mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
10330 lines
No EOL
354 KiB
JSON
10330 lines
No EOL
354 KiB
JSON
[
|
||
{
|
||
"id": 436771097,
|
||
"name": "Healer",
|
||
"full_name": "Glease\/Healer",
|
||
"owner": {
|
||
"login": "Glease",
|
||
"id": 4586901,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4586901?v=4",
|
||
"html_url": "https:\/\/github.com\/Glease"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Glease\/Healer",
|
||
"description": "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2",
|
||
"fork": false,
|
||
"created_at": "2021-12-09T21:49:33Z",
|
||
"updated_at": "2021-12-17T17:36:05Z",
|
||
"pushed_at": "2021-12-20T19:13:02Z",
|
||
"stargazers_count": 14,
|
||
"watchers_count": 14,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 14,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436798675,
|
||
"name": "L4J-Vuln-Patch",
|
||
"full_name": "jacobtread\/L4J-Vuln-Patch",
|
||
"owner": {
|
||
"login": "jacobtread",
|
||
"id": 33708767,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33708767?v=4",
|
||
"html_url": "https:\/\/github.com\/jacobtread"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jacobtread\/L4J-Vuln-Patch",
|
||
"description": "This tool patches the CVE-2021-44228 Log4J vulnerability present in all minecraft versions NOTE THIS TOOL MUST BE RE-RUN after downloading or updating versions of minecraft as its not a perminent patch",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T00:14:06Z",
|
||
"updated_at": "2021-12-23T06:38:28Z",
|
||
"pushed_at": "2021-12-15T03:10:47Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436848055,
|
||
"name": "LogJackFix",
|
||
"full_name": "UltraVanilla\/LogJackFix",
|
||
"owner": {
|
||
"login": "UltraVanilla",
|
||
"id": 73727575,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73727575?v=4",
|
||
"html_url": "https:\/\/github.com\/UltraVanilla"
|
||
},
|
||
"html_url": "https:\/\/github.com\/UltraVanilla\/LogJackFix",
|
||
"description": "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients.",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T04:20:03Z",
|
||
"updated_at": "2021-12-10T05:11:17Z",
|
||
"pushed_at": "2021-12-10T04:20:15Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436860437,
|
||
"name": "Log4j2-CVE-2021-44228",
|
||
"full_name": "jas502n\/Log4j2-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "jas502n",
|
||
"id": 16593068,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||
"html_url": "https:\/\/github.com\/jas502n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jas502n\/Log4j2-CVE-2021-44228",
|
||
"description": "Remote Code Injection In Log4j",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T05:23:44Z",
|
||
"updated_at": "2022-01-13T06:36:25Z",
|
||
"pushed_at": "2021-12-14T15:30:16Z",
|
||
"stargazers_count": 311,
|
||
"watchers_count": 311,
|
||
"forks_count": 88,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 88,
|
||
"watchers": 311,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436871682,
|
||
"name": "Log4J-RCE-Proof-Of-Concept",
|
||
"full_name": "HyCraftHD\/Log4J-RCE-Proof-Of-Concept",
|
||
"owner": {
|
||
"login": "HyCraftHD",
|
||
"id": 7681220,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7681220?v=4",
|
||
"html_url": "https:\/\/github.com\/HyCraftHD"
|
||
},
|
||
"html_url": "https:\/\/github.com\/HyCraftHD\/Log4J-RCE-Proof-Of-Concept",
|
||
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T06:15:38Z",
|
||
"updated_at": "2022-01-09T07:50:37Z",
|
||
"pushed_at": "2021-12-16T01:33:48Z",
|
||
"stargazers_count": 179,
|
||
"watchers_count": 179,
|
||
"forks_count": 33,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2021-44228",
|
||
"cves",
|
||
"exploit",
|
||
"log4j",
|
||
"log4j2",
|
||
"minecraft"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 33,
|
||
"watchers": 179,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436877979,
|
||
"name": "cloudrasp-log4j2",
|
||
"full_name": "boundaryx\/cloudrasp-log4j2",
|
||
"owner": {
|
||
"login": "boundaryx",
|
||
"id": 95878655,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95878655?v=4",
|
||
"html_url": "https:\/\/github.com\/boundaryx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/boundaryx\/cloudrasp-log4j2",
|
||
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T06:42:37Z",
|
||
"updated_at": "2022-01-12T09:40:34Z",
|
||
"pushed_at": "2021-12-11T02:49:41Z",
|
||
"stargazers_count": 99,
|
||
"watchers_count": 99,
|
||
"forks_count": 14,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"defense",
|
||
"hardening",
|
||
"java",
|
||
"log4j",
|
||
"log4j2",
|
||
"protection",
|
||
"rasp",
|
||
"rce",
|
||
"security",
|
||
"security-tools",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 14,
|
||
"watchers": 99,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436881928,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "dbgee\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "dbgee",
|
||
"id": 46910972,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46910972?v=4",
|
||
"html_url": "https:\/\/github.com\/dbgee"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dbgee\/CVE-2021-44228",
|
||
"description": "Apache Log4j 2 a remote code execution vulnerability via the ldap JNDI parser.",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T06:59:10Z",
|
||
"updated_at": "2021-12-16T07:08:38Z",
|
||
"pushed_at": "2021-12-10T07:07:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436886692,
|
||
"name": "Log4j2-CVE-2021-44228",
|
||
"full_name": "y35uishere\/Log4j2-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "y35uishere",
|
||
"id": 8746668,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8746668?v=4",
|
||
"html_url": "https:\/\/github.com\/y35uishere"
|
||
},
|
||
"html_url": "https:\/\/github.com\/y35uishere\/Log4j2-CVE-2021-44228",
|
||
