "updated_at": "2021-12-15T10:33:35Z", "pushed_at": "2021-12-15T10:33:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 437820134, "name": "cve-2021-44228-log4j-exploits", "full_name": "lov3r\/cve-2021-44228-log4j-exploits", "owner": { "login": "lov3r", "id": 33676682, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33676682?v=4", "html_url": "https:\/\/github.com\/lov3r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lov3r\/cve-2021-44228-log4j-exploits", "description": "CVE-2021-4428 复现", "fork": false, "created_at": "2021-12-13T09:58:11Z", "updated_at": "2022-09-05T15:53:24Z", "pushed_at": "2021-12-13T10:22:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437838249, "name": "log4jScan", "full_name": "sinakeshmiri\/log4jScan", "owner": { "login": "sinakeshmiri", "id": 72389059, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72389059?v=4", "html_url": "https:\/\/github.com\/sinakeshmiri", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sinakeshmiri\/log4jScan", "description": "simple python scanner to check if your network is vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-13T10:59:50Z", "updated_at": "2024-10-08T07:36:17Z", "pushed_at": "2021-12-13T12:16:03Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 437840280, "name": "Log4J-Scanner", "full_name": "0xDexter0us\/Log4J-Scanner", "owner": { "login": "0xDexter0us", "id": 76158271, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76158271?v=4", "html_url": "https:\/\/github.com\/0xDexter0us", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xDexter0us\/Log4J-Scanner", "description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.", "fork": false, "created_at": "2021-12-13T11:06:46Z", "updated_at": "2024-09-09T07:15:00Z", "pushed_at": "2021-12-26T09:58:06Z", "stargazers_count": 101, "watchers_count": 101, "has_discussions": false, "forks_count": 25, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 25, "watchers": 101, "score": 0, "subscribers_count": 7 }, { "id": 437847140, "name": "Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228", "full_name": "LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228", "owner": { "login": "LutziGoz", "id": 45577616, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45577616?v=4", "html_url": "https:\/\/github.com\/LutziGoz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-13T11:29:57Z", "updated_at": "2022-08-14T12:05:18Z", "pushed_at": "2022-02-22T00:21:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437848570, "name": "Log4Shell", "full_name": "0xsyr0\/Log4Shell", "owner": { "login": "0xsyr0", "id": 67317571, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67317571?v=4", "html_url": "https:\/\/github.com\/0xsyr0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xsyr0\/Log4Shell", "description": "This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.", "fork": false, "created_at": "2021-12-13T11:34:54Z", "updated_at": "2024-01-17T16:03:44Z", "pushed_at": "2024-02-21T15:47:36Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2021-44228", "log4j", "log4shell" ], "visibility": "public", "forks": 2, "watchers": 8, "score": 0, "subscribers_count": 4 }, { "id": 437860177, "name": "log4j-rce-CVE-2021-44228", "full_name": "1hakusai1\/log4j-rce-CVE-2021-44228", "owner": { "login": "1hakusai1", "id": 55519230, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55519230?v=4", "html_url": "https:\/\/github.com\/1hakusai1", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/1hakusai1\/log4j-rce-CVE-2021-44228", "description": "log4j2 CVE-2021-44228 POC", "fork": false, "created_at": "2021-12-13T12:15:10Z", "updated_at": "2022-10-04T05:04:19Z", "pushed_at": "2021-12-13T13:00:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437866496, "name": "log4j-rce-test", "full_name": "jeffli1024\/log4j-rce-test", "owner": { "login": "jeffli1024", "id": 33046602, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046602?v=4", "html_url": "https:\/\/github.com\/jeffli1024", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jeffli1024\/log4j-rce-test", "description": "CVE-2021-44228 - Apache log4j RCE quick test", "fork": false, "created_at": "2021-12-13T12:35:39Z", "updated_at": "2023-02-07T00:20:03Z", "pushed_at": "2021-12-13T21:53:39Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 437876264, "name": "Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service", "full_name": "zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service", "owner": { "login": "zsolt-halo", "id": 2437516, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2437516?v=4", "html_url": "https:\/\/github.com\/zsolt-halo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service", "description": null, "fork": false, "created_at": "2021-12-13T13:05:26Z", "updated_at": "2023-08-15T12:50:31Z", "pushed_at": "2021-12-13T13:26:11Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 13, "score": 0, "subscribers_count": 3 }, { "id": 437877109, "name": "log4j-cve-2021-44228", "full_name": "manuel-alvarez-alvarez\/log4j-cve-2021-44228", "owner": { "login": "manuel-alvarez-alvarez", "id": 4885539, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4885539?v=4", "html_url": "https:\/\/github.com\/manuel-alvarez-alvarez", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/manuel-alvarez-alvarez\/log4j-cve-2021-44228", "description": "Log4j CVE-2021-44228 examples: Remote Code Execution (through LDAP, RMI, ...), Forced DNS queries, ...", "fork": false, "created_at": "2021-12-13T13:08:03Z", "updated_at": "2024-05-14T08:37:19Z", "pushed_at": "2021-12-21T11:12:40Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 437882599, "name": "CVE-2021-44228", "full_name": "VNYui\/CVE-2021-44228", "owner": { "login": "VNYui", "id": 14999242, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14999242?v=4", "html_url": "https:\/\/github.com\/VNYui", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/VNYui\/CVE-2021-44228", "description": "Mass recognition tool for CVE-2021-44228", "fork": false, "created_at": "2021-12-13T13:25:19Z", "updated_at": "2021-12-13T13:37:39Z", "pushed_at": "2021-12-13T13:37:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437883625, "name": "Scan-CVE-2021-44228", "full_name": "flxhaas\/Scan-CVE-2021-44228", "owner": { "login": "flxhaas", "id": 5561099, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5561099?v=4", "html_url": "https:\/\/github.com\/flxhaas", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/flxhaas\/Scan-CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-13T13:28:26Z", "updated_at": "2021-12-13T13:28:26Z", "pushed_at": "2021-12-13T13:28:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437884471, "name": "Log4j-CVE-2021-44228", "full_name": "justakazh\/Log4j-CVE-2021-44228", "owner": { "login": "justakazh", "id": 36891477, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4", "html_url": "https:\/\/github.com\/justakazh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/justakazh\/Log4j-CVE-2021-44228", "description": "Mass Check Vulnerable Log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-13T13:30:57Z", "updated_at": "2024-08-12T20:18:51Z", "pushed_at": "2021-12-13T14:17:59Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "0day", "exploit", "log4j", "scanner" ], "visibility": "public", "forks": 6, "watchers": 5, "score": 0, "subscribers_count": 3 }, { "id": 437888133, "name": "f5-waf-quick-patch-cve-2021-44228", "full_name": "irgoncalves\/f5-waf-quick-patch-cve-2021-44228", "owner": { "login": "irgoncalves", "id": 23459099, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4", "html_url": "https:\/\/github.com\/irgoncalves", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/irgoncalves\/f5-waf-quick-patch-cve-2021-44228", "description": "This tool creates a custom signature set on F5 WAF and apply to policies in blocking mode", "fork": false, "created_at": "2021-12-13T13:41:39Z", "updated_at": "2023-02-11T20:16:19Z", "pushed_at": "2022-05-04T23:49:03Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 437902732, "name": "JndiLookup", "full_name": "madCdan\/JndiLookup", "owner": { "login": "madCdan", "id": 10784600, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10784600?v=4", "html_url": "https:\/\/github.com\/madCdan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/madCdan\/JndiLookup", "description": "Some tools to help mitigating Apache Log4j 2 CVE-2021-44228", "fork": false, "created_at": "2021-12-13T14:22:34Z", "updated_at": "2021-12-18T02:12:49Z", "pushed_at": "2021-12-13T17:07:42Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 437904012, "name": "MC-Log4j-Patcher", "full_name": "Koupah\/MC-Log4j-Patcher", "owner": { "login": "Koupah", "id": 25888315, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25888315?v=4", "html_url": "https:\/\/github.com\/Koupah", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Koupah\/MC-Log4j-Patcher", "description": "A singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228).", "fork": false, "created_at": "2021-12-13T14:26:24Z", "updated_at": "2022-01-04T03:00:29Z", "pushed_at": "2022-01-16T01:59:24Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 437917354, "name": "Fix-CVE-2021-44228", "full_name": "AlexandreHeroux\/Fix-CVE-2021-44228", "owner": { "login": "AlexandreHeroux", "id": 28022186, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28022186?v=4", "html_url": "https:\/\/github.com\/AlexandreHeroux", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AlexandreHeroux\/Fix-CVE-2021-44228", "description": "Apply class remove process from ear\/war\/jar\/zip archive, see https:\/\/logging.apache.org\/log4j\/2.x\/", "fork": false, "created_at": "2021-12-13T15:04:31Z", "updated_at": "2024-05-20T03:26:22Z", "pushed_at": "2021-12-15T02:02:51Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 437919806, "name": "log4j-CVE-2021-44228-test", "full_name": "kossatzd\/log4j-CVE-2021-44228-test", "owner": { "login": "kossatzd", "id": 3578287, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3578287?v=4", "html_url": "https:\/\/github.com\/kossatzd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kossatzd\/log4j-CVE-2021-44228-test", "description": "demo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability", "fork": false, "created_at": "2021-12-13T15:11:15Z", "updated_at": "2021-12-24T22:09:51Z", "pushed_at": "2021-12-24T22:09:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437937629, "name": "log4j-CVE-2021-44228", "full_name": "tobiasoed\/log4j-CVE-2021-44228", "owner": { "login": "tobiasoed", "id": 12912943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12912943?v=4", "html_url": "https:\/\/github.com\/tobiasoed", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tobiasoed\/log4j-CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-13T16:04:54Z", "updated_at": "2021-12-21T02:30:06Z", "pushed_at": "2022-02-21T23:45:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437948564, "name": "log4shell_ioc_ips", "full_name": "hackinghippo\/log4shell_ioc_ips", "owner": { "login": "hackinghippo", "id": 96073490, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96073490?v=4", "html_url": "https:\/\/github.com\/hackinghippo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hackinghippo\/log4shell_ioc_ips", "description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)", "fork": false, "created_at": "2021-12-13T16:39:16Z", "updated_at": "2023-12-11T04:51:15Z", "pushed_at": "2022-01-07T17:00:38Z", "stargazers_count": 36, "watchers_count": 36, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2021-44228", "ioc", "list", "log4j", "log4shell", "shell4log" ], "visibility": "public", "forks": 12, "watchers": 36, "score": 0, "subscribers_count": 4 }, { "id": 437948858, "name": "log4j-1.2.15-mod", "full_name": "p3dr16k\/log4j-1.2.15-mod", "owner": { "login": "p3dr16k", "id": 9317261, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9317261?v=4", "html_url": "https:\/\/github.com\/p3dr16k", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/p3dr16k\/log4j-1.2.15-mod", "description": "log4j version 1 with a patch for CVE-2021-44228 vulnerability", "fork": false, "created_at": "2021-12-13T16:40:14Z", "updated_at": "2021-12-14T11:41:29Z", "pushed_at": "2021-12-14T11:39:43Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 437949273, "name": "ansible-role-log4shell", "full_name": "claranet\/ansible-role-log4shell", "owner": { "login": "claranet", "id": 7526691, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7526691?v=4", "html_url": "https:\/\/github.com\/claranet", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/claranet\/ansible-role-log4shell", "description": "Find Log4Shell CVE-2021-44228 on your system", "fork": false, "created_at": "2021-12-13T16:41:31Z", "updated_at": "2023-11-16T14:11:42Z", "pushed_at": "2024-06-20T08:48:06Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "ansible", "claranet", "log4j", "log4shell", "role" ], "visibility": "public", "forks": 5, "watchers": 11, "score": 0, "subscribers_count": 15 }, { "id": 437960695, "name": "CVE-2021-44228", "full_name": "taurusxin\/CVE-2021-44228", "owner": { "login": "taurusxin", "id": 17809960, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17809960?v=4", "html_url": "https:\/\/github.com\/taurusxin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/taurusxin\/CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-13T17:17:37Z", "updated_at": "2024-08-14T03:52:41Z", "pushed_at": "2021-12-13T17:22:19Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 437963154, "name": "cve-2021-44228", "full_name": "corelight\/cve-2021-44228", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/corelight\/cve-2021-44228", "description": "Log4j Exploit Detection Logic for Zeek", "fork": false, "created_at": "2021-12-13T17:25:52Z", "updated_at": "2024-10-12T10:55:49Z", "pushed_at": "2024-05-04T18:38:58Z", "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "zeek" ], "visibility": "public", "forks": 8, "watchers": 19, "score": 0, "subscribers_count": 12 }, { "id": 437965181, "name": "log4j2-prosecutor", "full_name": "rodfer0x80\/log4j2-prosecutor", "owner": { "login": "rodfer0x80", "id": 52704508, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52704508?v=4", "html_url": "https:\/\/github.com\/rodfer0x80", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rodfer0x80\/log4j2-prosecutor", "description": "CVE-2021-44228", "fork": false, "created_at": "2021-12-13T17:32:26Z", "updated_at": "2021-12-23T10:05:33Z", "pushed_at": "2021-12-23T10:05:30Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 437968616, "name": "CVE-2021-44228_Log4Shell", "full_name": "yanghaoi\/CVE-2021-44228_Log4Shell", "owner": { "login": "yanghaoi", "id": 21354684, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4", "html_url": "https:\/\/github.com\/yanghaoi", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell", "description": "Log4Shell A test for CVE-2021-44228", "fork": false, "created_at": "2021-12-13T17:44:01Z", "updated_at": "2021-12-13T18:03:51Z", "pushed_at": "2021-12-13T18:06:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 437983994, "name": "log4j_checker", "full_name": "lfama\/log4j_checker", "owner": { "login": "lfama", "id": 14056990, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14056990?v=4", "html_url": "https:\/\/github.com\/lfama", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lfama\/log4j_checker", "description": "Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.", "fork": false, "created_at": "2021-12-13T18:35:16Z", "updated_at": "2024-01-16T00:41:28Z", "pushed_at": "2021-12-21T16:01:08Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "log4shell", "python", "python3", "scan", "scanner", "vulnerability" ], "visibility": "public", "forks": 3, "watchers": 9, "score": 0, "subscribers_count": 2 }, { "id": 437988861, "name": "Log4j-IOCs", "full_name": "threatmonit\/Log4j-IOCs", "owner": { "login": "threatmonit", "id": 90388073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4", "html_url": "https:\/\/github.com\/threatmonit", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/threatmonit\/Log4j-IOCs", "description": "Public IOCs about log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-13T18:52:19Z", "updated_at": "2023-05-09T18:44:15Z", "pushed_at": "2021-12-13T19:11:30Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 437995131, "name": "l4j-info", "full_name": "ben-smash\/l4j-info", "owner": { "login": "ben-smash", "id": 95368649, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4", "html_url": "https:\/\/github.com\/ben-smash", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ben-smash\/l4j-info", "description": "Compiling links of value i find regarding CVE-2021-44228", "fork": false, "created_at": "2021-12-13T19:14:23Z", "updated_at": "2021-12-13T21:11:09Z", "pushed_at": "2021-12-13T21:11:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438003225, "name": "log4j-test", "full_name": "strawhatasif\/log4j-test", "owner": { "login": "strawhatasif", "id": 10750101, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4", "html_url": "https:\/\/github.com\/strawhatasif", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/strawhatasif\/log4j-test", "description": "Demonstration of CVE-2021-44228 with a possible strategic fix.", "fork": false, "created_at": "2021-12-13T19:43:01Z", "updated_at": "2021-12-13T20:26:40Z", "pushed_at": "2021-12-13T20:26:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438012376, "name": "nmap-log4shell", "full_name": "giterlizzi\/nmap-log4shell", "owner": { "login": "giterlizzi", "id": 1824717, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1824717?v=4", "html_url": "https:\/\/github.com\/giterlizzi", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/giterlizzi\/nmap-log4shell", "description": "Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)", "fork": false, "created_at": "2021-12-13T20:17:14Z", "updated_at": "2024-12-04T01:38:34Z", "pushed_at": "2021-12-17T17:23:57Z", "stargazers_count": 79, "watchers_count": 79, "has_discussions": false, "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "log4shell", "nmap", "nmap-scripts", "vulnerability" ], "visibility": "public", "forks": 21, "watchers": 79, "score": 0, "subscribers_count": 6 }, { "id": 438013062, "name": "Siem-queries-for-CVE-2021-44228", "full_name": "tica506\/Siem-queries-for-CVE-2021-44228", "owner": { "login": "tica506", "id": 93236626, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4", "html_url": "https:\/\/github.com\/tica506", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-13T20:19:57Z", "updated_at": "2021-12-13T20:56:54Z", "pushed_at": "2021-12-13T20:56:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438021782, "name": "log4shell-example", "full_name": "chilit-nl\/log4shell-example", "owner": { "login": "chilit-nl", "id": 96049152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96049152?v=4", "html_url": "https:\/\/github.com\/chilit-nl", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/chilit-nl\/log4shell-example", "description": "The goal of this project is to demonstrate the log4j cve-2021-44228 exploit vulnerability in a spring-boot setup, and to show how to fix it.", "fork": false, "created_at": "2021-12-13T20:54:10Z", "updated_at": "2021-12-14T08:30:57Z", "pushed_at": "2021-12-14T08:18:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "log4j2", "log4shell" ], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438026042, "name": "log4j-checker", "full_name": "Occamsec\/log4j-checker", "owner": { "login": "Occamsec", "id": 55592824, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55592824?v=4", "html_url": "https:\/\/github.com\/Occamsec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Occamsec\/log4j-checker", "description": "Bash and PowerShell scripts to scan a local filesystem for Log4j .jar files which could be vulnerable to CVE-2021-44228 aka Log4Shell.", "fork": false, "created_at": "2021-12-13T21:11:18Z", "updated_at": "2021-12-21T15:16:18Z", "pushed_at": "2021-12-16T17:44:06Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "log4j", "log4shell" ], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 438028657, "name": "log4j2-CVE-2021-44228-poc-local", "full_name": "snatalius\/log4j2-CVE-2021-44228-poc-local", "owner": { "login": "snatalius", "id": 22771118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4", "html_url": "https:\/\/github.com\/snatalius", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local", "description": "Just a personal proof of concept of CVE-2021-44228 on log4j2", "fork": false, "created_at": "2021-12-13T21:21:53Z", "updated_at": "2021-12-13T21:21:56Z", "pushed_at": "2021-12-13T21:21:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 