"description": "Remote Code Injection In Log4j",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T07:18:15Z",
|
||
"updated_at": "2021-12-12T03:47:13Z",
|
||
"pushed_at": "2021-12-10T05:46:20Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436918458,
|
||
"name": "Log4jPatcher",
|
||
"full_name": "CreeperHost\/Log4jPatcher",
|
||
"owner": {
|
||
"login": "CreeperHost",
|
||
"id": 7502613,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7502613?v=4",
|
||
"html_url": "https:\/\/github.com\/CreeperHost"
|
||
},
|
||
"html_url": "https:\/\/github.com\/CreeperHost\/Log4jPatcher",
|
||
"description": "A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T09:16:46Z",
|
||
"updated_at": "2022-01-05T14:05:44Z",
|
||
"pushed_at": "2021-12-18T01:49:36Z",
|
||
"stargazers_count": 44,
|
||
"watchers_count": 44,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4j2",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 44,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436919597,
|
||
"name": "RCE",
|
||
"full_name": "DragonSurvivalEU\/RCE",
|
||
"owner": {
|
||
"login": "DragonSurvivalEU",
|
||
"id": 92676019,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92676019?v=4",
|
||
"html_url": "https:\/\/github.com\/DragonSurvivalEU"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DragonSurvivalEU\/RCE",
|
||
"description": "CVE-2021-44228 fix",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T09:20:40Z",
|
||
"updated_at": "2021-12-20T00:38:12Z",
|
||
"pushed_at": "2021-12-20T00:38:10Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436926113,
|
||
"name": "Log4j-0Day-Fix",
|
||
"full_name": "Szczurowsky\/Log4j-0Day-Fix",
|
||
"owner": {
|
||
"login": "Szczurowsky",
|
||
"id": 70973416,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70973416?v=4",
|
||
"html_url": "https:\/\/github.com\/Szczurowsky"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Szczurowsky\/Log4j-0Day-Fix",
|
||
"description": "Plugin which fixes 0day exploit (CVE-2021-44228) with Log4j apache package",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T09:43:49Z",
|
||
"updated_at": "2021-12-10T10:03:31Z",
|
||
"pushed_at": "2021-12-10T10:04:21Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436933689,
|
||
"name": "Log4jPatch",
|
||
"full_name": "simonis\/Log4jPatch",
|
||
"owner": {
|
||
"login": "simonis",
|
||
"id": 3178197,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3178197?v=4",
|
||
"html_url": "https:\/\/github.com\/simonis"
|
||
},
|
||
"html_url": "https:\/\/github.com\/simonis\/Log4jPatch",
|
||
"description": "Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T10:10:19Z",
|
||
"updated_at": "2021-12-23T00:24:42Z",
|
||
"pushed_at": "2021-12-12T10:33:02Z",
|
||
"stargazers_count": 108,
|
||
"watchers_count": 108,
|
||
"forks_count": 11,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 11,
|
||
"watchers": 108,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436973468,
|
||
"name": "CVE-2021-44228-Test-Server",
|
||
"full_name": "zlepper\/CVE-2021-44228-Test-Server",
|
||
"owner": {
|
||
"login": "zlepper",
|
||
"id": 1499810,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1499810?v=4",
|
||
"html_url": "https:\/\/github.com\/zlepper"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zlepper\/CVE-2021-44228-Test-Server",
|
||
"description": "A small server for verifing if a given java program is succeptibel to CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T12:35:30Z",
|
||
"updated_at": "2022-01-06T10:39:51Z",
|
||
"pushed_at": "2021-12-10T12:39:25Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436974241,
|
||
"name": "log4shell-vulnerable-app",
|
||
"full_name": "christophetd\/log4shell-vulnerable-app",
|
||
"owner": {
|
||
"login": "christophetd",
|
||
"id": 136675,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4",
|
||
"html_url": "https:\/\/github.com\/christophetd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app",
|
||
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T12:38:20Z",
|
||
"updated_at": "2022-01-13T16:26:59Z",
|
||
"pushed_at": "2021-12-27T10:27:42Z",
|
||
"stargazers_count": 915,
|
||
"watchers_count": 915,
|
||
"forks_count": 357,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 357,
|
||
"watchers": 915,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437005376,
|
||
"name": "log4jcheck",
|
||
"full_name": "NorthwaveSecurity\/log4jcheck",
|
||
"owner": {
|
||
"login": "NorthwaveSecurity",
|
||
"id": 44571169,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44571169?v=4",
|
||
"html_url": "https:\/\/github.com\/NorthwaveSecurity"
|
||
},
|
||
"html_url": "https:\/\/github.com\/NorthwaveSecurity\/log4jcheck",
|
||
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T14:22:49Z",
|
||
"updated_at": "2022-01-07T11:47:04Z",
|
||
"pushed_at": "2021-12-14T15:16:15Z",
|
||
"stargazers_count": 118,
|
||
"watchers_count": 118,
|
||
"forks_count": 27,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"checker",
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4shell",
|
||
"rce",
|
||
"scanner"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 27,
|
||
"watchers": 118,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437026730,
|
||
"name": "VictimApp",
|
||
"full_name": "nkoneko\/VictimApp",
|
||
"owner": {
|
||
"login": "nkoneko",
|
||
"id": 1922341,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4",
|
||
"html_url": "https:\/\/github.com\/nkoneko"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nkoneko\/VictimApp",
|
||
"description": "Vulnerable to CVE-2021-44228. trustURLCodebase is not required.",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T15:32:03Z",
|
||
"updated_at": "2021-12-15T14:43:30Z",
|
||
"pushed_at": "2021-12-10T22:40:15Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437031223,
|
||
"name": "pulsar-docker-images-patch-CVE-2021-44228",
|
||
"full_name": "lhotari\/pulsar-docker-images-patch-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "lhotari",
|
||
"id": 66864,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4",
|
||
"html_url": "https:\/\/github.com\/lhotari"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lhotari\/pulsar-docker-images-patch-CVE-2021-44228",
|
||
"description": "Patch Pulsar Docker images with Log4J 2.17.1 update to mitigate Apache Log4J Security Vulnerabilities including Log4Shell",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T15:46:49Z",
|
||
"updated_at": "2022-01-13T06:41:10Z",
|
||
"pushed_at": "2022-01-13T06:40:43Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"docker",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437034295,
|
||
"name": "Apache-Log4j2-RCE",
|
||
"full_name": "1in9e\/Apache-Log4j2-RCE",
|
||
"owner": {
|
||
"login": "1in9e",
|
||
"id": 15817052,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15817052?v=4",
|
||
"html_url": "https:\/\/github.com\/1in9e"
|
||
},
|
||
"html_url": "https:\/\/github.com\/1in9e\/Apache-Log4j2-RCE",
|
||
"description": "Apache Log4j2 RCE( CVE-2021-44228)验证环境",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T15:57:14Z",
|
||
"updated_at": "2021-12-27T03:42:54Z",
|
||
"pushed_at": "2021-12-10T15:58:25Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"bugbounty",
|
||
"cve-2021-44228",
|
||
"java",
|
||
"log4j2",
|
||
"rce",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437056774,
|
||
"name": "CVE-2021-44228-example",
|
||
"full_name": "KosmX\/CVE-2021-44228-example",
|
||
"owner": {
|
||
"login": "KosmX",
|
||
"id": 15692868,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15692868?v=4",
|
||
"html_url": "https:\/\/github.com\/KosmX"
|
||
},
|
||
"html_url": "https:\/\/github.com\/KosmX\/CVE-2021-44228-example",
|
||
"description": "vulnerability POC",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T17:13:18Z",
|
||
"updated_at": "2021-12-17T17:16:32Z",
|
||
"pushed_at": "2021-12-17T17:16:30Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2021-44228",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437060009,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "greymd\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "greymd",
|
||
"id": 3874767,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4",
|
||
"html_url": "https:\/\/github.com\/greymd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/greymd\/CVE-2021-44228",
|
||
"description": "Vulnerability CVE-2021-44228 checker",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T17:24:47Z",
|
||
"updated_at": "2022-01-03T11:28:03Z",
|
||
"pushed_at": "2021-12-13T15:16:23Z",
|
||
"stargazers_count": 38,
|
||
"watchers_count": 38,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 38,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437071396,
|
||
"name": "CVE-2021-44228-Log4Shell-Hashes",
|
||
"full_name": "mubix\/CVE-2021-44228-Log4Shell-Hashes",
|
||
"owner": {
|
||
"login": "mubix",
|
||
"id": 679319,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/679319?v=4",
|
||
"html_url": "https:\/\/github.com\/mubix"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mubix\/CVE-2021-44228-Log4Shell-Hashes",
|
||
"description": "Hashes for vulnerable LOG4J versions",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T18:06:06Z",
|
||
"updated_at": "2022-01-10T19:28:49Z",
|
||
"pushed_at": "2021-12-17T17:02:24Z",
|
||
"stargazers_count": 145,
|
||
"watchers_count": 145,
|
||
"forks_count": 36,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 36,
|
||
"watchers": 145,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437091396,
|
||
"name": "mc-log4j-patcher",
|
||
"full_name": "OopsieWoopsie\/mc-log4j-patcher",
|
||
"owner": {
|
||
"login": "OopsieWoopsie",
|
||
"id": 15069175,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15069175?v=4",
|
||
"html_url": "https:\/\/github.com\/OopsieWoopsie"
|
||
},
|
||
"html_url": "https:\/\/github.com\/OopsieWoopsie\/mc-log4j-patcher",
|
||
"description": "CVE-2021-44228 server-side fix for minecraft servers.",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T19:25:31Z",
|
||
"updated_at": "2021-12-11T16:51:56Z",
|
||
"pushed_at": "2021-12-10T19:47:45Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"fix",
|
||
"log4j2",
|
||
"minecraft",
|
||
"paper",
|
||
"spigot"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437097787,
|
||
"name": "CVE-2021-44228-kusto",
|
||
"full_name": "wheez-y\/CVE-2021-44228-kusto",
|
||
"owner": {
|
||
"login": "wheez-y",
|
||
"id": 77060088,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77060088?v=4",
|
||
"html_url": "https:\/\/github.com\/wheez-y"
|
||
},
|
||
"html_url": "https:\/\/github.com\/wheez-y\/CVE-2021-44228-kusto",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-10T19:53:32Z",
|
||
"updated_at": "2021-12-10T19:55:16Z",
|
||
"pushed_at": "2021-12-10T19:55:14Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437108119,
|
||
"name": "log4shell-mitigation",
|
||
"full_name": "izzyacademy\/log4shell-mitigation",
|
||
"owner": {
|
||
"login": "izzyacademy",
|
||
"id": 44282278,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44282278?v=4",
|
||
"html_url": "https:\/\/github.com\/izzyacademy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/izzyacademy\/log4shell-mitigation",
|
||
"description": "Mitigation for Log4Shell Security Vulnerability CVE-2021-44228 ",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T20:39:56Z",
|
||
"updated_at": "2021-12-11T16:21:03Z",
|
||
"pushed_at": "2021-12-11T16:21:01Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437115624,
|
||
"name": "CVE-2021-44228-poc",
|
||
"full_name": "StandB\/CVE-2021-44228-poc",
|
||
"owner": {
|
||
"login": "StandB",
|
||
"id": 17493969,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17493969?v=4",
|
||
"html_url": "https:\/\/github.com\/StandB"
|
||
},
|
||
"html_url": "https:\/\/github.com\/StandB\/CVE-2021-44228-poc",
|
||