438032780, "name": "CVE-2021-44228", "full_name": "Contrast-Security-OSS\/CVE-2021-44228", "owner": { "login": "Contrast-Security-OSS", "id": 5577345, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5577345?v=4", "html_url": "https:\/\/github.com\/Contrast-Security-OSS", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Contrast-Security-OSS\/CVE-2021-44228", "description": "Professional Service scripts to aid in the identification of affected Java applications in TeamServer", "fork": false, "created_at": "2021-12-13T21:39:39Z", "updated_at": "2021-12-14T01:40:19Z", "pushed_at": "2021-12-22T13:15:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 8 }, { "id": 438032826, "name": "log4shell-rex", "full_name": "back2root\/log4shell-rex", "owner": { "login": "back2root", "id": 9200239, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9200239?v=4", "html_url": "https:\/\/github.com\/back2root", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/back2root\/log4shell-rex", "description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs", "fork": false, "created_at": "2021-12-13T21:39:51Z", "updated_at": "2024-11-25T13:32:41Z", "pushed_at": "2021-12-21T01:24:46Z", "stargazers_count": 291, "watchers_count": 291, "has_discussions": false, "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 30, "watchers": 291, "score": 0, "subscribers_count": 12 }, { "id": 438034703, "name": "log4shell-tools", "full_name": "alexbakker\/log4shell-tools", "owner": { "login": "alexbakker", "id": 2387841, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4", "html_url": "https:\/\/github.com\/alexbakker", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alexbakker\/log4shell-tools", "description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046", "fork": false, "created_at": "2021-12-13T21:47:41Z", "updated_at": "2024-10-28T07:04:55Z", "pushed_at": "2024-04-07T22:45:53Z", "stargazers_count": 86, "watchers_count": 86, "has_discussions": false, "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "cve-2021-45046", "dns", "jndi", "ldap", "log4j", "log4shell" ], "visibility": "public", "forks": 17, "watchers": 86, "score": 0, "subscribers_count": 4 }, { "id": 438043313, "name": "find-log4j", "full_name": "perryflynn\/find-log4j", "owner": { "login": "perryflynn", "id": 1693988, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1693988?v=4", "html_url": "https:\/\/github.com\/perryflynn", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/perryflynn\/find-log4j", "description": "Find log4j for CVE-2021-44228 on some places * Log4Shell", "fork": false, "created_at": "2021-12-13T22:26:04Z", "updated_at": "2021-12-21T07:48:29Z", "pushed_at": "2021-12-14T21:11:59Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "log4j2", "log4jshell" ], "visibility": "public", "forks": 4, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 438090697, "name": "log4j-cve-2021-44228-sample", "full_name": "alpacamybags118\/log4j-cve-2021-44228-sample", "owner": { "login": "alpacamybags118", "id": 16386559, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16386559?v=4", "html_url": "https:\/\/github.com\/alpacamybags118", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alpacamybags118\/log4j-cve-2021-44228-sample", "description": "Sample docker-compose setup to show how this exploit works", "fork": false, "created_at": "2021-12-14T02:26:52Z", "updated_at": "2022-11-21T21:14:16Z", "pushed_at": "2022-01-14T14:13:07Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 438090719, "name": "log4j2-issue-check", "full_name": "sandarenu\/log4j2-issue-check", "owner": { "login": "sandarenu", "id": 808954, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/808954?v=4", "html_url": "https:\/\/github.com\/sandarenu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sandarenu\/log4j2-issue-check", "description": "Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228", "fork": false, "created_at": "2021-12-14T02:26:56Z", "updated_at": "2021-12-14T03:53:41Z", "pushed_at": "2021-12-14T03:53:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 438112808, "name": "CVE-2021-44228-Demo", "full_name": "roticagas\/CVE-2021-44228-Demo", "owner": { "login": "roticagas", "id": 17757134, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17757134?v=4", "html_url": "https:\/\/github.com\/roticagas", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/roticagas\/CVE-2021-44228-Demo", "description": null, "fork": false, "created_at": "2021-12-14T04:09:02Z", "updated_at": "2021-12-15T07:13:10Z", "pushed_at": "2021-12-15T07:13:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438118026, "name": "log4j-urlscanner", "full_name": "Woahd\/log4j-urlscanner", "owner": { "login": "Woahd", "id": 91861246, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91861246?v=4", "html_url": "https:\/\/github.com\/Woahd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Woahd\/log4j-urlscanner", "description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading", "fork": false, "created_at": "2021-12-14T04:35:20Z", "updated_at": "2021-12-15T04:54:26Z", "pushed_at": "2021-12-15T04:54:23Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 438128189, "name": "Log4j2-CVE-2021-44228-revshell", "full_name": "faisalfs10x\/Log4j2-CVE-2021-44228-revshell", "owner": { "login": "faisalfs10x", "id": 51811615, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4", "html_url": "https:\/\/github.com\/faisalfs10x", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/faisalfs10x\/Log4j2-CVE-2021-44228-revshell", "description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!", "fork": false, "created_at": "2021-12-14T05:24:52Z", "updated_at": "2024-07-31T09:38:34Z", "pushed_at": "2021-12-21T19:48:57Z", "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploit", "log4j", "poc" ], "visibility": "public", "forks": 2, "watchers": 19, "score": 0, "subscribers_count": 2 }, { "id": 438135281, "name": "chk_log4j", "full_name": "gcmurphy\/chk_log4j", "owner": { "login": "gcmurphy", "id": 222833, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/222833?v=4", "html_url": "https:\/\/github.com\/gcmurphy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gcmurphy\/chk_log4j", "description": "Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-14T05:58:28Z", "updated_at": "2023-03-08T02:33:19Z", "pushed_at": "2021-12-14T12:20:56Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "jar", "log4j", "log4shell", "rust" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 3 }, { "id": 438144746, "name": "LogMePwn", "full_name": "0xInfection\/LogMePwn", "owner": { "login": "0xInfection", "id": 39941993, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39941993?v=4", "html_url": "https:\/\/github.com\/0xInfection", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xInfection\/LogMePwn", "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", "updated_at": "2025-01-06T12:50:50Z", "pushed_at": "2024-12-11T23:04:50Z", "stargazers_count": 392, "watchers_count": 392, "has_discussions": false, "forks_count": 53, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "internet-scanning", "log4j", "rce-scanner", "vulnerability-scanners" ], "visibility": "public", "forks": 53, "watchers": 392, "score": 0, "subscribers_count": 12 }, { "id": 438148080, "name": "apache-solr-log4j-CVE-2021-44228", "full_name": "toramanemre\/apache-solr-log4j-CVE-2021-44228", "owner": { "login": "toramanemre", "id": 24626967, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4", "html_url": "https:\/\/github.com\/toramanemre", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/toramanemre\/apache-solr-log4j-CVE-2021-44228", "description": "A Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228", "fork": false, "created_at": "2021-12-14T06:51:30Z", "updated_at": "2023-07-28T09:59:43Z", "pushed_at": "2021-12-14T06:51:51Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 438165990, "name": "log4j-scanner", "full_name": "codiobert\/log4j-scanner", "owner": { "login": "codiobert", "id": 10519412, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10519412?v=4", "html_url": "https:\/\/github.com\/codiobert", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/codiobert\/log4j-scanner", "description": "Check CVE-2021-44228 vulnerability", "fork": false, "created_at": "2021-12-14T07:59:14Z", "updated_at": "2022-01-30T16:35:24Z", "pushed_at": "2021-12-15T17:08:42Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 3 }, { "id": 438175327, "name": "log4j2-rce-recap", "full_name": "cbuschka\/log4j2-rce-recap", "owner": { "login": "cbuschka", "id": 5462513, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5462513?v=4", "html_url": "https:\/\/github.com\/cbuschka", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cbuschka\/log4j2-rce-recap", "description": "Little recap of the log4j2 remote code execution (CVE-2021-44228)", "fork": false, "created_at": "2021-12-14T08:31:47Z", "updated_at": "2021-12-14T10:06:36Z", "pushed_at": "2021-12-14T10:03:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploit", "java", "log4j2", "rce", "security" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 3 }, { "id": 438182253, "name": "log4j-vulnerability-demo", "full_name": "andrii-kovalenko-celonis\/log4j-vulnerability-demo", "owner": { "login": "andrii-kovalenko-celonis", "id": 63106217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63106217?v=4", "html_url": "https:\/\/github.com\/andrii-kovalenko-celonis", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/andrii-kovalenko-celonis\/log4j-vulnerability-demo", "description": "Endpoint to test CVE-2021-44228 – Log4j 2", "fork": false, "created_at": "2021-12-14T08:55:43Z", "updated_at": "2021-12-14T08:57:36Z", "pushed_at": "2021-12-14T08:57:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438193673, "name": "Log4j-CVE-2021-44228", "full_name": "dark-ninja10\/Log4j-CVE-2021-44228", "owner": { "login": "dark-ninja10", "id": 58605984, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58605984?v=4", "html_url": "https:\/\/github.com\/dark-ninja10", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dark-ninja10\/Log4j-CVE-2021-44228", "description": "On Thursday (December 9th), a 0-day exploit in the popular Java logging library log4j (version 2) was discovered that results in Remote Code Execution (RCE) by logging a certain string. Given how ubiquitous this library is, the impact of the exploit (full server control), and how easy it is to exploit, the impact of this vulnerability is quite severe. We're calling it \"Log4Shell\" for short.", "fork": false, "created_at": "2021-12-14T09:33:22Z", "updated_at": "2021-12-14T09:35:51Z", "pushed_at": "2021-12-14T09:35:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438203240, "name": "log4j-finder", "full_name": "fox-it\/log4j-finder", "owner": { "login": "fox-it", "id": 468621, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/468621?v=4", "html_url": "https:\/\/github.com\/fox-it", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fox-it\/log4j-finder", "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)", "fork": false, "created_at": "2021-12-14T10:04:42Z", "updated_at": "2024-10-03T05:15:58Z", "pushed_at": "2022-12-27T17:57:19Z", "stargazers_count": 435, "watchers_count": 435, "has_discussions": true, "forks_count": 95, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "cve-2021-45046", "cve-2021-45105", "log4j", "log4j-finder", "log4j2", "log4shell", "python" ], "visibility": "public", "forks": 95, "watchers": 435, "score": 0, "subscribers_count": 21 }, { "id": 438248880, "name": "JNDI-Exploit-1.2-log4shell", "full_name": "34zY\/JNDI-Exploit-1.2-log4shell", "owner": { "login": "34zY", "id": 55347142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4", "html_url": "https:\/\/github.com\/34zY", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/34zY\/JNDI-Exploit-1.2-log4shell", "description": "Details : CVE-2021-44228", "fork": false, "created_at": "2021-12-14T12:42:54Z", "updated_at": "2024-08-12T20:18:53Z", "pushed_at": "2021-12-19T07:57:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438250402, "name": "cve-2021-44228", "full_name": "didoatanasov\/cve-2021-44228", "owner": { "login": "didoatanasov", "id": 7069625, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7069625?v=4", "html_url": "https:\/\/github.com\/didoatanasov", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/didoatanasov\/cve-2021-44228", "description": null, "fork": false, "created_at": "2021-12-14T12:47:56Z", "updated_at": "2021-12-14T14:30:02Z", "pushed_at": "2021-12-14T14:29:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 438289849, "name": "Security-Log4J-Tester", "full_name": "ReynerGonzalez\/Security-Log4J-Tester", "owner": { "login": "ReynerGonzalez", "id": 51517256, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51517256?v=4", "html_url": "https:\/\/github.com\/ReynerGonzalez", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ReynerGonzalez\/Security-Log4J-Tester", "description": "The vulnerability, which can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell.", "fork": false, "created_at": "2021-12-14T14:46:08Z", "updated_at": "2021-12-14T15:04:49Z", "pushed_at": "2021-12-14T15:04:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 438291572, "name": "org.shaneking.demo.cve.y2021.s44228", "full_name": "ShaneKingBlog\/org.shaneking.demo.cve.y2021.s44228", "owner": { "login": "ShaneKingBlog", "id": 76613703, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76613703?v=4", "html_url": "https:\/\/github.com\/ShaneKingBlog", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ShaneKingBlog\/org.shaneking.demo.cve.y2021.s44228", "description": "CVE-2021-44228", "fork": false, "created_at": "2021-12-14T14:51:26Z", "updated_at": "2021-12-14T18:03:52Z", "pushed_at": "2021-12-14T18:03:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438299030, "name": "log4j", "full_name": "wortell\/log4j", "owner": { "login": "wortell", "id": 54625905, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54625905?v=4", "html_url": "https:\/\/github.com\/wortell", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wortell\/log4j", "description": "Repo containing all info, scripts, etc. related to CVE-2021-44228", "fork": false, "created_at": "2021-12-14T15:13:06Z", "updated_at": "2024-03-21T04:34:22Z", "pushed_at": "2021-12-29T19:46:22Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 10, "score": 0, "subscribers_count": 4 }, { "id": 438349219, "name": "CVE-2021-44228-Scanner", "full_name": "municipalparkingservices\/CVE-2021-44228-Scanner", "owner": { "login": "municipalparkingservices", "id": 3780687, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3780687?v=4", "html_url": "https:\/\/github.com\/municipalparkingservices", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/municipalparkingservices\/CVE-2021-44228-Scanner", "description": null, "fork": false, "created_at": "2021-12-14T17:53:37Z", "updated_at": "2021-12-14T17:58:15Z", "pushed_at": "2021-12-14T17:54:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 6 }, { "id": 438353510, "name": "log4j-honeypot-flask", "full_name": "BinaryDefense\/log4j-honeypot-flask", "owner": { "login": "BinaryDefense", "id": 10130449, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10130449?v=4", "html_url": "https:\/\/github.com\/BinaryDefense", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BinaryDefense\/log4j-honeypot-flask", "description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-14T18:08:45Z", "updated_at": "2024-10-14T22:09:15Z", "pushed_at": "2021-12-20T14:44:27Z", "stargazers_count": 148, "watchers_count": 148, "has_discussions": false, "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 24, "watchers": 148, "score": 0, "subscribers_count": 6 }, { "id": 438369987, "name": "Log4jTools", "full_name": "MalwareTech\/Log4jTools", "owner": { "login": "MalwareTech", "id": 7256561, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7256561?v=4", "html_url": "https:\/\/github.com\/MalwareTech", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MalwareTech\/Log4jTools", "description": "Tools for investigating Log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-14T19:08:14Z", "updated_at": "2024-12-13T02:39:37Z", "pushed_at": "2021-12-23T21:03:08Z", "stargazers_count": 95, "watchers_count": 95, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 95, "score": 0, "subscribers_count": 7 }, { "id": 438375603, "name": "log4jail", "full_name": "mufeedvh\/log4jail", "owner": { "login": "mufeedvh", "id": 26198477, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26198477?v=4", "html_url": "https:\/\/github.com\/mufeedvh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mufeedvh\/log4jail", "description": "A firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.", "fork": false, "created_at": "2021-12-14T19:29:11Z", "updated_at": "2023-06-30T21:38:46Z", "pushed_at": "2021-12-14T21:14:33Z", "stargazers_count": 24, "watchers_count": 24, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 24, "score": 0, "subscribers_count": 4 }, { "id": 438390351, "name": "log4shellpoc", "full_name": "guerzon\/log4shellpoc", "owner": { "login": "guerzon", "id": 44284609, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44284609?v=4", "html_url": "https:\/\/github.com\/guerzon", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/guerzon\/log4shellpoc", "description": "Simple Spring Boot application vulnerable to CVE-2021-44228 (a.k.a log4shell)", "fork": false, "created_at": "2021-12-14T20:27:26Z", "updated_at": "2023-02-21T10:56:02Z", "pushed_at": "2021-12-17T23:47:41Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "jndi-exploit", "log4j", "log4j2", "penetration-testing", "proof-of-concept" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 3 }, { "id": 438406090, "name": "CVE-2021-44228_PoC", "full_name": "ab0x90\/CVE-2021-44228_PoC", "owner": { "login": "ab0x90", "id": 36925640, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36925640?v=4", "html_url": "https:\/\/github.com\/ab0x90", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ab0x90\/CVE-2021-44228_PoC", "description": null, "fork": false, "created_at": "2021-12-14T21:32:42Z", "updated_at": "2024-11-23T23:28:52Z", "pushed_at": "2021-12-15T11:23:38Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 16, "score": 0, "subscribers_count": 1 }, { "id": 438409343, "name": "log4j-remediation-tools", "full_name": "stripe\/log4j-remediation-tools", "owner": { "login": "stripe", "id": 856813, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/856813?v=4", "html_url": "https:\/\/github.com\/stripe", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/stripe\/log4j-remediation-tools", "description": "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2021-12-14T21:47:04Z", "updated_at": "2024-08-18T16:13:22Z", "pushed_at": "2023-03-21T09:51:33Z", "stargazers_count": 41, "watchers_count": 41, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "log4j2", "remediation", "tools" ], "visibility": "public", "forks": 9, "watchers": 41, "score": 0, "subscribers_count": 9 }, { "id": 438417506, "name": "log4jshield", "full_name": "xsultan\/log4jshield", "owner": { "login": "xsultan", "id": 231387, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/231387?v=4", "html_url": "https:\/\/github.com\/xsultan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xsultan\/log4jshield", "description": "Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher", "fork": false, "created_at": "2021-12-14T22:22:15Z", "updated_at": "2024-11-12T15:10:01Z", "pushed_at": "2021-12-23T04:50:38Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "cve-2021-45046", "log4j", "log4j2", "log4shell" ], "visibility": "public", "forks": 3, "watchers": 13, "score": 0, "subscribers_count": 3 }, { "id": 438418716, "name": "log4shell-finder", "full_name": "HynekPetrak\/log4shell-finder", "owner": { "login": "HynekPetrak", "id": 8593983, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8593983?v=4", "html_url": "https:\/\/github.com\/HynekPetrak", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HynekPetrak\/log4shell-finder", "description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.", "fork": false, "created_at": "2021-12-14T22:27:14Z", "updated_at": "2024-09-10T05:00:03Z", "pushed_at": "2023-06-21T11:37:03Z", "stargazers_count": 38, "watchers_count": 38, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2017-5645", "cve-2019-17571", "cve-2020-9488", "cve-2021-4104", "cve-2021-42550", "cve-2021-44228", "cve-2021-44832", "cve-2021-45046", "cve-2021-45105", "cve-2022-23302", "cve-2022-23305", "cve-2022-23307", "log4j", "log4j2", "log4shell", "scanner", "security", "vulnerability" ], "visibility": "public", "forks": 14, "watchers": 38, "score": 0, "subscribers_count": 5 }, { "id": 438423480, "name": "CVE-2021-44228", "full_name": "0xThiebaut\/CVE-2021-44228", "owner": { "login": "0xThiebaut", "id": 46688461, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46688461?v=4", "html_url": "https:\/\/github.com\/0xThiebaut", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xThiebaut\/CVE-2021-44228", "description": "CVE-2021-44228 Response Scripts", "fork": false, "created_at": "2021-12-14T22:50:05Z", "updated_at": "2021-12-15T00:30:22Z", "pushed_at": "2021-12-15T00:27:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 3 }, { "id": 438432868, "name": "CVE-2021-44228_scanner", "full_name": "CERTCC\/CVE-2021-44228_scanner", "owner": { "login": "CERTCC", "id": 37221555, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37221555?v=4", "html_url": "https:\/\/github.com\/CERTCC", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CERTCC\/CVE-2021-44228_scanner", "description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-14T23:33:51Z", "updated_at": "2024-12-31T01:18:23Z", "pushed_at": "2022-03-23T18:12:51Z", "stargazers_count": 344, "watchers_count": 344, "has_discussions": false, "forks_count": 87, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 87, "watchers": 344, "score": 0, "subscribers_count": 35 }, { "id": 438449548, "name": "CVE-2021-44228-Log4j-Payloads", "full_name": "CrackerCat\/CVE-2021-44228-Log4j-Payloads", "owner": { "login": "CrackerCat", "id": 17995064, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4", "html_url": "https:\/\/github.com\/CrackerCat", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-44228-Log4j-Payloads", "description": null, "fork": false, "created_at": "2021-12-15T00:55:12Z", "updated_at": "2023-08-15T12:50:50Z", "pushed_at": "2021-12-14T12:49:56Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 3, "score": 0, "subscribers_count": 0 }, { "id": 438469082, "name": "log4j_scanner", "full_name": "dbzoo\/log4j_scanner", "owner": { "login": "dbzoo", "id": 1550399, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1550399?v=4", "html_url": "https:\/\/github.com\/dbzoo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dbzoo\/log4j_scanner", "description": "Fast filesystem scanner for CVE-2021-44228", "fork": false, "created_at": "2021-12-15T02:29:34Z", "updated_at": "2022-01-09T18:17:10Z", "pushed_at": "2022-01-10T14:52:40Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 3 }, { "id": 438469428, "name": "CVE-2021-44228_scanner", "full_name": "jeremyrsellars\/CVE-2021-44228_scanner", "owner": { "login": "jeremyrsellars", "id": 1396319, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1396319?v=4", "html_url": "https:\/\/github.com\/jeremyrsellars", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jeremyrsellars\/CVE-2021-44228_scanner", "description": "Aims to find JndiLookup.class in nearly any directory or zip, jar, ear, war file, even deeply nested.", "fork": false, "created_at": "2021-12-15T02:31:14Z", "updated_at": "2021-12-15T22:30:35Z", "pushed_at": "2021-12-15T22:30:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 438480170, "name": "C1-WS-LOG4SHELL", "full_name": "JustinDPerkins\/C1-WS-LOG4SHELL", "owner": { "login": "JustinDPerkins", "id": 60413733, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60413733?v=4", "html_url": "https:\/\/github.com\/JustinDPerkins", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JustinDPerkins\/C1-WS-LOG4SHELL", "description": "Quick Deploy to show case cve-2021-44228", "fork": false, "created_at": "2021-12-15T03:20:25Z", "updated_at": "2021-12-17T17:07:45Z", "pushed_at": "2021-12-17T17:07:42Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438490030, "name": "Log4j-Updater", "full_name": "VinniMarcon\/Log4j-Updater", "owner": { "login": "VinniMarcon", "id": 42422427, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42422427?v=4", "html_url": "https:\/\/github.com\/VinniMarcon", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/VinniMarcon\/Log4j-Updater", "description": "Log4J Updater Bash Script to automate the framework update process on numerous machines and prevent the CVE-2021-44228", "fork": false, "created_at": "2021-12-15T04:08:15Z", "updated_at": "2021-12-16T17:25:55Z", "pushed_at": "2021-12-15T06:20:17Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 438504265, "name": "log4j-vul", "full_name": "bhprin\/log4j-vul", "owner": { "login": "bhprin", "id": 1876456, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1876456?v=4", "html_url": "https:\/\/github.com\/bhprin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bhprin\/log4j-vul", "description": "This project is just to show Apache Log4j2 Vulnerability - aka CVE-2021-44228", "fork": false, "created_at": "2021-12-15T05:19:13Z", "updated_at": "2021-12-22T04:39:30Z", "pushed_at": "2023-01-31T08:17:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438523356, "name": "CVE-2021-44228", "full_name": "avirahul007\/CVE-2021-44228", "owner": { "login": "avirahul007", "id": 63554722, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63554722?v=4", "html_url": "https:\/\/github.com\/avirahul007", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/avirahul007\/CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-15T06:40:35Z", "updated_at": "2021-12-15T06:40:35Z", "pushed_at": "2021-12-15T06:40:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438541418, "name": "log4j-log4shell-playground", "full_name": "rgl\/log4j-log4shell-playground", "owner": { "login": "rgl", "id": 43356, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43356?v=4", "html_url": "https:\/\/github.com\/rgl", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rgl\/log4j-log4shell-playground", "description": "A playground for poking at the Log4Shell (CVE-2021-44228) vulnerability mitigations", "fork": false, "created_at": "2021-12-15T07:51:12Z", "updated_at": "2021-12-16T11:59:53Z", "pushed_at": "2021-12-15T08:44:16Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "log4j", "log4shell" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 438541504, "name": "how-to-check-patch-secure-log4j-CVE-2021-44228", "full_name": "anuvindhs\/how-to-check-patch-secure-log4j-CVE-2021-44228", "owner": { "login": "anuvindhs", "id": 46879183, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46879183?v=4", "html_url": "https:\/\/github.com\/anuvindhs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/anuvindhs\/how-to-check-patch-secure-log4j-CVE-2021-44228", "description": "A one-stop repo\/ information hub for all log4j vulnerability-related information.", "fork": false, "created_at": "2021-12-15T07:51:28Z", "updated_at": "2022-03-17T16:19:51Z", "pushed_at": "2022-01-14T05:38:05Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "vulnerability-detection" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 438593574, "name": "Get-log4j-Windows.ps1", "full_name": "KeysAU\/Get-log4j-Windows.ps1", "owner": { "login": "KeysAU", "id": 38932932, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38932932?v=4", "html_url": "https:\/\/github.com\/KeysAU", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KeysAU\/Get-log4j-Windows.ps1", "description": "Identifying all log4j components across all windows servers, entire domain, can be multi domain. CVE-2021-44228", "fork": false, "created_at": "2021-12-15T10:49:36Z", "updated_at": "2022-01-12T12:25:17Z", "pushed_at": "2021-12-20T06:29:15Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 438595299, "name": "log4j-CVE-2021-44228", "full_name": "kubearmor\/log4j-CVE-2021-44228", "owner": { "login": "kubearmor", "id": 86793284, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86793284?v=4", "html_url": "https:\/\/github.com\/kubearmor", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kubearmor\/log4j-CVE-2021-44228", "description": "Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228", "fork": false, "created_at": "2021-12-15T10:55:35Z", "updated_at": "2024-07-02T20:27:26Z", "pushed_at": "2021-12-15T16:29:14Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 8, "score": 0, "subscribers_count": 6 }, { "id": 438600716, "name": "logpresso-CVE-2021-44228-Scanner", "full_name": "jyotisahu98\/logpresso-CVE-2021-44228-Scanner", "owner": { "login": "jyotisahu98", "id": 96179721, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96179721?v=4", "html_url": "https:\/\/github.com\/jyotisahu98", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jyotisahu98\/logpresso-CVE-2021-44228-Scanner", "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "fork": false, "created_at": "2021-12-15T11:15:25Z", "updated_at": "2021-12-27T14:28:30Z", "pushed_at": "2021-12-15T11:15:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438605924, "name": "log4j-resources", "full_name": "gitlab-de\/log4j-resources", "owner": { "login": "gitlab-de", "id": 75491323, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75491323?v=4", "html_url": "https:\/\/github.com\/gitlab-de", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gitlab-de\/log4j-resources", "description": "This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 and CVE-2021-45046 (mirror from GitLab.com)", "fork": false, "created_at": "2021-12-15T11:34:02Z", "updated_at": "2021-12-18T15:25:17Z", "pushed_at": "2021-12-18T15:25:14Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "cve-2021-45046", "log4j" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 438615335, "name": "Log4JHunt", "full_name": "redhuntlabs\/Log4JHunt", "owner": { "login": "redhuntlabs", "id": 36505047, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36505047?v=4", "html_url": "https:\/\/github.com\/redhuntlabs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/redhuntlabs\/Log4JHunt", "description": "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.", "fork": false, "created_at": "2021-12-15T12:07:05Z", "updated_at": "2024-05-11T11:36:22Z", "pushed_at": "2021-12-17T07:41:47Z", "stargazers_count": 43, "watchers_count": 43, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 43, "score": 0, "subscribers_count": 3 }, { "id": 438635569, "name": "log4shell-hotfix-side-effect", "full_name": "mss\/log4shell-hotfix-side-effect", "owner": { "login": "mss", "id": 5391, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5391?v=4", "html_url": "https:\/\/github.com\/mss", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mss\/log4shell-hotfix-side-effect", "description": "Test case to check if the Log4Shell\/CVE-2021-44228 hotfix will raise any unexpected exceptions", "fork": false, "created_at": "2021-12-15T13:14:34Z", "updated_at": "2023-02-28T20:50:34Z", "pushed_at": "2021-12-18T12:02:09Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "java", "log4shell" ], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 438664340, "name": "log4j-vuln-coverage-check", "full_name": "MeterianHQ\/log4j-vuln-coverage-check", "owner": { "login": "MeterianHQ", "id": 28596672, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28596672?v=4", "html_url": "https:\/\/github.com\/MeterianHQ", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MeterianHQ\/log4j-vuln-coverage-check", "description": "A simple project to check coverage of Log4J vuln CVE-2021-44228 (and related)", "fork": false, "created_at": "2021-12-15T14:44:14Z", "updated_at": "2021-12-16T14:00:05Z", "pushed_at": "2022-12-01T09:18:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 3 }, { "id": 438680847, "name": "jmeter-fix-cve-2021-44228-windows", "full_name": "sebiboga\/jmeter-fix-cve-2021-44228-windows", "owner": { "login": "sebiboga", "id": 41440889, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41440889?v=4", "html_url": "https:\/\/github.com\/sebiboga", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sebiboga\/jmeter-fix-cve-2021-44228-windows", "description": "fix cve 44228 for windows", "fork": false, "created_at": "2021-12-15T15:34:19Z", "updated_at": "2021-12-15T15:50:19Z", "pushed_at": "2021-12-15T15:51:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 438683307, "name": "log4shell-cloud-scanner", "full_name": "mitiga\/log4shell-cloud-scanner", "owner": { "login": "mitiga", "id": 82891013, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82891013?v=4", "html_url": "https:\/\/github.com\/mitiga", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mitiga\/log4shell-cloud-scanner", "description": "we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them", "fork": false, "created_at": "2021-12-15T15:42:06Z", "updated_at": "2022-01-04T14:01:16Z", "pushed_at": "2021-12-17T16:00:03Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 13, "score": 0, "subscribers_count": 4 }, { "id": 438689577, "name": "Log4j", "full_name": "isuruwa\/Log4j", "owner": { "login": "isuruwa", "id": 72663288, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72663288?v=4", "html_url": "https:\/\/github.com\/isuruwa", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/isuruwa\/Log4j", "description": "A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-15T16:01:36Z", "updated_at": "2024-08-12T20:18:56Z", "pushed_at": "2022-08-06T15:26:04Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "java", "log4j" ], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 2 }, { "id": 438692384, "name": "log4shell-data", "full_name": "honeynet\/log4shell-data", "owner": { "login": "honeynet", "id": 3327517, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3327517?v=4", "html_url": "https:\/\/github.com\/honeynet", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/honeynet\/log4shell-data", "description": "Data we are receiving from our honeypots about CVE-2021-44228", "fork": false, "created_at": "2021-12-15T16:10:54Z", "updated_at": "2022-10-14T09:19:33Z", "pushed_at": "2021-12-16T16:08:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 4 }, { "id": 438695688, "name": "checkmk-log4j-scanner", "full_name": "inettgmbh\/checkmk-log4j-scanner", "owner": { "login": "inettgmbh", "id": 12827152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12827152?v=4", "html_url": "https:\/\/github.com\/inettgmbh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/inettgmbh\/checkmk-log4j-scanner", "description": "Scans for Log4j versions effected by CVE-2021-44228", "fork": false, "created_at": "2021-12-15T16:21:26Z", "updated_at": "2024-05-13T12:42:03Z", "pushed_at": "2024-05-13T12:44:51Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "checkmk", "log4j" ], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 4 }, { "id": 438719808, "name": "CVE-2021-44228", "full_name": "b1tm0n3r\/CVE-2021-44228", "owner": { "login": "b1tm0n3r", "id": 61518601, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61518601?v=4", "html_url": "https:\/\/github.com\/b1tm0n3r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/b1tm0n3r\/CVE-2021-44228", "description": "CVE-2021-44228 demo webapp", "fork": false, "created_at": "2021-12-15T17:42:13Z", "updated_at": "2021-12-20T19:25:27Z", "pushed_at": "2021-12-20T19:25:24Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438739105, "name": "CVE-2021-44228-Log4j", "full_name": "VerveIndustrialProtection\/CVE-2021-44228-Log4j", "owner": { "login": "VerveIndustrialProtection", "id": 96202973, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96202973?v=4", "html_url": "https:\/\/github.com\/VerveIndustrialProtection", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/VerveIndustrialProtection\/CVE-2021-44228-Log4j", "description": null, "fork": false, "created_at": "2021-12-15T18:51:07Z", "updated_at": "2022-01-01T14:37:49Z", "pushed_at": "2022-01-04T21:10:54Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0, "subscribers_count": 3 }, { "id": 438745261, "name": "log4j", "full_name": "alenazi90\/log4j", "owner": { "login": "alenazi90", "id": 3836915, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3836915?v=4", "html_url": "https:\/\/github.com\/alenazi90", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alenazi90\/log4j", "description": "An automated header extensive scanner for detecting log4j RCE CVE-2021-44228", "fork": false, "created_at": "2021-12-15T19:15:00Z", "updated_at": "2021-12-16T15:10:52Z", "pushed_at": "2021-12-15T19:21:02Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 3 }, { "id": 438747026, "name": "log4j-cve-2021-44228", "full_name": "pmontesd\/log4j-cve-2021-44228", "owner": { "login": "pmontesd", "id": 8183561, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8183561?v=4", "html_url": "https:\/\/github.com\/pmontesd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pmontesd\/log4j-cve-2021-44228", "description": "Very simple Ansible playbook that scan filesystem for JAR files vulnerable to Log4Shell", "fork": false, "created_at": "2021-12-15T19:21:39Z", "updated_at": "2022-01-12T13:13:44Z", "pushed_at": "2021-12-15T20:39:16Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 438756678, "name": "log4shell", "full_name": "LiveOverflow\/log4shell", "owner": { "login": "LiveOverflow", "id": 12161158, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12161158?v=4", "html_url": "https:\/\/github.com\/LiveOverflow", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LiveOverflow\/log4shell", "description": "Small example repo for looking into log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-15T19:59:38Z", "updated_at": "2025-01-13T00:14:43Z", "pushed_at": "2021-12-24T15:44:53Z", "stargazers_count": 70, "watchers_count": 70, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 70, "score": 0, "subscribers_count": 2 }, { "id": 438761150, "name": "kubernetes-log4j-cve-2021-44228-node-agent", "full_name": "aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent", "owner": { "login": "aws-samples", "id": 8931462, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931462?v=4", "html_url": "https:\/\/github.com\/aws-samples", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent", "description": null, "fork": false, "created_at": "2021-12-15T20:17:41Z", "updated_at": "2023-10-19T15:47:11Z", "pushed_at": "2022-08-26T14:56:01Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 18, "watchers": 2, "score": 0, "subscribers_count": 7 }, { "id": 438773632, "name": "Log4Shell-Honeypot", "full_name": "michaelsanford\/Log4Shell-Honeypot", "owner": { "login": "michaelsanford", "id": 1800499, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1800499?v=4", "html_url": "https:\/\/github.com\/michaelsanford", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/michaelsanford\/Log4Shell-Honeypot", "description": "Dockerized honeypot for CVE-2021-44228.", "fork": false, "created_at": "2021-12-15T21:09:00Z", "updated_at": "2023-06-22T04:46:02Z", "pushed_at": "2025-01-08T06:45:48Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "docker", "honeypot", "python" ], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 3 }, { "id": 438791130, "name": "Log4Pot", "full_name": "thomaspatzke\/Log4Pot", "owner": { "login": "thomaspatzke", "id": 1845601, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1845601?v=4", "html_url": "https:\/\/github.com\/thomaspatzke", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thomaspatzke\/Log4Pot", "description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).", "fork": false, "created_at": "2021-12-15T22:30:34Z", "updated_at": "2024-12-01T11:52:36Z", "pushed_at": "2024-11-29T22:56:57Z", "stargazers_count": 91, "watchers_count": 91, "has_discussions": true, "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 28, "watchers": 91, "score": 0, "subscribers_count": 7 }, { "id": 438797049, "name": "cve-2021-44228-rce-poc", "full_name": "ubitech\/cve-2021-44228-rce-poc", "owner": { "login": "ubitech", "id": 998323, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/998323?v=4", "html_url": "https:\/\/github.com\/ubitech", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ubitech\/cve-2021-44228-rce-poc", "description": "A Remote Code Execution PoC for Log4Shell (CVE-2021-44228)", "fork": false, "created_at": "2021-12-15T23:00:25Z", "updated_at": "2024-04-19T14:29:37Z", "pushed_at": "2021-12-15T23:03:44Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 6 }, { "id": 438825521, "name": "log4v-vuln-check", "full_name": "rv4l3r3\/log4v-vuln-check", "owner": { "login": "rv4l3r3", "id": 90338959, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90338959?v=4", "html_url": "https:\/\/github.com\/rv4l3r3", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rv4l3r3\/log4v-vuln-check", "description": "This script is used to perform a fast check if your server is possibly affected