"description": "log4shell sample application (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T21:13:46Z",
|
||
"updated_at": "2021-12-26T17:22:36Z",
|
||
"pushed_at": "2021-12-10T21:15:23Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437121151,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "seamus-dev\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "seamus-dev",
|
||
"id": 77751614,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77751614?v=4",
|
||
"html_url": "https:\/\/github.com\/seamus-dev"
|
||
},
|
||
"html_url": "https:\/\/github.com\/seamus-dev\/CVE-2021-44228",
|
||
"description": "list of ips pulled from greynoise for this",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T21:41:12Z",
|
||
"updated_at": "2021-12-15T19:23:19Z",
|
||
"pushed_at": "2021-12-15T19:23:17Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437122153,
|
||
"name": "log4j-detect",
|
||
"full_name": "takito1812\/log4j-detect",
|
||
"owner": {
|
||
"login": "takito1812",
|
||
"id": 56491288,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56491288?v=4",
|
||
"html_url": "https:\/\/github.com\/takito1812"
|
||
},
|
||
"html_url": "https:\/\/github.com\/takito1812\/log4j-detect",
|
||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T21:46:18Z",
|
||
"updated_at": "2022-01-12T04:02:07Z",
|
||
"pushed_at": "2021-12-13T22:27:25Z",
|
||
"stargazers_count": 138,
|
||
"watchers_count": 138,
|
||
"forks_count": 54,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 54,
|
||
"watchers": 138,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437124793,
|
||
"name": "log4noshell",
|
||
"full_name": "suhtiva\/log4noshell",
|
||
"owner": {
|
||
"login": "suhtiva",
|
||
"id": 31022473,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4",
|
||
"html_url": "https:\/\/github.com\/suhtiva"
|
||
},
|
||
"html_url": "https:\/\/github.com\/suhtiva\/log4noshell",
|
||
"description": "Java agent that disables Apache Log4J's JNDI Lookup. Fixes CVE-2021-44228, aka \"Log4Shell.\"",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T21:59:31Z",
|
||
"updated_at": "2021-12-25T10:02:03Z",
|
||
"pushed_at": "2021-12-25T10:02:00Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"cve",
|
||
"log4j",
|
||
"patch",
|
||
"security",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437128632,
|
||
"name": "CVE-2021-44228-DFIR-Notes",
|
||
"full_name": "Azeemering\/CVE-2021-44228-DFIR-Notes",
|
||
"owner": {
|
||
"login": "Azeemering",
|
||
"id": 31852867,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31852867?v=4",
|
||
"html_url": "https:\/\/github.com\/Azeemering"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Azeemering\/CVE-2021-44228-DFIR-Notes",
|
||
"description": "CVE-2021-44228 DFIR Notes",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T22:19:16Z",
|
||
"updated_at": "2022-01-09T20:08:07Z",
|
||
"pushed_at": "2021-12-14T12:15:16Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437131550,
|
||
"name": "CVE-2021-44228-PoC-log4j-bypass-words",
|
||
"full_name": "Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words",
|
||
"owner": {
|
||
"login": "Puliczek",
|
||
"id": 12344862,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12344862?v=4",
|
||
"html_url": "https:\/\/github.com\/Puliczek"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words",
|
||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T22:35:00Z",
|
||
"updated_at": "2022-01-13T12:03:04Z",
|
||
"pushed_at": "2021-12-31T11:47:19Z",
|
||
"stargazers_count": 607,
|
||
"watchers_count": 607,
|
||
"forks_count": 94,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"bugbounttips",
|
||
"bugbounty",
|
||
"bugbounty-writeups",
|
||
"cve",
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"cve-2021-45105",
|
||
"cybersecurity",
|
||
"exploit",
|
||
"hacking",
|
||
"log4j",
|
||
"payload",
|
||
"pentest",
|
||
"pentesting",
|
||
"poc",
|
||
"red-team",
|
||
"security",
|
||
"security-writeups",
|
||
"writeups"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 94,
|
||
"watchers": 607,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437139341,
|
||
"name": "log4j-shell-poc",
|
||
"full_name": "kozmer\/log4j-shell-poc",
|
||
"owner": {
|
||
"login": "kozmer",
|
||
"id": 87979263,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4",
|
||
"html_url": "https:\/\/github.com\/kozmer"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kozmer\/log4j-shell-poc",
|
||
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T23:19:28Z",
|
||
"updated_at": "2022-01-13T11:41:27Z",
|
||
"pushed_at": "2022-01-02T07:12:10Z",
|
||
"stargazers_count": 1151,
|
||
"watchers_count": 1151,
|
||
"forks_count": 295,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"java",
|
||
"log4j",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 295,
|
||
"watchers": 1151,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437141854,
|
||
"name": "cve-2021-44228-workaround-buildpack",
|
||
"full_name": "alexandreroman\/cve-2021-44228-workaround-buildpack",
|
||
"owner": {
|
||
"login": "alexandreroman",
|
||
"id": 665131,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/665131?v=4",
|
||
"html_url": "https:\/\/github.com\/alexandreroman"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alexandreroman\/cve-2021-44228-workaround-buildpack",
|
||
"description": "Buildpack providing a workaround for CVE-2021-44228 (Log4j RCE exploit)",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T23:34:52Z",
|
||
"updated_at": "2022-01-04T17:48:12Z",
|
||
"pushed_at": "2021-12-10T23:47:14Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437141974,
|
||
"name": "minecraft-log4j-honeypot",
|
||
"full_name": "Adikso\/minecraft-log4j-honeypot",
|
||
"owner": {
|
||
"login": "Adikso",
|
||
"id": 1407751,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1407751?v=4",
|
||