by CVE-2021-44228 (the log4j vulnerability).", "fork": false, "created_at": "2021-12-16T01:38:25Z", "updated_at": "2021-12-20T22:11:34Z", "pushed_at": "2021-12-20T22:11:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438853805, "name": "log4j_scanner_wrapper", "full_name": "dpomnean\/log4j_scanner_wrapper", "owner": { "login": "dpomnean", "id": 17032114, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17032114?v=4", "html_url": "https:\/\/github.com\/dpomnean", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dpomnean\/log4j_scanner_wrapper", "description": "log4j vulnerability wrapper scanner for CVE-2021-44228", "fork": false, "created_at": "2021-12-16T03:57:41Z", "updated_at": "2021-12-17T15:23:34Z", "pushed_at": "2021-12-16T14:10:25Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 438920047, "name": "CVE-2021-44228", "full_name": "roxas-tan\/CVE-2021-44228", "owner": { "login": "roxas-tan", "id": 63656689, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63656689?v=4", "html_url": "https:\/\/github.com\/roxas-tan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/roxas-tan\/CVE-2021-44228", "description": "This Log4j RCE exploit originated from https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce", "fork": false, "created_at": "2021-12-16T08:46:55Z", "updated_at": "2023-11-29T06:51:14Z", "pushed_at": "2021-12-16T08:59:14Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 10, "score": 0, "subscribers_count": 2 }, { "id": 438931405, "name": "CVE-2021-44228", "full_name": "shamo0\/CVE-2021-44228", "owner": { "login": "shamo0", "id": 48299520, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4", "html_url": "https:\/\/github.com\/shamo0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shamo0\/CVE-2021-44228", "description": "log4shell (CVE-2021-44228) scanning tool", "fork": false, "created_at": "2021-12-16T09:26:37Z", "updated_at": "2024-12-18T14:20:14Z", "pushed_at": "2021-12-16T10:00:15Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "2021", "44228", "apache", "code", "cve", "cve-2021-44228", "execution", "exploit", "log", "log4j", "log4j2", "log4shell", "logging", "poc", "rce", "remote", "scanner", "scanning", "tool" ], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 438940454, "name": "log4j-Scan-Burpsuite", "full_name": "snow0715\/log4j-Scan-Burpsuite", "owner": { "login": "snow0715", "id": 54879520, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54879520?v=4", "html_url": "https:\/\/github.com\/snow0715", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/snow0715\/log4j-Scan-Burpsuite", "description": "Log4j漏洞(CVE-2021-44228)的Burpsuite检测插件", "fork": false, "created_at": "2021-12-16T09:58:02Z", "updated_at": "2024-04-07T08:54:48Z", "pushed_at": "2022-01-26T03:51:30Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 13, "score": 0, "subscribers_count": 1 }, { "id": 438951347, "name": "Log4j-Windows-Scanner", "full_name": "Joefreedy\/Log4j-Windows-Scanner", "owner": { "login": "Joefreedy", "id": 47759132, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47759132?v=4", "html_url": "https:\/\/github.com\/Joefreedy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Joefreedy\/Log4j-Windows-Scanner", "description": "CVE-2021-44228 vulnerability in Apache Log4j library | Log4j vulnerability scanner on Windows machines.", "fork": false, "created_at": "2021-12-16T10:37:16Z", "updated_at": "2022-03-29T19:51:54Z", "pushed_at": "2022-10-05T11:18:26Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 3 }, { "id": 438971911, "name": "log4fix", "full_name": "Nanitor\/log4fix", "owner": { "login": "Nanitor", "id": 6453685, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6453685?v=4", "html_url": "https:\/\/github.com\/Nanitor", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nanitor\/log4fix", "description": "Detect and fix log4j log4shell vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2021-12-16T11:54:11Z", "updated_at": "2022-09-22T23:48:42Z", "pushed_at": "2021-12-24T13:08:46Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 12, "score": 0, "subscribers_count": 7 }, { "id": 438979039, "name": "scanlist-log4j", "full_name": "Gyrfalc0n\/scanlist-log4j", "owner": { "login": "Gyrfalc0n", "id": 46728024, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46728024?v=4", "html_url": "https:\/\/github.com\/Gyrfalc0n", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Gyrfalc0n\/scanlist-log4j", "description": "Simple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2021-12-16T12:20:00Z", "updated_at": "2021-12-20T15:36:11Z", "pushed_at": "2022-01-12T08:53:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438985997, "name": "log4shell-demo", "full_name": "korteke\/log4shell-demo", "owner": { "login": "korteke", "id": 2558348, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2558348?v=4", "html_url": "https:\/\/github.com\/korteke", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/korteke\/log4shell-demo", "description": "Simple webapp that is vulnerable to Log4Shell (CVE-2021-44228)", "fork": false, "created_at": "2021-12-16T12:44:24Z", "updated_at": "2021-12-22T12:14:02Z", "pushed_at": "2023-02-13T22:30:21Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 438992218, "name": "vuln_spring_log4j2", "full_name": "recanavar\/vuln_spring_log4j2", "owner": { "login": "recanavar", "id": 9977753, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9977753?v=4", "html_url": "https:\/\/github.com\/recanavar", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/recanavar\/vuln_spring_log4j2", "description": "Simple Vulnerable Spring Boot Application to Test the CVE-2021-44228 ", "fork": false, "created_at": "2021-12-16T13:05:38Z", "updated_at": "2021-12-16T15:50:45Z", "pushed_at": "2021-12-16T14:34:19Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "java", "log4j2", "spring" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438998103, "name": "Burp-Log4j-HammerTime", "full_name": "DXC-StrikeForce\/Burp-Log4j-HammerTime", "owner": { "login": "DXC-StrikeForce", "id": 77387831, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77387831?v=4", "html_url": "https:\/\/github.com\/DXC-StrikeForce", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DXC-StrikeForce\/Burp-Log4j-HammerTime", "description": "Burp Active Scan extension to identify Log4j vulnerabilities CVE-2021-44228 and CVE-2021-45046", "fork": false, "created_at": "2021-12-16T13:25:03Z", "updated_at": "2022-01-08T17:32:58Z", "pushed_at": "2021-12-16T17:02:30Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 8, "score": 0, "subscribers_count": 2 }, { "id": 439018822, "name": "log4j-filescan", "full_name": "andalik\/log4j-filescan", "owner": { "login": "andalik", "id": 12278569, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12278569?v=4", "html_url": "https:\/\/github.com\/andalik", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/andalik\/log4j-filescan", "description": "Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)", "fork": false, "created_at": "2021-12-16T14:29:05Z", "updated_at": "2022-03-05T22:52:28Z", "pushed_at": "2022-03-05T23:01:15Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 439019569, "name": "CVE-2021-44228-Apache-Log4j", "full_name": "lonecloud\/CVE-2021-44228-Apache-Log4j", "owner": { "login": "lonecloud", "id": 17854123, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17854123?v=4", "html_url": "https:\/\/github.com\/lonecloud", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lonecloud\/CVE-2021-44228-Apache-Log4j", "description": "CVE-2021-44228-Apache-Log4j", "fork": false, "created_at": "2021-12-16T14:31:14Z", "updated_at": "2021-12-16T14:31:45Z", "pushed_at": "2021-12-16T14:31:42Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 439030654, "name": "CVE-2021-44228", "full_name": "gyaansastra\/CVE-2021-44228", "owner": { "login": "gyaansastra", "id": 35690123, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4", "html_url": "https:\/\/github.com\/gyaansastra", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gyaansastra\/CVE-2021-44228", "description": "Log4Shell CVE-2021-44228 Vulnerability Scanner and POC", "fork": false, "created_at": "2021-12-16T15:04:23Z", "updated_at": "2021-12-21T05:46:51Z", "pushed_at": "2021-12-21T07:03:36Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 439060792, "name": "CVE-2021-44228", "full_name": "axisops\/CVE-2021-44228", "owner": { "login": "axisops", "id": 5512152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5512152?v=4", "html_url": "https:\/\/github.com\/axisops", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/axisops\/CVE-2021-44228", "description": "log4j mitigation work", "fork": false, "created_at": "2021-12-16T16:42:44Z", "updated_at": "2021-12-16T16:42:44Z", "pushed_at": "2021-12-16T16:42:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439071699, "name": "MyLog4Shell", "full_name": "kal1gh0st\/MyLog4Shell", "owner": { "login": "kal1gh0st", "id": 56889513, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4", "html_url": "https:\/\/github.com\/kal1gh0st", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kal1gh0st\/MyLog4Shell", "description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading", "fork": false, "created_at": "2021-12-16T17:21:22Z", "updated_at": "2022-02-25T00:05:36Z", "pushed_at": "2021-12-30T23:42:20Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 439071959, "name": "log4shell", "full_name": "hozyx\/log4shell", "owner": { "login": "hozyx", "id": 96227119, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96227119?v=4", "html_url": "https:\/\/github.com\/hozyx", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hozyx\/log4shell", "description": "Applications that are vulnerable to the log4j CVE-2021-44228\/45046 issue may be detectable by scanning jar, war, ear, zip files to search for the presence of JndiLookup.class.", "fork": false, "created_at": "2021-12-16T17:22:17Z", "updated_at": "2021-12-16T19:22:07Z", "pushed_at": "2021-12-16T19:22:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439077328, "name": "Log4J_checker", "full_name": "andypitcher\/Log4J_checker", "owner": { "login": "andypitcher", "id": 12878731, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12878731?v=4", "html_url": "https:\/\/github.com\/andypitcher", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/andypitcher\/Log4J_checker", "description": "Log4J checker for Apache CVE-2021-44228", "fork": false, "created_at": "2021-12-16T17:41:47Z", "updated_at": "2023-05-07T15:43:13Z", "pushed_at": "2021-12-16T18:28:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439093094, "name": "log4j-cve-2021-44228", "full_name": "Vulnmachines\/log4j-cve-2021-44228", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Vulnmachines\/log4j-cve-2021-44228", "description": null, "fork": false, "created_at": "2021-12-16T18:42:08Z", "updated_at": "2021-12-16T18:42:11Z", "pushed_at": "2021-12-16T18:42:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439112800, "name": "CVE-2021-44228-Apache-Log4j-Rce", "full_name": "kannthu\/CVE-2021-44228-Apache-Log4j-Rce", "owner": { "login": "kannthu", "id": 22802035, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22802035?v=4", "html_url": "https:\/\/github.com\/kannthu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kannthu\/CVE-2021-44228-Apache-Log4j-Rce", "description": null, "fork": false, "created_at": "2021-12-16T20:02:09Z", "updated_at": "2021-12-16T20:05:17Z", "pushed_at": "2021-12-16T20:05:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439129728, "name": "CVE-2021-44228", "full_name": "Kr0ff\/CVE-2021-44228", "owner": { "login": "Kr0ff", "id": 35173514, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4", "html_url": "https:\/\/github.com\/Kr0ff", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Kr0ff\/CVE-2021-44228", "description": "Log4Shell Proof of Concept (CVE-2021-44228)", "fork": false, "created_at": "2021-12-16T21:19:17Z", "updated_at": "2023-08-15T12:51:08Z", "pushed_at": "2022-04-21T13:23:40Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 439151562, "name": "log4shell4shell", "full_name": "suuhm\/log4shell4shell", "owner": { "login": "suuhm", "id": 11504990, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11504990?v=4", "html_url": "https:\/\/github.com\/suuhm", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/suuhm\/log4shell4shell", "description": "Log4shell - Multi-Toolkit. Find, Fix & Test possible CVE-2021-44228 vulneraries - provides a complete LOG4SHELL test\/attack environment on shell", "fork": false, "created_at": "2021-12-16T23:13:09Z", "updated_at": "2022-04-23T23:26:29Z", "pushed_at": "2021-12-23T00:09:08Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "checker", "hacking", "linux", "log4j", "log4j2", "log4shell", "macos", "patch", "penetration-testing", "pentesting", "proof-of-concept", "scanner", "security", "tomcat", "vulnerability-scanners", "windows" ], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 439179362, "name": "log4shell-test-exploit", "full_name": "wajda\/log4shell-test-exploit", "owner": { "login": "wajda", "id": 795479, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/795479?v=4", "html_url": "https:\/\/github.com\/wajda", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wajda\/log4shell-test-exploit", "description": "Test exploit of CVE-2021-44228", "fork": false, "created_at": "2021-12-17T01:50:22Z", "updated_at": "2021-12-23T13:48:51Z", "pushed_at": "2021-12-23T13:48:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439208776, "name": "log4shell-poc-lab", "full_name": "obscuritylabs\/log4shell-poc-lab", "owner": { "login": "obscuritylabs", "id": 36056630, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36056630?v=4", "html_url": "https:\/\/github.com\/obscuritylabs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/obscuritylabs\/log4shell-poc-lab", "description": "A lab demonstration of the log4shell vulnerability: CVE-2021-44228", "fork": false, "created_at": "2021-12-17T04:20:40Z", "updated_at": "2023-07-23T00:49:26Z", "pushed_at": "2021-12-17T17:21:50Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": true, "topics": [], "visibility": "public", "forks": 1, "watchers": 9, "score": 0, "subscribers_count": 5 }, { "id": 439217985, "name": "vCenter-Server-Workaround-Script-CVE-2021-44228", "full_name": "Fazmin\/vCenter-Server-Workaround-Script-CVE-2021-44228", "owner": { "login": "Fazmin", "id": 1432117, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1432117?v=4", "html_url": "https:\/\/github.com\/Fazmin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Fazmin\/vCenter-Server-Workaround-Script-CVE-2021-44228", "description": "Script - Workaround instructions to address CVE-2021-44228 in vCenter Server ", "fork": false, "created_at": "2021-12-17T05:14:05Z", "updated_at": "2023-03-19T00:01:25Z", "pushed_at": "2022-01-13T14:19:13Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 439234639, "name": "CVE-2021-44228-Log4j-PoC-RCE", "full_name": "Grupo-Kapa-7\/CVE-2021-44228-Log4j-PoC-RCE", "owner": { "login": "Grupo-Kapa-7", "id": 80293225, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80293225?v=4", "html_url": "https:\/\/github.com\/Grupo-Kapa-7", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Grupo-Kapa-7\/CVE-2021-44228-Log4j-PoC-RCE", "description": "PoC RCE Log4j CVE-2021-4428 para pruebas", "fork": false, "created_at": "2021-12-17T06:34:51Z", "updated_at": "2021-12-17T06:38:25Z", "pushed_at": "2022-01-04T16:58:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 439263342, "name": "CVE-2021-44228_scanner", "full_name": "rohan-flutterint\/CVE-2021-44228_scanner", "owner": { "login": "rohan-flutterint", "id": 82864904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82864904?v=4", "html_url": "https:\/\/github.com\/rohan-flutterint", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rohan-flutterint\/CVE-2021-44228_scanner", "description": null, "fork": false, "created_at": "2021-12-17T08:32:20Z", "updated_at": "2021-12-17T08:32:31Z", "pushed_at": "2021-12-17T08:32:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439273329, "name": "Fix-Log4j-PowershellScript", "full_name": "sysadmin0815\/Fix-Log4j-PowershellScript", "owner": { "login": "sysadmin0815", "id": 81157346, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81157346?v=4", "html_url": "https:\/\/github.com\/sysadmin0815", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sysadmin0815\/Fix-Log4j-PowershellScript", "description": "Log4Shell mitigation (CVE-2021-44228) - search and remove JNDI class from *log4j*.jar files on the system with Powershell (Windows)", "fork": false, "created_at": "2021-12-17T09:09:56Z", "updated_at": "2024-05-08T09:50:15Z", "pushed_at": "2021-12-23T10:44:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439273557, "name": "log4j-lookups-vulnerability", "full_name": "RenYuH\/log4j-lookups-vulnerability", "owner": { "login": "RenYuH", "id": 25149383, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25149383?v=4", "html_url": "https:\/\/github.com\/RenYuH", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RenYuH\/log4j-lookups-vulnerability", "description": "Log4j2 Vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2021-12-17T09:10:50Z", "updated_at": "2021-12-17T09:52:30Z", "pushed_at": "2021-12-17T09:52:28Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439288883, "name": "py-log4shellscanner", "full_name": "scheibling\/py-log4shellscanner", "owner": { "login": "scheibling", "id": 24367830, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24367830?v=4", "html_url": "https:\/\/github.com\/scheibling", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/scheibling\/py-log4shellscanner", "description": "Scanner for the Log4j vulnerability dubbed Log4Shell (CVE-2021-44228)", "fork": false, "created_at": "2021-12-17T10:06:07Z", "updated_at": "2021-12-17T10:40:07Z", "pushed_at": "2021-12-17T10:40:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439296638, "name": "CVE-2021-44228", "full_name": "zaneef\/CVE-2021-44228", "owner": { "login": "zaneef", "id": 54664755, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54664755?v=4", "html_url": "https:\/\/github.com\/zaneef", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zaneef\/CVE-2021-44228", "description": "Log4Shell (CVE-2021-44228): Descrizione, Exploitation e Mitigazione", "fork": false, "created_at": "2021-12-17T10:36:16Z", "updated_at": "2021-12-21T11:08:13Z", "pushed_at": "2021-12-21T08:50:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "jndi-exploit", "jndi-lookups", "log4j2", "log4shell" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439330776, "name": "log4j-quick-scan", "full_name": "metodidavidovic\/log4j-quick-scan", "owner": { "login": "metodidavidovic", "id": 75225635, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75225635?v=4", "html_url": "https:\/\/github.com\/metodidavidovic", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/metodidavidovic\/log4j-quick-scan", "description": "Scan your IP network and determine hosts with possible CVE-2021-44228 vulnerability in log4j library.", "fork": false, "created_at": "2021-12-17T12:49:59Z", "updated_at": "2021-12-21T14:51:50Z", "pushed_at": "2021-12-21T14:51:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439385857, "name": "log4shell-iocs", "full_name": "WatchGuard-Threat-Lab\/log4shell-iocs", "owner": { "login": "WatchGuard-Threat-Lab", "id": 31286181, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31286181?v=4", "html_url": "https:\/\/github.com\/WatchGuard-Threat-Lab", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WatchGuard-Threat-Lab\/log4shell-iocs", "description": "A collection of IOCs for CVE-2021-44228 also known as Log4Shell", "fork": false, "created_at": "2021-12-17T15:58:14Z", "updated_at": "2021-12-17T15:59:33Z", "pushed_at": "2021-12-17T15:58:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439393950, "name": "log4j-patched", "full_name": "Aschen\/log4j-patched", "owner": { "login": "Aschen", "id": 4447392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4447392?v=4", "html_url": "https:\/\/github.com\/Aschen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Aschen\/log4j-patched", "description": "Provide patched version of Log4J against CVE-2021-44228 and CVE-2021-45046 as well as a script to manually patch it yourself", "fork": false, "created_at": "2021-12-17T16:26:12Z", "updated_at": "2021-12-19T18:29:10Z", "pushed_at": "2021-12-17T18:41:35Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 439409726, "name": "cve-2021-44228", "full_name": "Nikolas-Charalambidis\/cve-2021-44228", "owner": { "login": "Nikolas-Charalambidis", "id": 21295587, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21295587?v=4", "html_url": "https:\/\/github.com\/Nikolas-Charalambidis", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nikolas-Charalambidis\/cve-2021-44228", "description": "A simple simulation of the infamous CVE-2021-44228 issue.", "fork": false, "created_at": "2021-12-17T17:23:47Z", "updated_at": "2022-12-02T02:40:53Z", "pushed_at": "2021-12-18T13:45:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "java", "java-11", "log4j", "security" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439420251, "name": "detect-log4j-exploitable", "full_name": "m0rath\/detect-log4j-exploitable", "owner": { "login": "m0rath", "id": 17716312, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17716312?v=4", "html_url": "https:\/\/github.com\/m0rath", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/m0rath\/detect-log4j-exploitable", "description": "CVE-2021-44228", "fork": false, "created_at": "2021-12-17T18:03:50Z", "updated_at": "2021-12-20T17:53:14Z", "pushed_at": "2021-12-20T17:53:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439430099, "name": "CVE-2021-44228-VULN-APP", "full_name": "nu11secur1ty\/CVE-2021-44228-VULN-APP", "owner": { "login": "nu11secur1ty", "id": 3677559, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3677559?v=4", "html_url": "https:\/\/github.com\/nu11secur1ty", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nu11secur1ty\/CVE-2021-44228-VULN-APP", "description": null, "fork": false, "created_at": "2021-12-17T18:45:19Z", "updated_at": "2024-12-22T16:54:49Z", "pushed_at": "2023-02-22T12:12:51Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 439444176, "name": "log4j-docker", "full_name": "ankur-katiyar\/log4j-docker", "owner": { "login": "ankur-katiyar", "id": 7027426, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7027426?v=4", "html_url": "https:\/\/github.com\/ankur-katiyar", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ankur-katiyar\/log4j-docker", "description": "Docker images and k8s YAMLs for Log4j Vulnerability POC (Log4j (CVE-2021-44228 RCE Vulnerability)", "fork": false, "created_at": "2021-12-17T19:50:40Z", "updated_at": "2022-04-21T01:41:08Z", "pushed_at": "2021-12-20T16:39:28Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 439447817, "name": "Log4j-JNDIServer", "full_name": "immunityinc\/Log4j-JNDIServer", "owner": { "login": "immunityinc", "id": 17729016, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17729016?v=4", "html_url": "https:\/\/github.com\/immunityinc", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/immunityinc\/Log4j-JNDIServer", "description": "This project will help to test the Log4j CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-17T20:07:12Z", "updated_at": "2022-06-30T02:03:56Z", "pushed_at": "2021-12-22T20:17:36Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 9, "score": 0, "subscribers_count": 3 }, { "id": 439496578, "name": "PowerShell-Log4J-Scanner", "full_name": "DANSI\/PowerShell-Log4J-Scanner", "owner": { "login": "DANSI", "id": 4057240, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4057240?v=4", "html_url": "https:\/\/github.com\/DANSI", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DANSI\/PowerShell-Log4J-Scanner", "description": "can find, analyse and patch Log4J files because of CVE-2021-44228, CVE-2021-45046", "fork": false, "created_at": "2021-12-18T00:51:46Z", "updated_at": "2021-12-31T13:32:41Z", "pushed_at": "2022-03-29T21:43:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439595430, "name": "scan-log4shell", "full_name": "suniastar\/scan-log4shell", "owner": { "login": "suniastar", "id": 19646660, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19646660?v=4", "html_url": "https:\/\/github.com\/suniastar", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/suniastar\/scan-log4shell", "description": "A scanning suite to find servers affected by the log4shell flaw (CVE-2021-44228) with example to test it", "fork": false, "created_at": "2021-12-18T11:16:06Z", "updated_at": "2024-11-09T23:59:37Z", "pushed_at": "2021-12-18T15:54:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439596852, "name": "log4jvulnerability-CVE-2021-44228", "full_name": "shivakumarjayaraman\/log4jvulnerability-CVE-2021-44228", "owner": { "login": "shivakumarjayaraman", "id": 63054448, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63054448?v=4", "html_url": "https:\/\/github.com\/shivakumarjayaraman", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shivakumarjayaraman\/log4jvulnerability-CVE-2021-44228", "description": "An attempt to understand the log4j vulnerability by looking through the code", "fork": false, "created_at": "2021-12-18T11:23:35Z", "updated_at": "2021-12-18T15:32:08Z", "pushed_at": "2021-12-18T15:32:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439612080, "name": "CVE-2021-44228-PoC", "full_name": "j3kz\/CVE-2021-44228-PoC", "owner": { "login": "j3kz", "id": 6310563, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6310563?v=4", "html_url": "https:\/\/github.com\/j3kz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/j3kz\/CVE-2021-44228-PoC", "description": "Self-contained lab environment that runs the exploit safely, all from docker compose", "fork": false, "created_at": "2021-12-18T12:42:04Z", "updated_at": "2021-12-18T14:08:28Z", "pushed_at": "2021-12-18T14:08:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439658571, "name": "log4j-pcap-activity", "full_name": "Apipia\/log4j-pcap-activity", "owner": { "login": "Apipia", "id": 17787069, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17787069?v=4", "html_url": "https:\/\/github.com\/Apipia", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Apipia\/log4j-pcap-activity", "description": "A fun activity using a packet capture file from the log4j exploit (CVE-2021-44228)", "fork": false, "created_at": "2021-12-18T16:09:49Z", "updated_at": "2022-10-18T10:59:33Z", "pushed_at": "2021-12-18T16:51:29Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 439698618, "name": "log4shell-docker-lab", "full_name": "axelcurmi\/log4shell-docker-lab", "owner": { "login": "axelcurmi", "id": 23001923, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23001923?v=4", "html_url": "https:\/\/github.com\/axelcurmi", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/axelcurmi\/log4shell-docker-lab", "description": "Log4Shell (CVE-2021-44228) docker lab", "fork": false, "created_at": "2021-12-18T19:30:35Z", "updated_at": "2022-01-05T14:55:14Z", "pushed_at": "2021-12-24T10:28:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 439712818, "name": "log4j-2021-vulnerability-study", "full_name": "otaviokr\/log4j-2021-vulnerability-study", "owner": { "login": "otaviokr", "id": 3641421, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3641421?v=4", "html_url": "https:\/\/github.com\/otaviokr", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/otaviokr\/log4j-2021-vulnerability-study", "description": "This is a showcase how the Log4J vulnerability (CVE-2021-44228) could be explored. This code is safe to run, but understand what it does and how it works!", "fork": false, "created_at": "2021-12-18T20:53:06Z", "updated_at": "2022-01-22T01:46:53Z", "pushed_at": "2022-01-22T01:46:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 439769164, "name": "log4j_CVE-2021-44228", "full_name": "kkyehit\/log4j_CVE-2021-44228", "owner": { "login": "kkyehit", "id": 53825723, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53825723?v=4", "html_url": "https:\/\/github.com\/kkyehit", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kkyehit\/log4j_CVE-2021-44228", "description": null, "fork": false, "created_at": "2021-12-19T03:47:54Z", "updated_at": "2021-12-19T03:54:50Z", "pushed_at": "2021-12-19T03:54:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 439771479, "name": "inspec-log4j", "full_name": "trickyearlobe\/inspec-log4j", "owner": { "login": "trickyearlobe", "id": 3001322, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3001322?v=4", "html_url": "https:\/\/github.com\/trickyearlobe", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/trickyearlobe\/inspec-log4j", "description": "An Inspec profile to check for Log4j CVE-2021-44228 and CVE-2021-45046", "fork": false, "created_at": "2021-12-19T04:04:57Z", "updated_at": "2022-05-11T09:35:20Z", "pushed_at": "2021-12-19T05:29:33Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 439780948, "name": "Log4J-Simulation-Tool", "full_name": "TheInterception\/Log4J-Simulation-Tool", "owner": { "login": "TheInterception", "id": 58417506, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58417506?v=4", "html_url": "https:\/\/github.com\/TheInterception", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TheInterception\/Log4J-Simulation-Tool", "description": "Vulnerability analysis, patch management and exploitation tool forCVE-2021-44228 \/ CVE-2021-45046 \/ CVE-2021-4104", "fork": false, "created_at": "2021-12-19T05:13:25Z", "updated_at": "2023-08-15T12:50:36Z", "pushed_at": "2021-12-25T01:51:35Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "attackvector", "cyber-security", "ethical-hacking", "network-analysis", "redteam" ], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 439803220, "name": "Get-log4j-Windows-local", "full_name": "KeysAU\/Get-log4j-Windows-local", "owner": { "login": "KeysAU", "id": 38932932, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38932932?v=4", "html_url": "https:\/\/github.com\/KeysAU", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KeysAU\/Get-log4j-Windows-local", "description": "Identifying all log4j components across on local windows servers. CVE-2021-44228", "fork": false, "created_at": "2021-12-19T07:35:01Z", "updated_at": "2022-10-28T18:51:03Z", "pushed_at": "2021-12-19T08:09:11Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 2 }, { "id": 439839460, "name": "Log4Shell-demo", "full_name": "mschmnet\/Log4Shell-demo", "owner": { "login": "mschmnet", "id": 11050119, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11050119?v=4", "html_url": "https:\/\/github.com\/mschmnet", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mschmnet\/Log4Shell-demo", "description": "Demo to show how Log4Shell \/ CVE-2021-44228 vulnerability works", "fork": false, "created_at": "2021-12-19T10:57:16Z", "updated_at": "2022-10-14T01:29:51Z", "pushed_at": "2021-12-23T11:59:53Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 439882882, "name": "Log4j_scan_Advance", "full_name": "Rk-000\/Log4j_scan_Advance", "owner": { "login": "Rk-000", "id": 72359463, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72359463?v=4", "html_url": "https:\/\/github.com\/Rk-000", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Rk-000\/Log4j_scan_Advance", "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228", "fork": false, "created_at": "2021-12-19T14:20:54Z", "updated_at": "2024-03-21T12:57:10Z", "pushed_at": "2021-12-19T14:23:37Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 439889436, "name": "Log4jCenter", "full_name": "puzzlepeaches\/Log4jCenter", "owner": { "login": "puzzlepeaches", "id": 8538866, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4", "html_url": "https:\/\/github.com\/puzzlepeaches", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jCenter", "description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ", "fork": false, "created_at": "2021-12-19T14:48:30Z", "updated_at": "2024-12-06T23:54:00Z", "pushed_at": "2021-12-22T15:56:21Z", "stargazers_count": 104, "watchers_count": 104, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 22, "watchers": 104, "score": 0, "subscribers_count": 7 }, { "id": 439931338, "name": "log4shell-rmi-poc", "full_name": "Labout\/log4shell-rmi-poc", "owner": { "login": "Labout", "id": 28622593, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28622593?v=4", "html_url": "https:\/\/github.com\/Labout", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Labout\/log4shell-rmi-poc", "description": "A Proof of Concept of the Log4j vulnerabilities (CVE-2021-44228) over Java-RMI", "fork": false, "created_at": "2021-12-19T17:53:31Z", "updated_at": "2024-07-27T04:16:01Z", "pushed_at": "2021-12-19T22:09:40Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 440009725, "name": "f-for-java", "full_name": "TotallyNotAHaxxer\/f-for-java", "owner": { "login": "TotallyNotAHaxxer", "id": 87203697, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87203697?v=4", "html_url": "https:\/\/github.com\/TotallyNotAHaxxer", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TotallyNotAHaxxer\/f-for-java", "description": "a project written in go and java i abandoned for CVE-2021-44228 try to fix it if you can XD", "fork": false, "created_at": "2021-12-20T01:31:06Z", "updated_at": "2021-12-24T18:06:45Z", "pushed_at": "2022-12-16T03:57:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 440029288, "name": "log4j2-exploit", "full_name": "spasam\/log4j2-exploit", "owner": { "login": "spasam", "id": 438507, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/438507?v=4", "html_url": "https:\/\/github.com\/spasam", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/spasam\/log4j2-exploit", "description": "log4j2 Log4Shell CVE-2021-44228 proof of concept", "fork": false, "created_at": "2021-12-20T03:16:01Z", "updated_at": "2021-12-21T18:32:07Z", "pushed_at": "2021-12-20T03:19:10Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "log4j2", "log4shell" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 440140065, "name": "cve-2021-44228-log4j-test", "full_name": "bumheehan\/cve-2021-44228-log4j-test", "owner": { "login": "bumheehan", "id": 15325225, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15325225?v=4", "html_url": "https:\/\/github.com\/bumheehan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bumheehan\/cve-2021-44228-log4j-test", "description": null, "fork": false, "created_at": "2021-12-20T11:07:21Z", "updated_at": "2021-12-22T04:27:08Z", "pushed_at": "2021-12-22T04:27:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 440177006, "name": "log4shell-war-fixer", "full_name": "dmitsuo\/log4shell-war-fixer", "owner": { "login": "dmitsuo", "id": 1348764, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1348764?v=4", "html_url": "https:\/\/github.com\/dmitsuo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dmitsuo\/log4shell-war-fixer", "description": "Shell script to remove JndiLookup class from Log4J 2 jar file, inside WAR file, in order to mitigate CVE-2021-44228, a.k.a., #Log4Shell", "fork": false, "created_at": "2021-12-20T13:18:57Z", "updated_at": "2021-12-20T19:21:49Z", "pushed_at": "2021-12-20T16:04:25Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j", "log4shell" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 440183835, "name": "Log4jShell-Scan", "full_name": "Y0-kan\/Log4jShell-Scan", "owner": { "login": "Y0-kan", "id": 96424613, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96424613?v=4", "html_url": "https:\/\/github.com\/Y0-kan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Y0-kan\/Log4jShell-Scan", "description": "log4j2 RCE漏洞(CVE-2021-44228)内网扫描器,可用于在不出网的条件下进行漏洞扫描,帮助企业内部快速发现Log4jShell漏洞。", "fork": false, "created_at": "2021-12-20T13:41:35Z", "updated_at": "2024-11-29T01:08:17Z", "pushed_at": "2021-12-21T06:11:58Z", "stargazers_count": 37, "watchers_count": 37, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 37, "score": 0, "subscribers_count": 2 }, { "id": 440216413, "name": "Log4j-Scanner-Exploit", "full_name": "julian911015\/Log4j-Scanner-Exploit", "owner": { "login": "julian911015", "id": 26369589, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26369589?v=4", "html_url": "https:\/\/github.com\/julian911015", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/julian911015\/Log4j-Scanner-Exploit", "description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.", "fork": false, "created_at": "2021-12-20T15:22:50Z", "updated_at": "2024-09-19T08:09:04Z", "pushed_at": "2024-09-03T15:22:31Z", "stargazers_count": 29, "watchers_count": 29, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 29, "score": 0, "subscribers_count": 2 }, { "id": 440220972, "name": "CVE-2021-44228---detection-with-PowerShell", "full_name": "intel-xeon\/CVE-2021-44228---detection-with-PowerShell", "owner": { "login": "intel-xeon", "id": 37773731, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37773731?v=4", "html_url": "https:\/\/github.com\/intel-xeon", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/intel-xeon\/CVE-2021-44228---detection-with-PowerShell", "description": null, "fork": false, "created_at": "2021-12-20T15:38:07Z", "updated_at": "2021-12-23T13:23:27Z", "pushed_at": "2022-06-24T08:00:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 440221338, "name": "log4j-fix-CVE-2021-44228", "full_name": "chandru-gunasekaran\/log4j-fix-CVE-2021-44228", "owner": { "login": "chandru-gunasekaran", "id": 87476739, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87476739?v=4", "html_url": "https:\/\/github.com\/chandru-gunasekaran", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/chandru-gunasekaran\/log4j-fix-CVE-2021-44228", "description": "Windows Batch Scrip to Fix the log4j-issue-CVE-2021-44228", "fork": false, "created_at": "2021-12-20T15:39:20Z", "updated_at": "2023-09-18T10:37:49Z", "pushed_at": "2021-12-23T09:19:36Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 440261792, "name": "TekiumLog4jApp", "full_name": "erickrr-bd\/TekiumLog4jApp", "owner": { "login": "erickrr-bd", "id": 77643346, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77643346?v=4", "html_url": "https:\/\/github.com\/erickrr-bd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/erickrr-bd\/TekiumLog4jApp", "description": "Java application vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-20T17:59:56Z", "updated_at": "2022-02-15T20:16:38Z", "pushed_at": "2022-03-01T00:00:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "app", "cve-2021-44228", "docker", "exploitation", "java", "jndi", "log4j2", "security", "vulnerability" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 440275278, "name": "damn-vulnerable-log4j-app", "full_name": "snapattack\/damn-vulnerable-log4j-app", "owner": { "login": "snapattack", "id": 92945688, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92945688?v=4", "html_url": "https:\/\/github.com\/snapattack", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/snapattack\/damn-vulnerable-log4j-app", "description": "Vulnerable web application to test CVE-2021-44228 \/ log4shell and forensic artifacts from an example attack", "fork": false, "created_at": "2021-12-20T18:51:52Z", "updated_at": "2024-09-30T06:41:54Z", "pushed_at": "2021-12-20T18:55:44Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 0 }, { "id": 440373235, "name": "loguccino", "full_name": "sassoftware\/loguccino", "owner": { "login": "sassoftware", "id": 5289877, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5289877?v=4", "html_url": "https:\/\/github.com\/sassoftware", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sassoftware\/loguccino", "description": "Scan and patch tool for CVE-2021-44228 and related log4j concerns. ", "fork": false, "created_at": "2021-12-21T03:01:36Z", "updated_at": "2024-05-15T16:42:25Z", "pushed_at": "2022-01-24T16:43:41Z", "stargazers_count": 34, "watchers_count": 34, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 34, "score": 0, "subscribers_count": 16 }, { "id": 440408111, "name": "apache-log4j2-CVE-2021-44228", "full_name": "xx-zhang\/apache-log4j2-CVE-2021-44228", "owner": { "login": "xx-zhang", "id": 47806549, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47806549?v=4", "html_url": "https:\/\/github.com\/xx-zhang", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xx-zhang\/apache-log4j2-CVE-2021-44228", "description": "相关的复现和文档", "fork": false, "created_at": "2021-12-21T06:03:18Z", "updated_at": "2021-12-21T06:03:18Z", "pushed_at": "2021-12-21T06:03:18Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 440439859, "name": "Log4Shell-Scanner", "full_name": "r00thunter\/Log4Shell-Scanner", "owner": { "login": "r00thunter", "id": 33806985, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33806985?v=4", "html_url": "https:\/\/github.com\/r00thunter", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/r00thunter\/Log4Shell-Scanner", "description": "Python script to detect Log4Shell Vulnerability CVE-2021-44228", "fork": false, "created_at": "2021-12-21T08:13:35Z", "updated_at": "2021-12-21T08:15:05Z", "pushed_at": "2021-12-21T08:15:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 440555354, "name": "log4j-spring-vuln-poc", "full_name": "mn-io\/log4j-spring-vuln-poc", "owner": { "login": "mn-io", "id": 