"html_url": "https:\/\/github.com\/Adikso"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Adikso\/minecraft-log4j-honeypot",
|
||
"description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T23:35:31Z",
|
||
"updated_at": "2022-01-09T12:12:14Z",
|
||
"pushed_at": "2021-12-14T13:43:35Z",
|
||
"stargazers_count": 70,
|
||
"watchers_count": 70,
|
||
"forks_count": 16,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve",
|
||
"exploit",
|
||
"log4j",
|
||
"minecraft"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 16,
|
||
"watchers": 70,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437142312,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "racoon-rac\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "racoon-rac",
|
||
"id": 64579294,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4",
|
||
"html_url": "https:\/\/github.com\/racoon-rac"
|
||
},
|
||
"html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-10T23:37:55Z",
|
||
"updated_at": "2021-12-11T01:11:19Z",
|
||
"pushed_at": "2021-12-11T01:07:24Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437142703,
|
||
"name": "CVE-2021-44228-PoC",
|
||
"full_name": "TheArqsz\/CVE-2021-44228-PoC",
|
||
"owner": {
|
||
"login": "TheArqsz",
|
||
"id": 38382850,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38382850?v=4",
|
||
"html_url": "https:\/\/github.com\/TheArqsz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/TheArqsz\/CVE-2021-44228-PoC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-10T23:40:39Z",
|
||
"updated_at": "2021-12-17T15:29:24Z",
|
||
"pushed_at": "2021-12-17T15:29:08Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437155858,
|
||
"name": "log4shelldetect",
|
||
"full_name": "1lann\/log4shelldetect",
|
||
"owner": {
|
||
"login": "1lann",
|
||
"id": 804919,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/804919?v=4",
|
||
"html_url": "https:\/\/github.com\/1lann"
|
||
},
|
||
"html_url": "https:\/\/github.com\/1lann\/log4shelldetect",
|
||
"description": "Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or \"that Log4j JNDI exploit\" by inspecting the class paths inside files",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T01:08:00Z",
|
||
"updated_at": "2021-12-29T19:18:20Z",
|
||
"pushed_at": "2022-01-05T23:07:50Z",
|
||
"stargazers_count": 39,
|
||
"watchers_count": 39,
|
||
"forks_count": 9,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"log4j",
|
||
"log4j2",
|
||
"log4shell",
|
||
"scanner",
|
||
"vulnerability-scanners"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 9,
|
||
"watchers": 39,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437164940,
|
||
"name": "Log4j2-RCE",
|
||
"full_name": "binganao\/Log4j2-RCE",
|
||
"owner": {
|
||
"login": "binganao",
|
||
"id": 70050083,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4",
|
||
"html_url": "https:\/\/github.com\/binganao"
|
||
},
|
||
"html_url": "https:\/\/github.com\/binganao\/Log4j2-RCE",
|
||
"description": "Log4j2 CVE-2021-44228 复现和回显利用",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T02:08:41Z",
|
||
"updated_at": "2021-12-27T05:55:01Z",
|
||
"pushed_at": "2021-12-11T03:38:03Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437170557,
|
||
"name": "sample-ldap-exploit",
|
||
"full_name": "phoswald\/sample-ldap-exploit",
|
||
"owner": {
|
||
"login": "phoswald",
|
||
"id": 12776329,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4",
|
||
"html_url": "https:\/\/github.com\/phoswald"
|
||
},
|
||
"html_url": "https:\/\/github.com\/phoswald\/sample-ldap-exploit",
|
||
"description": "A short demo of CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T02:45:39Z",
|
||
"updated_at": "2022-01-09T20:09:00Z",
|
||
"pushed_at": "2021-12-13T09:20:35Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437174339,
|
||
"name": "jndi-ldap-test-server",
|
||
"full_name": "rakutentech\/jndi-ldap-test-server",
|
||
"owner": {
|
||
"login": "rakutentech",
|
||
"id": 1415441,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1415441?v=4",
|
||
"html_url": "https:\/\/github.com\/rakutentech"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rakutentech\/jndi-ldap-test-server",
|
||
"description": "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T03:08:14Z",
|
||
"updated_at": "2022-01-03T09:26:00Z",
|
||
"pushed_at": "2021-12-13T16:17:03Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"jndi",
|
||
"ldap",
|
||
"log4j",
|
||
"log4j2",
|
||
"vulnerability-detection"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437186290,
|
||
"name": "cve-2021-44228--spring-hibernate",
|
||
"full_name": "uint0\/cve-2021-44228--spring-hibernate",
|
||
"owner": {
|
||
"login": "uint0",
|
||
"id": 11325389,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4",
|
||
"html_url": "https:\/\/github.com\/uint0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/uint0\/cve-2021-44228--spring-hibernate",
|
||
"description": "CVE-2021-44228 POC - Spring \/ Hibernate",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T04:23:22Z",
|
||
"updated_at": "2021-12-15T05:36:58Z",
|
||
"pushed_at": "2021-12-11T06:25:12Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437214791,
|
||
"name": "log4j-vulnerability-patcher-agent",
|
||
"full_name": "saharNooby\/log4j-vulnerability-patcher-agent",
|
||
"owner": {
|
||
"login": "saharNooby",
|
||
"id": 10616794,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10616794?v=4",
|
||
"html_url": "https:\/\/github.com\/saharNooby"
|
||
},
|
||
"html_url": "https:\/\/github.com\/saharNooby\/log4j-vulnerability-patcher-agent",
|
||
"description": "Fixes CVE-2021-44228 in log4j by patching JndiLookup class",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T07:16:21Z",
|
||
"updated_at": "2021-12-11T11:09:42Z",
|
||
"pushed_at": "2021-12-11T07:34:01Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"agent",
|
||
"bytecode",
|
||
"cve",
|
||
"fix",
|
||
"log4j",
|
||
"patch"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437215271,
|
||
"name": "log4j2burpscanner",
|
||
"full_name": "f0ng\/log4j2burpscanner",
|
||
"owner": {
|
||
"login": "f0ng",
|
||
"id": 48286013,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4",
|
||
"html_url": "https:\/\/github.com\/f0ng"
|
||
},
|
||
"html_url": "https:\/\/github.com\/f0ng\/log4j2burpscanner",
|
||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T07:19:11Z",
|
||
"updated_at": "2022-01-13T00:56:35Z",
|
||
"pushed_at": "2022-01-11T05:46:22Z",
|
||
"stargazers_count": 176,
|
||
"watchers_count": 176,
|
||
"forks_count": 53,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"burp-extensions",
|
||
"burp-plugin",
|
||
"log4j2",
|
||
"log4jshell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 53,
|
||
"watchers": 176,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437221795,
|
||
"name": "CVE-2021-44228-Log4j-lookup-Rce",
|
||
"full_name": "M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce",
|
||
"owner": {
|
||
"login": "M1ngGod",
|
||
"id": 81064151,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81064151?v=4",
|
||
"html_url": "https:\/\/github.com\/M1ngGod"
|
||
},
|
||
"html_url": "https:\/\/github.com\/M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-11T07:55:45Z",
|
||
"updated_at": "2021-12-12T09:17:27Z",
|
||
"pushed_at": "2021-12-11T08:07:20Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437244092,
|
||
"name": "CVE-2021-44228-Apache-Log4j-Rce",
|
||
"full_name": "byteboycn\/CVE-2021-44228-Apache-Log4j-Rce",
|
||
"owner": {
|
||
"login": "byteboycn",
|
||
"id": 14987996,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14987996?v=4",
|
||
"html_url": "https:\/\/github.com\/byteboycn"
|
||
},
|
||
"html_url": "https:\/\/github.com\/byteboycn\/CVE-2021-44228-Apache-Log4j-Rce",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-11T09:52:36Z",
|
||
"updated_at": "2021-12-13T07:32:26Z",
|
||
"pushed_at": "2021-12-11T09:53:39Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437248883,
|
||
"name": "log4shell-mitigation-tester",
|
||
"full_name": "lhotari\/log4shell-mitigation-tester",
|
||
"owner": {
|
||
"login": "lhotari",
|
||
"id": 66864,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4",
|
||
"html_url": "https:\/\/github.com\/lhotari"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester",
|
||
"description": "Log4Shell CVE-2021-44228 mitigation tester",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T10:16:58Z",
|
||
"updated_at": "2021-12-21T20:05:48Z",
|
||
"pushed_at": "2021-12-13T17:24:37Z",
|
||
"stargazers_count": 16,
|
||
"watchers_count": 16,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 16,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437249303,
|
||
"name": "log4j-rce-detect-waf-bypass",
|
||
"full_name": "toramanemre\/log4j-rce-detect-waf-bypass",
|
||
"owner": {
|
||
"login": "toramanemre",
|
||
"id": 24626967,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4",
|
||
"html_url": "https:\/\/github.com\/toramanemre"
|
||
},
|
||
"html_url": "https:\/\/github.com\/toramanemre\/log4j-rce-detect-waf-bypass",
|
||
"description": "A Nuclei Template for Apache Log4j RCE (CVE-2021-44228) Detection with WAF Bypass Payloads",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T10:19:01Z",
|
||
"updated_at": "2022-01-11T10:22:31Z",
|
||
"pushed_at": "2021-12-11T10:19:51Z",
|
||
"stargazers_count": 15,
|
||
"watchers_count": 15,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 15,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437261211,
|
||
"name": "CVE-2021-44228-Scanner",
|
||
"full_name": "logpresso\/CVE-2021-44228-Scanner",
|
||
"owner": {
|
||
"login": "logpresso",
|
||
"id": 14171714,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14171714?v=4",
|
||
"html_url": "https:\/\/github.com\/logpresso"
|
||
},
|
||
"html_url": "https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner",
|
||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T11:18:46Z",
|
||
"updated_at": "2022-01-13T12:12:16Z",
|
||
"pushed_at": "2022-01-11T14:45:44Z",
|
||
"stargazers_count": 733,
|
||
"watchers_count": 733,
|
||
"forks_count": 148,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-4104",
|
||
"cve-2021-42550",
|
||
"cve-2021-44228",
|
||
"cve-2021-44832",
|
||
"cve-2021-45046",
|
||
"cve-2021-45105",
|
||
"log4j2",
|
||
"patch",
|
||
"scanner"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 148,
|
||
"watchers": 733,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437265194,
|
||
"name": "Log4j_CVE-2021-44228",
|
||
"full_name": "vorburger\/Log4j_CVE-2021-44228",
|
||
"owner": {
|
||
"login": "vorburger",
|
||
"id": 298598,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/298598?v=4",
|
||
"html_url": "https:\/\/github.com\/vorburger"
|
||
},
|
||
"html_url": "https:\/\/github.com\/vorburger\/Log4j_CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-11T11:38:16Z",
|
||
"updated_at": "2021-12-28T04:11:44Z",
|
||
"pushed_at": "2021-12-11T17:02:09Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437265792,
|
||
"name": "log4j2021_vul_test",
|
||
"full_name": "gauthamg\/log4j2021_vul_test",
|
||
"owner": {
|
||
"login": "gauthamg",
|
||
"id": 8748677,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4",
|
||
"html_url": "https:\/\/github.com\/gauthamg"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test",
|
||
"description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T11:41:04Z",
|
||
"updated_at": "2021-12-13T06:49:35Z",
|
||
"pushed_at": "2021-12-13T06:49:32Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437273514,
|
||
"name": "CVE-2021-44228-playground",
|
||
"full_name": "b-abderrahmane\/CVE-2021-44228-playground",
|
||
"owner": {
|
||
"login": "b-abderrahmane",
|
||
"id": 10504574,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10504574?v=4",
|
||
"html_url": "https:\/\/github.com\/b-abderrahmane"
|
||
},
|
||