4397504, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4397504?v=4", "html_url": "https:\/\/github.com\/mn-io", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mn-io\/log4j-spring-vuln-poc", "description": "POC for CVE-2021-44228 within Springboot", "fork": false, "created_at": "2021-12-21T15:00:58Z", "updated_at": "2022-02-24T22:15:47Z", "pushed_at": "2021-12-22T08:58:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 440601926, "name": "log4j2-hack-springboot", "full_name": "rejupillai\/log4j2-hack-springboot", "owner": { "login": "rejupillai", "id": 15153045, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15153045?v=4", "html_url": "https:\/\/github.com\/rejupillai", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rejupillai\/log4j2-hack-springboot", "description": "Log4j2 CVE-2021-44228 hack demo for a springboot app", "fork": false, "created_at": "2021-12-21T17:40:02Z", "updated_at": "2021-12-21T19:26:23Z", "pushed_at": "2023-03-22T05:52:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 440663893, "name": "log4j-cve-2021-44228", "full_name": "lucab85\/log4j-cve-2021-44228", "owner": { "login": "lucab85", "id": 24267107, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24267107?v=4", "html_url": "https:\/\/github.com\/lucab85", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lucab85\/log4j-cve-2021-44228", "description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)", "fork": false, "created_at": "2021-12-21T22:14:24Z", "updated_at": "2024-07-07T09:47:47Z", "pushed_at": "2022-01-10T19:13:04Z", "stargazers_count": 57, "watchers_count": 57, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "ansible", "cve-2021-44228", "devsecops", "log4j", "log4shell", "security" ], "visibility": "public", "forks": 9, "watchers": 57, "score": 0, "subscribers_count": 5 }, { "id": 440722343, "name": "Log4Shell-CVE-2021-44228-Demo", "full_name": "BabooPan\/Log4Shell-CVE-2021-44228-Demo", "owner": { "login": "BabooPan", "id": 16317991, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16317991?v=4", "html_url": "https:\/\/github.com\/BabooPan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BabooPan\/Log4Shell-CVE-2021-44228-Demo", "description": "Log4Shell Demo with AWS", "fork": false, "created_at": "2021-12-22T03:34:40Z", "updated_at": "2024-03-12T11:31:53Z", "pushed_at": "2022-03-28T06:49:06Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 440788757, "name": "log4shell_sentinel", "full_name": "ossie-git\/log4shell_sentinel", "owner": { "login": "ossie-git", "id": 25382296, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25382296?v=4", "html_url": "https:\/\/github.com\/ossie-git", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ossie-git\/log4shell_sentinel", "description": "A Smart Log4Shell\/Log4j\/CVE-2021-44228 Scanner", "fork": false, "created_at": "2021-12-22T08:35:04Z", "updated_at": "2022-10-29T09:47:49Z", "pushed_at": "2021-12-22T08:40:58Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 14, "score": 0, "subscribers_count": 2 }, { "id": 440799948, "name": "Log4Shell", "full_name": "r00thunter\/Log4Shell", "owner": { "login": "r00thunter", "id": 33806985, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33806985?v=4", "html_url": "https:\/\/github.com\/r00thunter", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/r00thunter\/Log4Shell", "description": "Generic Scanner for Apache log4j RCE CVE-2021-44228", "fork": false, "created_at": "2021-12-22T09:15:47Z", "updated_at": "2024-08-24T16:05:08Z", "pushed_at": "2021-12-22T09:19:15Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 440816228, "name": "cve-2021-44228-fix-jars", "full_name": "asyzdykov\/cve-2021-44228-fix-jars", "owner": { "login": "asyzdykov", "id": 1106604, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1106604?v=4", "html_url": "https:\/\/github.com\/asyzdykov", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/asyzdykov\/cve-2021-44228-fix-jars", "description": "CVE-2021-44228-FIX-JARS", "fork": false, "created_at": "2021-12-22T10:16:22Z", "updated_at": "2021-12-23T09:04:57Z", "pushed_at": "2021-12-23T09:04:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 440932687, "name": "log4j-scanner", "full_name": "BJLIYANLIANG\/log4j-scanner", "owner": { "login": "BJLIYANLIANG", "id": 34064679, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34064679?v=4", "html_url": "https:\/\/github.com\/BJLIYANLIANG", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BJLIYANLIANG\/log4j-scanner", "description": "Log4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS", "fork": false, "created_at": "2021-12-22T17:17:59Z", "updated_at": "2021-12-24T00:57:34Z", "pushed_at": "2021-12-19T01:59:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 441001904, "name": "Apache-Log4j-POC", "full_name": "badb33f\/Apache-Log4j-POC", "owner": { "login": "badb33f", "id": 61085462, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61085462?v=4", "html_url": "https:\/\/github.com\/badb33f", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/badb33f\/Apache-Log4j-POC", "description": "Proof of Concept of apache log4j LDAP lookup vulnerability. CVE-2021-44228", "fork": false, "created_at": "2021-12-22T22:44:07Z", "updated_at": "2023-04-06T19:12:21Z", "pushed_at": "2021-12-22T22:51:12Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 441034050, "name": "CVE-2021-44228-log4jVulnScanner-metasploit", "full_name": "TaroballzChen\/CVE-2021-44228-log4jVulnScanner-metasploit", "owner": { "login": "TaroballzChen", "id": 27862593, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4", "html_url": "https:\/\/github.com\/TaroballzChen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-44228-log4jVulnScanner-metasploit", "description": "open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability", "fork": false, "created_at": "2021-12-23T01:59:03Z", "updated_at": "2024-08-12T20:19:08Z", "pushed_at": "2021-12-23T07:40:13Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 441188076, "name": "ansible-role-log4shell", "full_name": "lucab85\/ansible-role-log4shell", "owner": { "login": "lucab85", "id": 24267107, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24267107?v=4", "html_url": "https:\/\/github.com\/lucab85", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lucab85\/ansible-role-log4shell", "description": "Ansible playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 for Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-23T13:24:41Z", "updated_at": "2023-05-13T06:51:06Z", "pushed_at": "2022-01-10T22:21:34Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "devsecops", "log4j", "log4shell", "security" ], "visibility": "public", "forks": 4, "watchers": 4, "score": 0, "subscribers_count": 3 }, { "id": 441364313, "name": "log4j-CVE-2021-44228-workaround", "full_name": "grimch\/log4j-CVE-2021-44228-workaround", "owner": { "login": "grimch", "id": 58831200, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58831200?v=4", "html_url": "https:\/\/github.com\/grimch", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/grimch\/log4j-CVE-2021-44228-workaround", "description": "general purpose workaround for the log4j CVE-2021-44228 vulnerability", "fork": false, "created_at": "2021-12-24T04:23:17Z", "updated_at": "2021-12-24T13:35:26Z", "pushed_at": "2021-12-24T13:35:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 441423344, "name": "log4j-shell-csw", "full_name": "cybersecurityworks553\/log4j-shell-csw", "owner": { "login": "cybersecurityworks553", "id": 63910792, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4", "html_url": "https:\/\/github.com\/cybersecurityworks553", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cybersecurityworks553\/log4j-shell-csw", "description": "A Proof-Of-Concept Exploit for CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-24T09:26:38Z", "updated_at": "2024-02-26T06:42:44Z", "pushed_at": "2021-12-24T10:16:10Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 441453543, "name": "log4j-scan", "full_name": "Toolsec\/log4j-scan", "owner": { "login": "Toolsec", "id": 76109742, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76109742?v=4", "html_url": "https:\/\/github.com\/Toolsec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Toolsec\/log4j-scan", "description": "CVE-2021-44228 检查工具", "fork": false, "created_at": "2021-12-24T11:54:21Z", "updated_at": "2022-05-09T13:18:05Z", "pushed_at": "2021-12-24T02:39:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 441470836, "name": "Log4jUnifi", "full_name": "puzzlepeaches\/Log4jUnifi", "owner": { "login": "puzzlepeaches", "id": 8538866, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4", "html_url": "https:\/\/github.com\/puzzlepeaches", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jUnifi", "description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.", "fork": false, "created_at": "2021-12-24T13:18:49Z", "updated_at": "2025-01-01T21:44:58Z", "pushed_at": "2024-01-04T17:12:05Z", "stargazers_count": 146, "watchers_count": 146, "has_discussions": false, "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 29, "watchers": 146, "score": 0, "subscribers_count": 6 }, { "id": 441536293, "name": "apache-tomcat-log4j", "full_name": "many-fac3d-g0d\/apache-tomcat-log4j", "owner": { "login": "many-fac3d-g0d", "id": 54078651, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54078651?v=4", "html_url": "https:\/\/github.com\/many-fac3d-g0d", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/many-fac3d-g0d\/apache-tomcat-log4j", "description": "Log4j2 CVE-2021-44228 Vulnerability POC in Apache Tomcat", "fork": false, "created_at": "2021-12-24T18:54:46Z", "updated_at": "2023-07-29T23:22:45Z", "pushed_at": "2021-12-24T18:57:32Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 441540913, "name": "CVE-2021-44228", "full_name": "marcourbano\/CVE-2021-44228", "owner": { "login": "marcourbano", "id": 22402683, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22402683?v=4", "html_url": "https:\/\/github.com\/marcourbano", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/marcourbano\/CVE-2021-44228", "description": "PoC for CVE-2021-44228.", "fork": false, "created_at": "2021-12-24T19:26:36Z", "updated_at": "2024-04-19T14:48:49Z", "pushed_at": "2022-09-22T19:16:07Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 441545718, "name": "log4shell-vulnerable-app", "full_name": "bsigouin\/log4shell-vulnerable-app", "owner": { "login": "bsigouin", "id": 48130586, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48130586?v=4", "html_url": "https:\/\/github.com\/bsigouin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bsigouin\/log4shell-vulnerable-app", "description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.", "fork": false, "created_at": "2021-12-24T20:00:12Z", "updated_at": "2022-01-06T13:31:29Z", "pushed_at": "2023-01-20T17:03:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 441678815, "name": "XSYS-Log4J2Shell-Ex", "full_name": "ToxicEnvelope\/XSYS-Log4J2Shell-Ex", "owner": { "login": "ToxicEnvelope", "id": 23465872, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23465872?v=4", "html_url": "https:\/\/github.com\/ToxicEnvelope", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ToxicEnvelope\/XSYS-Log4J2Shell-Ex", "description": "this repository contains a POC of CVE-2021-44228 (log4j2shell) as part of a security research", "fork": false, "created_at": "2021-12-25T12:53:13Z", "updated_at": "2021-12-27T20:08:44Z", "pushed_at": "2021-12-27T20:08:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 442033629, "name": "ModSec-log4j2", "full_name": "felipe8398\/ModSec-log4j2", "owner": { "login": "felipe8398", "id": 24979677, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24979677?v=4", "html_url": "https:\/\/github.com\/felipe8398", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/felipe8398\/ModSec-log4j2", "description": "Regra ModSec para proteção log4j2 - CVE-2021-44228", "fork": false, "created_at": "2021-12-27T02:53:24Z", "updated_at": "2022-06-19T02:08:13Z", "pushed_at": "2022-03-10T22:09:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "docker" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 442071358, "name": "Log4j_Attacker_IPList", "full_name": "ceyhuncamli\/Log4j_Attacker_IPList", "owner": { "login": "ceyhuncamli", "id": 57198926, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57198926?v=4", "html_url": "https:\/\/github.com\/ceyhuncamli", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ceyhuncamli\/Log4j_Attacker_IPList", "description": "CVE-2021-44228", "fork": false, "created_at": "2021-12-27T06:29:12Z", "updated_at": "2021-12-27T06:34:21Z", "pushed_at": "2021-12-27T06:34:19Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 442073643, "name": "log4j-vulnerability", "full_name": "mazhar-hassan\/log4j-vulnerability", "owner": { "login": "mazhar-hassan", "id": 32394814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32394814?v=4", "html_url": "https:\/\/github.com\/mazhar-hassan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mazhar-hassan\/log4j-vulnerability", "description": "Log4Shell (CVE-2021-44228) is a zero-day vulnerability in Log4j", "fork": false, "created_at": "2021-12-27T06:39:40Z", "updated_at": "2021-12-27T09:33:39Z", "pushed_at": "2022-08-23T13:47:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 442118241, "name": "VTI-IOCs-CVE-2021-44228", "full_name": "xungzzz\/VTI-IOCs-CVE-2021-44228", "owner": { "login": "xungzzz", "id": 78672731, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78672731?v=4", "html_url": "https:\/\/github.com\/xungzzz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xungzzz\/VTI-IOCs-CVE-2021-44228", "description": "IOCs for CVE-2021-44228", "fork": false, "created_at": "2021-12-27T09:51:13Z", "updated_at": "2021-12-27T09:51:13Z", "pushed_at": "2021-12-27T09:51:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 442217104, "name": "l4s_poc", "full_name": "s-retlaw\/l4s_poc", "owner": { "login": "s-retlaw", "id": 73955369, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4", "html_url": "https:\/\/github.com\/s-retlaw", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/s-retlaw\/l4s_poc", "description": "Log4Shell (Cve-2021-44228) Proof Of Concept", "fork": false, "created_at": "2021-12-27T16:45:58Z", "updated_at": "2022-01-04T14:50:09Z", "pushed_at": "2023-07-25T20:05:40Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 442222189, "name": "CVE-2021-44228-Apache-Log4j-Rce-main", "full_name": "Ravid-CheckMarx\/CVE-2021-44228-Apache-Log4j-Rce-main", "owner": { "login": "Ravid-CheckMarx", "id": 84515813, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84515813?v=4", "html_url": "https:\/\/github.com\/Ravid-CheckMarx", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Ravid-CheckMarx\/CVE-2021-44228-Apache-Log4j-Rce-main", "description": null, "fork": false, "created_at": "2021-12-27T17:06:26Z", "updated_at": "2021-12-28T08:39:10Z", "pushed_at": "2021-12-27T17:06:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 442235397, "name": "log4j-payload-generator", "full_name": "yesspider-hacker\/log4j-payload-generator", "owner": { "login": "yesspider-hacker", "id": 76931387, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76931387?v=4", "html_url": "https:\/\/github.com\/yesspider-hacker", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yesspider-hacker\/log4j-payload-generator", "description": "log4j-paylaod generator : A generic payload generator for Apache log4j RCE CVE-2021-44228", "fork": false, "created_at": "2021-12-27T18:02:15Z", "updated_at": "2023-01-08T10:49:19Z", "pushed_at": "2021-12-27T18:38:10Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 442255773, "name": "log4shell_scanner", "full_name": "LinkMJB\/log4shell_scanner", "owner": { "login": "LinkMJB", "id": 8824103, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8824103?v=4", "html_url": "https:\/\/github.com\/LinkMJB", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LinkMJB\/log4shell_scanner", "description": "Quick and dirty scanner, hitting common ports looking for Log4Shell (CVE-2021-44228) vulnerability", "fork": false, "created_at": "2021-12-27T19:36:29Z", "updated_at": "2021-12-27T19:40:45Z", "pushed_at": "2021-12-27T19:40:42Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 442317732, "name": "Vm4J", "full_name": "NS-Sp4ce\/Vm4J", "owner": { "login": "NS-Sp4ce", "id": 33349032, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4", "html_url": "https:\/\/github.com\/NS-Sp4ce", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NS-Sp4ce\/Vm4J", "description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager", "fork": false, "created_at": "2021-12-28T01:37:20Z", "updated_at": "2024-11-16T18:38:44Z", "pushed_at": "2022-01-24T05:37:34Z", "stargazers_count": 204, "watchers_count": 204, "has_discussions": false, "forks_count": 39, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j2-exp", "log4shell", "vmsa-2021-0028" ], "visibility": "public", "forks": 39, "watchers": 204, "score": 0, "subscribers_count": 5 }, { "id": 442533490, "name": "LogJackFix", "full_name": "PoneyClairDeLune\/LogJackFix", "owner": { "login": "PoneyClairDeLune", "id": 88174309, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88174309?v=4", "html_url": "https:\/\/github.com\/PoneyClairDeLune", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/PoneyClairDeLune\/LogJackFix", "description": "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients.", "fork": false, "created_at": "2021-12-28T17:18:13Z", "updated_at": "2021-12-28T17:26:16Z", "pushed_at": "2021-12-28T17:26:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 443163405, "name": "log4j-vulnerability", "full_name": "MarceloLeite2604\/log4j-vulnerability", "owner": { "login": "MarceloLeite2604", "id": 13152452, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13152452?v=4", "html_url": "https:\/\/github.com\/MarceloLeite2604", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MarceloLeite2604\/log4j-vulnerability", "description": "Presents how to exploit CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-30T19:10:21Z", "updated_at": "2023-08-15T12:50:39Z", "pushed_at": "2022-01-03T17:14:51Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 443422203, "name": "log4shell-vulnerable-app", "full_name": "romanutti\/log4shell-vulnerable-app", "owner": { "login": "romanutti", "id": 36601005, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36601005?v=4", "html_url": "https:\/\/github.com\/romanutti", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/romanutti\/log4shell-vulnerable-app", "description": "This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as log4shell.", "fork": false, "created_at": "2021-12-31T20:39:44Z", "updated_at": "2022-01-01T10:57:33Z", "pushed_at": "2022-05-10T17:20:17Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 443941194, "name": "log4j2-test", "full_name": "mklinkj\/log4j2-test", "owner": { "login": "mklinkj", "id": 96992046, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96992046?v=4", "html_url": "https:\/\/github.com\/mklinkj", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mklinkj\/log4j2-test", "description": "Log4j2 LDAP 취약점 테스트 (CVE-2021-44228)", "fork": false, "created_at": "2022-01-03T04:36:41Z", "updated_at": "2024-01-14T11:55:27Z", "pushed_at": "2024-01-13T19:12:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j2" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 444275342, "name": "4jfinder.github.io", "full_name": "4jfinder\/4jfinder.github.io", "owner": { "login": "4jfinder", "id": 97116800, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97116800?v=4", "html_url": "https:\/\/github.com\/4jfinder", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/4jfinder\/4jfinder.github.io", "description": "Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List", "fork": false, "created_at": "2022-01-04T03:37:03Z", "updated_at": "2022-08-17T00:21:21Z", "pushed_at": "2022-02-25T08:52:45Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 444603389, "name": "CVE-2021-44228_scanner-main-Modified-", "full_name": "alexpena5635\/CVE-2021-44228_scanner-main-Modified-", "owner": { "login": "alexpena5635", "id": 74330769, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74330769?v=4", "html_url": "https:\/\/github.com\/alexpena5635", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alexpena5635\/CVE-2021-44228_scanner-main-Modified-", "description": null, "fork": false, "created_at": "2022-01-05T00:14:08Z", "updated_at": "2022-01-09T01:45:00Z", "pushed_at": "2022-07-10T22:02:55Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 445474259, "name": "log4jshell_CVE-2021-44228", "full_name": "Vulnmachines\/log4jshell_CVE-2021-44228", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Vulnmachines\/log4jshell_CVE-2021-44228", "description": "Log4jshell - CVE-2021-44228", "fork": false, "created_at": "2022-01-07T09:56:30Z", "updated_at": "2023-03-31T16:40:36Z", "pushed_at": "2022-07-26T05:17:19Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 445687561, "name": "log4j-fuzzer", "full_name": "mr-vill4in\/log4j-fuzzer", "owner": { "login": "mr-vill4in", "id": 51061936, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51061936?v=4", "html_url": "https:\/\/github.com\/mr-vill4in", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mr-vill4in\/log4j-fuzzer", "description": "CVE-2021-44228", "fork": false, "created_at": "2022-01-08T00:28:32Z", "updated_at": "2022-08-25T01:38:48Z", "pushed_at": "2022-03-19T21:10:47Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 446218653, "name": "log4jhound", "full_name": "mebibite\/log4jhound", "owner": { "login": "mebibite", "id": 54244269, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54244269?v=4", "html_url": "https:\/\/github.com\/mebibite", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mebibite\/log4jhound", "description": "Created after the disclosure of CVE-2021-44228. Bash script that detects Log4j occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyses their Manifest files.", "fork": false, "created_at": "2022-01-09T22:34:49Z", "updated_at": "2024-04-22T19:41:40Z", "pushed_at": "2022-04-01T00:43:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 447754863, "name": "log4j_github_repository", "full_name": "sdogancesur\/log4j_github_repository", "owner": { "login": "sdogancesur", "id": 34608448, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34608448?v=4", "html_url": "https:\/\/github.com\/sdogancesur", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sdogancesur\/log4j_github_repository", "description": "This work includes testing and improvement tools for CVE-2021-44228(log4j).", "fork": false, "created_at": "2022-01-13T21:16:26Z", "updated_at": "2023-05-29T16:42:26Z", "pushed_at": "2022-01-15T18:52:17Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 448612058, "name": "log4stdin", "full_name": "aajuvonen\/log4stdin", "owner": { "login": "aajuvonen", "id": 97843492, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97843492?v=4", "html_url": "https:\/\/github.com\/aajuvonen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aajuvonen\/log4stdin", "description": "A Java application intentionally vulnerable to CVE-2021-44228", "fork": false, "created_at": "2022-01-16T16:39:19Z", "updated_at": "2022-04-02T16:13:36Z", "pushed_at": "2023-03-17T09:09:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4shell", "vulnerable-application" ], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 448890655, "name": "PS-CVE-2021-44228", "full_name": "arnaudluti\/PS-CVE-2021-44228", "owner": { "login": "arnaudluti", "id": 41639163, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41639163?v=4", "html_url": "https:\/\/github.com\/arnaudluti", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/arnaudluti\/PS-CVE-2021-44228", "description": "Static detection of vulnerable log4j librairies on Windows servers, members of an AD domain.", "fork": false, "created_at": "2022-01-17T12:46:20Z", "updated_at": "2022-01-19T08:30:13Z", "pushed_at": "2022-01-19T08:31:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 449417650, "name": "CVE-2021-44228-Log4Shell-POC", "full_name": "ColdFusionX\/CVE-2021-44228-Log4Shell-POC", "owner": { "login": "ColdFusionX", "id": 8522240, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4", "html_url": "https:\/\/github.com\/ColdFusionX", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ColdFusionX\/CVE-2021-44228-Log4Shell-POC", "description": "POC for Infamous Log4j CVE-2021-44228", "fork": false, "created_at": "2022-01-18T19:22:38Z", "updated_at": "2024-08-12T20:19:51Z", "pushed_at": "2022-01-20T15:28:58Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "jndi-exploit", "jndi-lookups", "ldap", "log4j", "log4j2", "log4shell", "poc", "rce" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 450033114, "name": "cve-2021-44228-waf-tests", "full_name": "robrankin\/cve-2021-44228-waf-tests", "owner": { "login": "robrankin", "id": 1881181, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881181?v=4", "html_url": "https:\/\/github.com\/robrankin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/robrankin\/cve-2021-44228-waf-tests", "description": "Testing WAF protection against CVE-2021-44228 Log4Shell", "fork": false, "created_at": "2022-01-20T09:30:44Z", "updated_at": "2023-08-24T16:30:43Z", "pushed_at": "2022-01-20T12:29:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 452823928, "name": "log4j-polkit-poc", "full_name": "0xalwayslucky\/log4j-polkit-poc", "owner": { "login": "0xalwayslucky", "id": 28390940, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28390940?v=4", "html_url": "https:\/\/github.com\/0xalwayslucky", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xalwayslucky\/log4j-polkit-poc", "description": "vulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034", "fork": false, "created_at": "2022-01-27T19:54:16Z", "updated_at": "2022-01-29T06:29:58Z", "pushed_at": "2022-01-28T15:08:53Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 453952325, "name": "yLog4j", "full_name": "y-security\/yLog4j", "owner": { "login": "y-security", "id": 86777723, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86777723?v=4", "html_url": "https:\/\/github.com\/y-security", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/y-security\/yLog4j", "description": "PortSwigger Burp Plugin for the Log4j (CVE-2021-44228)", "fork": false, "created_at": "2022-01-31T09:54:19Z", "updated_at": "2023-05-02T06:58:40Z", "pushed_at": "2022-01-31T10:23:27Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 458405084, "name": "Log4Shell", "full_name": "FeryaelJustice\/Log4Shell", "owner": { "login": "FeryaelJustice", "id": 47835172, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47835172?v=4", "html_url": "https:\/\/github.com\/FeryaelJustice", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FeryaelJustice\/Log4Shell", "description": "This repository is for Log4j 2021 (CVE-2021-44228) Vulnerability demonstration and mitigation.", "fork": false, "created_at": "2022-02-12T03:02:24Z", "updated_at": "2022-02-12T03:02:24Z", "pushed_at": "2022-02-12T04:11:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 458500087, "name": "CVE-2021-44228-white-box", "full_name": "hotpotcookie\/CVE-2021-44228-white-box", "owner": { "login": "hotpotcookie", "id": 68333318, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68333318?v=4", "html_url": "https:\/\/github.com\/hotpotcookie", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hotpotcookie\/CVE-2021-44228-white-box", "description": "Log4j vulner testing environment based on CVE-2021-44228. It provide guidance to build the sample infrastructure and the exploit scripts. Supporting cooki3 script as the main exploit tools & integration", "fork": false, "created_at": "2022-02-12T11:19:41Z", "updated_at": "2024-04-28T06:08:38Z", "pushed_at": "2023-09-06T11:47:42Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "badusb", "cooki3", "cve-2021-44228", "java", "ldap-authentication", "log4j2", "log4shell", "penetration-testing", "ptes" ], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 459806805, "name": "l4srs", "full_name": "s-retlaw\/l4srs", "owner": { "login": "s-retlaw", "id": 73955369, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4", "html_url": "https:\/\/github.com\/s-retlaw", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/s-retlaw\/l4srs", "description": "Rust implementation of the Log 4 Shell (log 4 j - CVE-2021-44228)", "fork": false, "created_at": "2022-02-16T01:13:08Z", "updated_at": "2022-02-16T01:21:29Z", "pushed_at": "2023-01-14T19:59:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 463165453, "name": "Log-4j-scanner", "full_name": "Ananya-0306\/Log-4j-scanner", "owner": { "login": "Ananya-0306", "id": 74227338, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74227338?v=4", "html_url": "https:\/\/github.com\/Ananya-0306", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Ananya-0306\/Log-4j-scanner", "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228", "fork": false, "created_at": "2022-02-24T13:49:14Z", "updated_at": "2024-09-06T22:37:21Z", "pushed_at": "2022-03-04T13:30:17Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bugbounty", "cybersecurity", "fork-for-contribution", "log4j", "open-source", "trending-repositories" ], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 467749739, "name": "log4shellwithlog4j2_13_3", "full_name": "paulvkitor\/log4shellwithlog4j2_13_3", "owner": { "login": "paulvkitor", "id": 101220344, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101220344?v=4", "html_url": "https:\/\/github.com\/paulvkitor", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/paulvkitor\/log4shellwithlog4j2_13_3", "description": "Springboot web application accepts a name get parameter and logs its value to log4j2. Vulnerable to CVE-2021-44228.", "fork": false, "created_at": "2022-03-09T02:29:58Z", "updated_at": "2022-03-09T04:11:03Z", "pushed_at": "2022-03-09T04:11:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 468389206, "name": "vulescanjndilookup", "full_name": "MiguelM001\/vulescanjndilookup", "owner": { "login": "MiguelM001", "id": 22323920, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22323920?v=4", "html_url": "https:\/\/github.com\/MiguelM001", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MiguelM001\/vulescanjndilookup", "description": "HERRAMIENTA AUTOMATIZADA PARA LA DETECCION DE LA VULNERABILIDAD CVE-2021-44228", "fork": false, "created_at": "2022-03-10T14:57:30Z", "updated_at": "2022-03-10T15:56:57Z", "pushed_at": "2022-03-11T17:49:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 468746734, "name": "CVE-2021-44228", "full_name": "Jun-5heng\/CVE-2021-44228", "owner": { "login": "Jun-5heng", "id": 88525975, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4", "html_url": "https:\/\/github.com\/Jun-5heng", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2021-44228", "description": "Log4j2组件命令执行RCE \/ Code By:Jun_sheng", "fork": false, "created_at": "2022-03-11T12:43:15Z", "updated_at": "2025-01-03T06:01:27Z", "pushed_at": "2022-03-11T13:24:09Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 469576160, "name": "CVE-2021-44228", "full_name": "honypot\/CVE-2021-44228", "owner": { "login": "honypot", "id": 101309325, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", "html_url": "https:\/\/github.com\/honypot", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/honypot\/CVE-2021-44228", "description": null, "fork": false, "created_at": "2022-03-14T04:09:36Z", "updated_at": "2022-03-14T04:09:57Z", "pushed_at": "2022-03-14T04:10:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 469576898, "name": "CVE-2021-44228-vuln-app", "full_name": "honypot\/CVE-2021-44228-vuln-app", "owner": { "login": "honypot", "id": 101309325, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", "html_url": "https:\/\/github.com\/honypot", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/honypot\/CVE-2021-44228-vuln-app", "description": null, "fork": false, "created_at": "2022-03-14T04:13:13Z", "updated_at": "2022-03-14T04:13:24Z", "pushed_at": "2022-03-14T04:16:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 482498767, "name": "log4j-scanner", "full_name": "manishkanyal\/log4j-scanner", "owner": { "login": "manishkanyal", "id": 39938426, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39938426?v=4", "html_url": "https:\/\/github.com\/manishkanyal", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/manishkanyal\/log4j-scanner", "description": "A Log4j vulnerability scanner is used to identify the CVE-2021-44228 and CVE_2021_45046", "fork": false, "created_at": "2022-04-17T11:01:24Z", "updated_at": "2022-11-10T04:02:56Z", "pushed_at": "2022-04-17T11:27:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 487163916, "name": "Writing-Sample-1", "full_name": "TPower2112\/Writing-Sample-1", "owner": { "login": "TPower2112", "id": 20917633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20917633?v=4", "html_url": "https:\/\/github.com\/TPower2112", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TPower2112\/Writing-Sample-1", "description": "CVE-2021-44228 Log4j Summary", "fork": false, "created_at": "2022-04-30T02:35:38Z", "updated_at": "2022-12-15T00:15:39Z", "pushed_at": "2022-11-19T19:37:19Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "log4j2", "markdown", "mitigations" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 487921535, "name": "Log4j-Exploit-CVE-2021-44228", "full_name": "Willian-2-0-0-1\/Log4j-Exploit-CVE-2021-44228", "owner": { "login": "Willian-2-0-0-1", "id": 39037497, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39037497?v=4", "html_url": "https:\/\/github.com\/Willian-2-0-0-1", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Willian-2-0-0-1\/Log4j-Exploit-CVE-2021-44228", "description": null, "fork": false, "created_at": "2022-05-02T16:53:26Z", "updated_at": "2022-05-02T16:53:26Z", "pushed_at": "2022-05-14T13:18:17Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 490330900, "name": "Log4Shell-obfuscated-payloads-generator", "full_name": "r3kind1e\/Log4Shell-obfuscated-payloads-generator", "owner": { "login": "r3kind1e", "id": 85721156, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85721156?v=4", "html_url": "https:\/\/github.com\/r3kind1e", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/r3kind1e\/Log4Shell-obfuscated-payloads-generator", "description": "Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.", "fork": false, "created_at": "2022-05-09T15:02:29Z", "updated_at": "2025-01-13T16:29:11Z", "pushed_at": "2022-05-26T03:18:31Z", "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-44228", "cve-2021-45046", "log4j", "log4shell", "vulnerability-research", "waf-bypass" ], "visibility": "public", "forks": 2, "watchers": 22, "score": 0, "subscribers_count": 1 }, { "id": 491872919, "name": "CVE-2021-44228", "full_name": "Phineas09\/CVE-2021-44228", "owner": { "login": "Phineas09", "id": 40483676, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40483676?v=4", "html_url": "https:\/\/github.com\/Phineas09", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Phineas09\/CVE-2021-44228", "description": "Log4Shell Proof-Of-Concept derived from https:\/\/github.com\/kozmer\/log4j-shell-poc", "fork": false, "created_at": "2022-05-13T11:35:22Z", "updated_at": "2022-05-13T11:40:56Z", "pushed_at": "2022-05-13T16:49:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 496048138, "name": "CVE-2021-44228-Apache-Log4j-Rce", "full_name": "yuuki1967\/CVE-2021-44228-Apache-Log4j-Rce", "owner": { "login": "yuuki1967", "id": 11524508, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11524508?v=4", "html_url": "https:\/\/github.com\/yuuki1967", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yuuki1967\/CVE-2021-44228-Apache-Log4j-Rce", "description": null, "fork": false, "created_at": "2022-05-25T01:56:14Z", "updated_at": "2022-05-25T01:56:32Z", "pushed_at": "2023-05-26T05:20:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 500852820, "name": "tf-log4j-aws-poc", "full_name": "moshuum\/tf-log4j-aws-poc", "owner": { "login": "moshuum", "id": 1893265, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1893265?v=4", "html_url": "https:\/\/github.com\/moshuum", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/moshuum\/tf-log4j-aws-poc", "description": "This project files demostrate a proof-of-concept of log4j vulnerability (CVE-2021-44228) on AWS using Terraform Infrastructure-as-a-code means.", "fork": false, "created_at": "2022-06-07T13:30:37Z", "updated_at": "2022-06-07T23:24:00Z", "pushed_at": "2022-06-08T04:14:11Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 501054329, "name": "CVE-2021-44228", "full_name": "jaehnri\/CVE-2021-44228", "owner": { "login": "jaehnri", "id": 30930799, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30930799?v=4", "html_url": "https:\/\/github.com\/jaehnri", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jaehnri\/CVE-2021-44228", "description": "Proof of concept of the Log4Shell vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2022-06-08T01:09:28Z", "updated_at": "2023-06-01T16:45:21Z", "pushed_at": "2022-07-07T03:35:14Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 502589993, "name": "Log4Shell-CVE-2021-44228-Demo", "full_name": "ra890927\/Log4Shell-CVE-2021-44228-Demo", "owner": { "login": "ra890927", "id": 48157503, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48157503?v=4", "html_url": "https:\/\/github.com\/ra890927", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ra890927\/Log4Shell-CVE-2021-44228-Demo", "description": "Log4Shell CVE-2021-44228 Demo", "fork": false, "created_at": "2022-06-12T10:57:07Z", "updated_at": "2022-12-11T13:51:49Z", "pushed_at": "2022-06-13T02:37:18Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "docker", "log4shell" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 515491317, "name": "Ethical-Hacking-Report-Log4j", "full_name": "vidrez\/Ethical-Hacking-Report-Log4j", "owner": { "login": "vidrez", "id": 36509217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36509217?v=4", "html_url": "https:\/\/github.com\/vidrez", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vidrez\/Ethical-Hacking-Report-Log4j", "description": ":page_with_curl: A report about CVE-2021-44228", "fork": false, "created_at": "2022-07-19T08:03:05Z", "updated_at": "2024-04-29T17:22:54Z", "pushed_at": "2022-07-19T08:08:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 520582575, "name": "CVE-2021-44228", "full_name": "vino-theva\/CVE-2021-44228", "owner": { "login": "vino-theva", "id": 106059311, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106059311?v=4", "html_url": "https:\/\/github.com\/vino-theva", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vino-theva\/CVE-2021-44228", "description": "Apache Log4j is a logging tool written in Java. This paper focuses on what is Log4j and log4shell vulnerability and how it works, how it affects the victim, and how can this be mitigated", "fork": false, "created_at": "2022-08-02T17:03:55Z", "updated_at": "2022-08-02T17:03:55Z", "pushed_at": "2022-08-02T17:12:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 526103436, "name": "tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228", "full_name": "tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228", "owner": { "login": "tharindudh", "id": 71964544, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71964544?v=4", "html_url": "https:\/\/github.com\/tharindudh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228", "description": null, "fork": false, "created_at": "2022-08-18T07:27:32Z", "updated_at": "2022-08-18T07:27:32Z", "pushed_at": "2022-08-18T07:30:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 529025141, "name": "jankybank", "full_name": "eurogig\/jankybank", "owner": { "login": "eurogig", "id": 9045562, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9045562?v=4", "html_url": "https:\/\/github.com\/eurogig", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/eurogig\/jankybank", "description": "Simple Java Front and Back end with bad log4j version featuring CVE-2021-44228", "fork": false, "created_at": "2022-08-25T21:35:32Z", "updated_at": "2022-08-25T21:37:58Z", "pushed_at": "2024-03-12T11:22:24Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 533987858, "name": "Log4j-CVE-2021-44228-Remediation", "full_name": "digital-dev\/Log4j-CVE-2021-44228-Remediation", "owner": { "login": "digital-dev", "id": 18492599, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18492599?v=4", "html_url": "https:\/\/github.com\/digital-dev", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/digital-dev\/Log4j-CVE-2021-44228-Remediation", "description": "This powershell script is intended to be used by anyone looking to remediate the Log4j Vulnerability within their environment. It can target multiple machines and run remotely as a job on all or only affected devices.", "fork": false, "created_at": "2022-09-08T00:22:57Z", "updated_at": "2022-09-08T00:23:02Z", "pushed_at": "2024-01-26T02:09:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 539366249, "name": "log4j-shell-poc", "full_name": "ocastel\/log4j-shell-poc", "owner": { "login": "ocastel", "id": 