"html_url": "https:\/\/github.com\/b-abderrahmane\/CVE-2021-44228-playground",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-11T12:16:45Z",
|
||
"updated_at": "2022-01-05T09:19:16Z",
|
||
"pushed_at": "2022-01-05T09:19:14Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437275323,
|
||
"name": "jndiRep",
|
||
"full_name": "js-on\/jndiRep",
|
||
"owner": {
|
||
"login": "js-on",
|
||
"id": 55274241,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55274241?v=4",
|
||
"html_url": "https:\/\/github.com\/js-on"
|
||
},
|
||
"html_url": "https:\/\/github.com\/js-on\/jndiRep",
|
||
"description": "Scan your logs for CVE-2021-44228 related activity and report the attackers",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T12:25:08Z",
|
||
"updated_at": "2021-12-15T23:01:48Z",
|
||
"pushed_at": "2021-12-15T23:01:45Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437278973,
|
||
"name": "CVE-2021-44228-Advisories",
|
||
"full_name": "leetxyz\/CVE-2021-44228-Advisories",
|
||
"owner": {
|
||
"login": "leetxyz",
|
||
"id": 46599191,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46599191?v=4",
|
||
"html_url": "https:\/\/github.com\/leetxyz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/leetxyz\/CVE-2021-44228-Advisories",
|
||
"description": "List of company advisories log4j",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T12:41:38Z",
|
||
"updated_at": "2022-01-09T20:08:19Z",
|
||
"pushed_at": "2021-12-12T09:46:17Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437283982,
|
||
"name": "log4shell",
|
||
"full_name": "cado-security\/log4shell",
|
||
"owner": {
|
||
"login": "cado-security",
|
||
"id": 63289041,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63289041?v=4",
|
||
"html_url": "https:\/\/github.com\/cado-security"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cado-security\/log4shell",
|
||
"description": "Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T13:03:31Z",
|
||
"updated_at": "2021-12-11T14:52:33Z",
|
||
"pushed_at": "2021-12-11T14:52:30Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437289885,
|
||
"name": "Log4J_0day_RCE",
|
||
"full_name": "PwnC00re\/Log4J_0day_RCE",
|
||
"owner": {
|
||
"login": "PwnC00re",
|
||
"id": 95032387,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95032387?v=4",
|
||
"html_url": "https:\/\/github.com\/PwnC00re"
|
||
},
|
||
"html_url": "https:\/\/github.com\/PwnC00re\/Log4J_0day_RCE",
|
||
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T13:28:52Z",
|
||
"updated_at": "2021-12-12T03:48:01Z",
|
||
"pushed_at": "2021-12-11T13:31:47Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437296454,
|
||
"name": "log4j-vulnerable-app-cve-2021-44228-terraform",
|
||
"full_name": "Mormoroth\/log4j-vulnerable-app-cve-2021-44228-terraform",
|
||
"owner": {
|
||
"login": "Mormoroth",
|
||
"id": 23025217,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23025217?v=4",
|
||
"html_url": "https:\/\/github.com\/Mormoroth"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Mormoroth\/log4j-vulnerable-app-cve-2021-44228-terraform",
|
||
"description": "A Terraform to deploy vulnerable app and a JDNIExploit to work with CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T13:56:28Z",
|
||
"updated_at": "2022-01-13T15:38:17Z",
|
||
"pushed_at": "2021-12-11T14:53:38Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437310436,
|
||
"name": "log4j-CVE-2021-44228-Public-IoCs",
|
||
"full_name": "Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs",
|
||
"owner": {
|
||
"login": "Sh0ckFR",
|
||
"id": 10033649,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10033649?v=4",
|
||
"html_url": "https:\/\/github.com\/Sh0ckFR"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs",
|
||
"description": "Public IoCs about log4j CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T14:54:45Z",
|
||
"updated_at": "2021-12-17T22:43:20Z",
|
||
"pushed_at": "2021-12-17T10:14:30Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 11,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437316134,
|
||
"name": "log4j2-vulnerable-spring-app",
|
||
"full_name": "zzzz0317\/log4j2-vulnerable-spring-app",
|
||
"owner": {
|
||
"login": "zzzz0317",
|
||
"id": 16097046,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4",
|
||
"html_url": "https:\/\/github.com\/zzzz0317"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app",
|
||
"description": "CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T15:18:42Z",
|
||
"updated_at": "2021-12-13T02:14:17Z",
|
||
"pushed_at": "2021-12-13T02:14:14Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437319619,
|
||
"name": "test-44228",
|
||
"full_name": "datadavev\/test-44228",
|
||
"owner": {
|
||
"login": "datadavev",
|
||
"id": 605409,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/605409?v=4",
|
||
"html_url": "https:\/\/github.com\/datadavev"
|
||
},
|
||
"html_url": "https:\/\/github.com\/datadavev\/test-44228",
|
||
"description": "Simple demo of CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T15:33:17Z",
|
||
"updated_at": "2021-12-11T15:42:35Z",
|
||
"pushed_at": "2022-01-04T16:56:11Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437323133,
|
||
"name": "JndiRemover",
|
||
"full_name": "LemonCraftRu\/JndiRemover",
|
||
"owner": {
|
||
"login": "LemonCraftRu",
|
||
"id": 73554117,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73554117?v=4",
|
||
"html_url": "https:\/\/github.com\/LemonCraftRu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LemonCraftRu\/JndiRemover",
|
||
"description": "Небольшой мод направленный на устранение уязвимости CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T15:48:03Z",
|
||
"updated_at": "2022-01-08T19:26:15Z",
|
||
"pushed_at": "2022-01-08T19:26:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"jndi-exploit",
|
||
"log4j",
|
||
"minecraft-mod"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437327955,
|
||