3749321, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3749321?v=4", "html_url": "https:\/\/github.com\/ocastel", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ocastel\/log4j-shell-poc", "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2022-09-21T07:43:15Z", "updated_at": "2022-09-21T09:04:17Z", "pushed_at": "2022-09-21T14:45:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 539674997, "name": "CVE-2021-44228-poc", "full_name": "bcdunbar\/CVE-2021-44228-poc", "owner": { "login": "bcdunbar", "id": 8393928, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8393928?v=4", "html_url": "https:\/\/github.com\/bcdunbar", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bcdunbar\/CVE-2021-44228-poc", "description": "CVE-2021-44228 POC \/ Example", "fork": false, "created_at": "2022-09-21T20:33:06Z", "updated_at": "2022-09-29T22:57:36Z", "pushed_at": "2022-09-29T22:57:31Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 563424783, "name": "CVE-2021-44228", "full_name": "srcporter\/CVE-2021-44228", "owner": { "login": "srcporter", "id": 42175824, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42175824?v=4", "html_url": "https:\/\/github.com\/srcporter", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/srcporter\/CVE-2021-44228", "description": "DO NOT USE FOR ANYTHING REAL. Simple springboot sample app with vulnerability CVE-2021-44228 aka \"Log4Shell\" ", "fork": false, "created_at": "2022-11-08T15:29:42Z", "updated_at": "2024-08-22T18:40:38Z", "pushed_at": "2024-08-22T18:40:35Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 583519721, "name": "log4j2_CVE-2021-44228", "full_name": "Nexolanta\/log4j2_CVE-2021-44228", "owner": { "login": "Nexolanta", "id": 73454853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73454853?v=4", "html_url": "https:\/\/github.com\/Nexolanta", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nexolanta\/log4j2_CVE-2021-44228", "description": null, "fork": false, "created_at": "2022-12-30T02:46:33Z", "updated_at": "2022-12-30T02:54:02Z", "pushed_at": "2022-12-30T02:48:29Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 595794114, "name": "Log4j-Vulnerability", "full_name": "demining\/Log4j-Vulnerability", "owner": { "login": "demining", "id": 87700947, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87700947?v=4", "html_url": "https:\/\/github.com\/demining", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/demining\/Log4j-Vulnerability", "description": "Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.", "fork": false, "created_at": "2023-01-31T20:29:26Z", "updated_at": "2024-08-12T20:29:35Z", "pushed_at": "2023-01-31T20:35:59Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "attack", "bitcoin", "blockchain", "cve-2021-44228", "hack", "hacking", "log4j", "log4js", "log4shell", "mining", "vulnerability", "vulnerability-scanner", "vulnerable" ], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 2 }, { "id": 599082211, "name": "Log4Shell-CVE-2021-44228-PoC", "full_name": "pierpaolosestito-dev\/Log4Shell-CVE-2021-44228-PoC", "owner": { "login": "pierpaolosestito-dev", "id": 112246529, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112246529?v=4", "html_url": "https:\/\/github.com\/pierpaolosestito-dev", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pierpaolosestito-dev\/Log4Shell-CVE-2021-44228-PoC", "description": "CVE 2021-44228 Proof-of-Concept. Log4Shell is an attack against Servers that uses vulnerable versions of Log4J. ", "fork": false, "created_at": "2023-02-08T12:19:32Z", "updated_at": "2024-03-25T10:24:18Z", "pushed_at": "2023-02-08T12:20:31Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "attack", "java", "jndi-exploit", "jndi-lookups", "ldap", "log4j-rce", "security", "vulnerabilities" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 605052737, "name": "LOG4J-CVE-2021-44228", "full_name": "Sumitpathania03\/LOG4J-CVE-2021-44228", "owner": { "login": "Sumitpathania03", "id": 126046383, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126046383?v=4", "html_url": "https:\/\/github.com\/Sumitpathania03", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sumitpathania03\/LOG4J-CVE-2021-44228", "description": null, "fork": false, "created_at": "2023-02-22T10:45:46Z", "updated_at": "2024-11-26T09:46:55Z", "pushed_at": "2023-04-11T09:21:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 614031542, "name": "Log4j-PoC", "full_name": "Sma-Das\/Log4j-PoC", "owner": { "login": "Sma-Das", "id": 20164942, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20164942?v=4", "html_url": "https:\/\/github.com\/Sma-Das", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sma-Das\/Log4j-PoC", "description": "An educational Proof of Concept for the Log4j Vulnerability (CVE-2021-44228) in Minecraft", "fork": false, "created_at": "2023-03-14T18:49:36Z", "updated_at": "2023-08-15T12:50:40Z", "pushed_at": "2023-03-14T18:50:34Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "gradle", "java", "log4j", "log4j2", "minecraft", "poc" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 616502386, "name": "log4shell-vulnweb", "full_name": "53buahapel\/log4shell-vulnweb", "owner": { "login": "53buahapel", "id": 55012507, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55012507?v=4", "html_url": "https:\/\/github.com\/53buahapel", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/53buahapel\/log4shell-vulnweb", "description": "this web is vulnerable against CVE-2021-44228", "fork": false, "created_at": "2023-03-20T14:09:30Z", "updated_at": "2023-06-17T19:43:29Z", "pushed_at": "2023-04-03T19:33:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 622718899, "name": "Log4ShellRemediation", "full_name": "demonrvm\/Log4ShellRemediation", "owner": { "login": "demonrvm", "id": 129688147, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129688147?v=4", "html_url": "https:\/\/github.com\/demonrvm", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/demonrvm\/Log4ShellRemediation", "description": "A vulnerable Spring Boot application that uses log4j and is vulnerable to CVE-2021-44228, CVE-2021-44832, CVE-2021-45046 and CVE-2021-45105", "fork": false, "created_at": "2023-04-02T23:03:28Z", "updated_at": "2023-04-17T15:19:43Z", "pushed_at": "2023-04-04T00:04:34Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 628273977, "name": "log4j-exploit-fork-bomb", "full_name": "funcid\/log4j-exploit-fork-bomb", "owner": { "login": "funcid", "id": 42806772, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42806772?v=4", "html_url": "https:\/\/github.com\/funcid", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/funcid\/log4j-exploit-fork-bomb", "description": "💣💥💀 Proof of Concept: пример запуска fork-бомбы на удаленном сервере благодаря уязвимости CVE-2021-44228", "fork": false, "created_at": "2023-04-15T12:47:39Z", "updated_at": "2023-05-06T18:26:50Z", "pushed_at": "2023-05-02T21:46:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 660080340, "name": "PY-Log4j-RCE-Scanner", "full_name": "MrHarshvardhan\/PY-Log4j-RCE-Scanner", "owner": { "login": "MrHarshvardhan", "id": 49817411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49817411?v=4", "html_url": "https:\/\/github.com\/MrHarshvardhan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MrHarshvardhan\/PY-Log4j-RCE-Scanner", "description": "Using this tool, you can scan for remote command execution vulnerability CVE-2021-44228 on Apache Log4j at multiple addresses.", "fork": false, "created_at": "2023-06-29T07:46:40Z", "updated_at": "2024-03-11T16:09:06Z", "pushed_at": "2023-06-29T08:14:23Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 668405235, "name": "Log4j_CVE-2021-44228", "full_name": "Muhammad-Ali007\/Log4j_CVE-2021-44228", "owner": { "login": "Muhammad-Ali007", "id": 64638296, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64638296?v=4", "html_url": "https:\/\/github.com\/Muhammad-Ali007", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Muhammad-Ali007\/Log4j_CVE-2021-44228", "description": null, "fork": false, "created_at": "2023-07-19T18:18:16Z", "updated_at": "2023-07-21T21:40:52Z", "pushed_at": "2023-07-21T21:55:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 701169649, "name": "CVE-2021-44228", "full_name": "Tai-e\/CVE-2021-44228", "owner": { "login": "Tai-e", "id": 100122463, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100122463?v=4", "html_url": "https:\/\/github.com\/Tai-e", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Tai-e\/CVE-2021-44228", "description": "Utilize Tai-e to identify the Log4shell (a.k.a. CVE-2021-44228) Vulnerability", "fork": false, "created_at": "2023-10-06T04:36:31Z", "updated_at": "2024-11-07T04:36:16Z", "pushed_at": "2023-10-06T09:30:27Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "java", "log4shell", "security", "taint-analysis" ], "visibility": "public", "forks": 1, "watchers": 9, "score": 0, "subscribers_count": 0 }, { "id": 718233980, "name": "CVE-2021-44228", "full_name": "LucasPDiniz\/CVE-2021-44228", "owner": { "login": "LucasPDiniz", "id": 57265360, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4", "html_url": "https:\/\/github.com\/LucasPDiniz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2021-44228", "description": "Log4j Vulnerability RCE - CVE-2021-44228", "fork": false, "created_at": "2023-11-13T16:57:22Z", "updated_at": "2024-06-30T21:52:24Z", "pushed_at": "2024-06-30T21:52:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "2021", "cve-2021-44228", "log4j", "rce", "solaris", "solr", "vulnerability" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 721701932, "name": "log4shell-minecraft-demo", "full_name": "felixslama\/log4shell-minecraft-demo", "owner": { "login": "felixslama", "id": 79058712, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79058712?v=4", "html_url": "https:\/\/github.com\/felixslama", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/felixslama\/log4shell-minecraft-demo", "description": "Log4Shell (CVE-2021-44228) minecraft demo. Used for education fairs", "fork": false, "created_at": "2023-11-21T15:45:31Z", "updated_at": "2024-12-07T12:27:41Z", "pushed_at": "2023-11-21T18:30:32Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 725731160, "name": "log4shell_lab", "full_name": "ShlomiRex\/log4shell_lab", "owner": { "login": "ShlomiRex", "id": 17744127, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17744127?v=4", "html_url": "https:\/\/github.com\/ShlomiRex", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ShlomiRex\/log4shell_lab", "description": "CVE-2021-44228", "fork": false, "created_at": "2023-11-30T18:55:40Z", "updated_at": "2024-07-15T07:35:10Z", "pushed_at": "2024-07-15T07:35:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 728564712, "name": "CVE-Lab", "full_name": "dcm2406\/CVE-Lab", "owner": { "login": "dcm2406", "id": 106772368, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106772368?v=4", "html_url": "https:\/\/github.com\/dcm2406", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dcm2406\/CVE-Lab", "description": "Instructions for exploiting vulnerabilities CVE-2021-44228 and CVE-2023-46604", "fork": false, "created_at": "2023-12-07T08:02:53Z", "updated_at": "2024-12-27T05:56:06Z", "pushed_at": "2024-03-20T06:20:44Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 732890890, "name": "l4j-tp1", "full_name": "scabench\/l4j-tp1", "owner": { "login": "scabench", "id": 154115874, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154115874?v=4", "html_url": "https:\/\/github.com\/scabench", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/scabench\/l4j-tp1", "description": "jee web project with log4shell (CVE-2021-44228) vulnerability", "fork": false, "created_at": "2023-12-18T05:07:59Z", "updated_at": "2023-12-27T22:59:23Z", "pushed_at": "2024-01-09T04:10:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 736198962, "name": "l4j-fp1", "full_name": "scabench\/l4j-fp1", "owner": { "login": "scabench", "id": 154115874, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154115874?v=4", "html_url": "https:\/\/github.com\/scabench", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/scabench\/l4j-fp1", "description": "jee web project with sanitised log4shell (CVE-2021-44228) vulnerability", "fork": false, "created_at": "2023-12-27T08:49:38Z", "updated_at": "2023-12-27T22:59:37Z", "pushed_at": "2024-01-14T23:40:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 772721921, "name": "l4s-vulnapp", "full_name": "KtokKawu\/l4s-vulnapp", "owner": { "login": "KtokKawu", "id": 16015720, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16015720?v=4", "html_url": "https:\/\/github.com\/KtokKawu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KtokKawu\/l4s-vulnapp", "description": "This is a potentially vulnerable Java web application containing Log4j affected by log4shell(CVE-2021-44228).", "fork": false, "created_at": "2024-03-15T18:57:11Z", "updated_at": "2024-03-15T19:37:44Z", "pushed_at": "2024-03-15T19:37:40Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 776289709, "name": "CVE-2021-44228-POC", "full_name": "sec13b\/CVE-2021-44228-POC", "owner": { "login": "sec13b", "id": 123419537, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123419537?v=4", "html_url": "https:\/\/github.com\/sec13b", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sec13b\/CVE-2021-44228-POC", "description": "exploit CVE-2021-44228 ", "fork": false, "created_at": "2024-03-23T05:03:44Z", "updated_at": "2024-11-06T18:16:06Z", "pushed_at": "2024-11-06T18:16:03Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 777920527, "name": "Wireshark", "full_name": "KirkDJohnson\/Wireshark", "owner": { "login": "KirkDJohnson", "id": 164972007, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164972007?v=4", "html_url": "https:\/\/github.com\/KirkDJohnson", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KirkDJohnson\/Wireshark", "description": "Downloaded a packet capture (.pcapng) file from malware-traffic-analysis.net which was an example of an attempted attack against a webserver using the Log4J vulnerability (CVE-2021-44228). I examined teh amount of endpoints communicating with the server and knowing jnidi as a common in the vulnerbilty found it in clear text", "fork": false, "created_at": "2024-03-26T18:47:20Z", "updated_at": "2024-09-14T11:49:45Z", "pushed_at": "2024-05-22T23:57:30Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 780990164, "name": "LOGJ4_PocShell_CVE-2021-44228", "full_name": "YangHyperData\/LOGJ4_PocShell_CVE-2021-44228", "owner": { "login": "YangHyperData", "id": 131573711, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131573711?v=4", "html_url": "https:\/\/github.com\/YangHyperData", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/YangHyperData\/LOGJ4_PocShell_CVE-2021-44228", "description": null, "fork": false, "created_at": "2024-04-02T14:44:10Z", "updated_at": "2024-07-04T13:20:01Z", "pushed_at": "2024-07-04T13:19:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 807102558, "name": "CVE-2021-44228-demo", "full_name": "Hoanle396\/CVE-2021-44228-demo", "owner": { "login": "Hoanle396", "id": 89791546, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89791546?v=4", "html_url": "https:\/\/github.com\/Hoanle396", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Hoanle396\/CVE-2021-44228-demo", "description": null, "fork": false, "created_at": "2024-05-28T13:40:20Z", "updated_at": "2024-05-28T13:43:00Z", "pushed_at": "2024-05-28T13:42:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 812482563, "name": "Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment", "full_name": "tadash10\/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment", "owner": { "login": "tadash10", "id": 126980610, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126980610?v=4", "html_url": "https:\/\/github.com\/tadash10", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tadash10\/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment", "description": "Objective: Demonstrate the exploitation of the Log4Shell vulnerability (CVE-2021-44228) within a simulated banking application environment.", "fork": false, "created_at": "2024-06-09T02:49:42Z", "updated_at": "2024-08-25T03:41:02Z", "pushed_at": "2024-06-14T02:52:27Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 834267924, "name": "CVE-2021-44228", "full_name": "asd58584388\/CVE-2021-44228", "owner": { "login": "asd58584388", "id": 43491476, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43491476?v=4", "html_url": "https:\/\/github.com\/asd58584388", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/asd58584388\/CVE-2021-44228", "description": "CVE-2021-44228 vulnerability study", "fork": false, "created_at": "2024-07-26T19:59:47Z", "updated_at": "2024-07-26T20:57:53Z", "pushed_at": "2024-07-26T20:57:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 855503144, "name": "CVE-2021-44228-Log4Shell-", "full_name": "OtisSymbos\/CVE-2021-44228-Log4Shell-", "owner": { "login": "OtisSymbos", "id": 78093502, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78093502?v=4", "html_url": "https:\/\/github.com\/OtisSymbos", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/OtisSymbos\/CVE-2021-44228-Log4Shell-", "description": null, "fork": false, "created_at": "2024-09-11T01:13:35Z", "updated_at": "2024-09-11T01:20:42Z", "pushed_at": "2024-09-11T01:14:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 855573158, "name": "log4j-shell-poc", "full_name": "safeer-accuknox\/log4j-shell-poc", "owner": { "login": "safeer-accuknox", "id": 180378107, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4", "html_url": "https:\/\/github.com\/safeer-accuknox", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/safeer-accuknox\/log4j-shell-poc", "description": "Log4J exploit CVE-2021-44228", "fork": false, "created_at": "2024-09-11T05:06:50Z", "updated_at": "2024-09-11T09:39:58Z", "pushed_at": "2024-09-11T09:39:55Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 869690102, "name": "TPASLog4ShellPoC", "full_name": "Carlos-Mesquita\/TPASLog4ShellPoC", "owner": { "login": "Carlos-Mesquita", "id": 75860783, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75860783?v=4", "html_url": "https:\/\/github.com\/Carlos-Mesquita", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Carlos-Mesquita\/TPASLog4ShellPoC", "description": "Proof of Concept (PoC) for the Log4Shell vulnerability (CVE-2021-44228), developed as part of the coursework for the curricular unit TPAS in the Master's degree in Information Security at FCUP.", "fork": false, "created_at": "2024-10-08T18:07:21Z", "updated_at": "2024-10-10T14:53:56Z", "pushed_at": "2024-10-08T18:19:15Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 886209908, "name": "-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-", "full_name": "AhmedMansour93\/-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-", "owner": { "login": "AhmedMansour93", "id": 179945455, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179945455?v=4", "html_url": "https:\/\/github.com\/AhmedMansour93", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AhmedMansour93\/-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-", "description": "In December 2021, the world of cybersecurity was shaken by the discovery of the Log4Shell vulnerability (CVE-2021-44228), embedded within the widely-used Apache Log4j library. With a CVSS score of 10", "fork": false, "created_at": "2024-11-10T13:45:59Z", "updated_at": "2024-11-10T13:47:01Z", "pushed_at": "2024-11-10T13:46:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 888768773, "name": "cve-2021-44228", "full_name": "Super-Binary\/cve-2021-44228", "owner": { "login": "Super-Binary", "id": 188337454, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188337454?v=4", "html_url": "https:\/\/github.com\/Super-Binary", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Super-Binary\/cve-2021-44228", "description": "这是安徽大学 “漏洞分析实验”(大三秋冬)期中作业归档。完整文档位于https:\/\/testgames.me\/2024\/11\/10\/cve-2021-44228\/", "fork": false, "created_at": "2024-11-15T01:11:25Z", "updated_at": "2024-11-23T13:31:31Z", "pushed_at": "2024-11-23T13:31:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 911566151, "name": "poc-ldap-cve-2021-44228", "full_name": "JanICT\/poc-ldap-cve-2021-44228", "owner": { "login": "JanICT", "id": 34338605, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34338605?v=4", "html_url": "https:\/\/github.com\/JanICT", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JanICT\/poc-ldap-cve-2021-44228", "description": null, "fork": false, "created_at": "2025-01-03T10:15:17Z", "updated_at": "2025-01-03T10:15:21Z", "pushed_at": "2025-01-09T09:09:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]