"name": "Log4j-Rec-CVE-2021-44228",
|
||
"full_name": "zhangxvx\/Log4j-Rec-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "zhangxvx",
|
||
"id": 19684449,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19684449?v=4",
|
||
"html_url": "https:\/\/github.com\/zhangxvx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zhangxvx\/Log4j-Rec-CVE-2021-44228",
|
||
"description": "Apache Log4j CVE-2021-44228 漏洞复现",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T16:08:34Z",
|
||
"updated_at": "2021-12-12T03:50:45Z",
|
||
"pushed_at": "2021-12-12T03:49:16Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437327995,
|
||
"name": "Log4j-CVE-Detect",
|
||
"full_name": "darkarnium\/Log4j-CVE-Detect",
|
||
"owner": {
|
||
"login": "darkarnium",
|
||
"id": 3048394,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3048394?v=4",
|
||
"html_url": "https:\/\/github.com\/darkarnium"
|
||
},
|
||
"html_url": "https:\/\/github.com\/darkarnium\/Log4j-CVE-Detect",
|
||
"description": "Detections for CVE-2021-44228 inside of nested binaries",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T16:08:47Z",
|
||
"updated_at": "2022-01-07T13:46:21Z",
|
||
"pushed_at": "2021-12-18T22:20:25Z",
|
||
"stargazers_count": 29,
|
||
"watchers_count": 29,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"binary",
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"detection",
|
||
"devops",
|
||
"python",
|
||
"sca",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 29,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437381453,
|
||
"name": "CVE-2021-44228_Example",
|
||
"full_name": "chilliwebs\/CVE-2021-44228_Example",
|
||
"owner": {
|
||
"login": "chilliwebs",
|
||
"id": 6079309,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6079309?v=4",
|
||
"html_url": "https:\/\/github.com\/chilliwebs"
|
||
},
|
||
"html_url": "https:\/\/github.com\/chilliwebs\/CVE-2021-44228_Example",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-11T20:25:08Z",
|
||
"updated_at": "2022-01-03T13:51:27Z",
|
||
"pushed_at": "2021-12-15T20:27:59Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437397347,
|
||
"name": "f5-waf-enforce-sig-CVE-2021-44228",
|
||
"full_name": "irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "irgoncalves",
|
||
"id": 23459099,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4",
|
||
"html_url": "https:\/\/github.com\/irgoncalves"
|
||
},
|
||
"html_url": "https:\/\/github.com\/irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228",
|
||
"description": "This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T21:59:19Z",
|
||
"updated_at": "2021-12-20T18:57:49Z",
|
||
"pushed_at": "2021-12-15T18:56:57Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437407625,
|
||
"name": "log4j-docker-vaccine",
|
||
"full_name": "jeffbryner\/log4j-docker-vaccine",
|
||
"owner": {
|
||
"login": "jeffbryner",
|
||
"id": 566889,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/566889?v=4",
|
||
"html_url": "https:\/\/github.com\/jeffbryner"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jeffbryner\/log4j-docker-vaccine",
|
||
"description": "docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T23:06:23Z",
|
||
"updated_at": "2021-12-12T12:28:06Z",
|
||
"pushed_at": "2021-12-12T00:15:23Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437419010,
|
||
"name": "log4j-detector",
|
||
"full_name": "mergebase\/log4j-detector",
|
||
"owner": {
|
||
"login": "mergebase",
|
||
"id": 73667397,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4",
|
||
"html_url": "https:\/\/github.com\/mergebase"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mergebase\/log4j-detector",
|
||
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T00:29:03Z",
|
||
"updated_at": "2022-01-13T13:57:55Z",
|
||
"pushed_at": "2022-01-07T09:40:06Z",
|
||
"stargazers_count": 579,
|
||
"watchers_count": 579,
|
||
"forks_count": 94,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"cve-2021-45105",
|
||
"cybersecurity",
|
||
"detector",
|
||
"log4j",
|
||
"log4shell",
|
||
"pentest",
|
||
"sca",
|
||
"scanner",
|
||
"vulnerability-scanner"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 94,
|
||
"watchers": 579,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437426248,
|
||
"name": "log4j2-rce-poc",
|
||
"full_name": "unlimitedsola\/log4j2-rce-poc",
|
||
"owner": {
|
||
"login": "unlimitedsola",
|
||
"id": 3632663,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3632663?v=4",
|
||
"html_url": "https:\/\/github.com\/unlimitedsola"
|
||
},
|
||
"html_url": "https:\/\/github.com\/unlimitedsola\/log4j2-rce-poc",
|
||
"description": "A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228\/Log4Shell).",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T01:23:45Z",
|
||
"updated_at": "2022-01-01T11:10:20Z",
|
||
"pushed_at": "2021-12-12T09:59:26Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j2",
|
||
"log4shell",
|
||
"poc",
|
||
"proof-of-concept",
|
||
"rce",
|
||
"remote-code-execution"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437426359,
|
||
"name": "log4j2burpscanner",
|
||
"full_name": "Jeromeyoung\/log4j2burpscanner",
|
||
"owner": {
|
||
"login": "Jeromeyoung",
|
||
"id": 39945364,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
|
||
"html_url": "https:\/\/github.com\/Jeromeyoung"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Jeromeyoung\/log4j2burpscanner",
|
||
"description": "CVE-2021-44228,log4j2 burp插件 Java版本,dnslog选取了非dnslog.cn域名",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T01:24:39Z",
|
||
"updated_at": "2021-12-16T02:47:01Z",
|
||
"pushed_at": "2021-12-11T10:39:41Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 35,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 35,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437426386,
|
||
"name": "hotpatch-for-apache-log4j2",
|
||
"full_name": "corretto\/hotpatch-for-apache-log4j2",
|
||
"owner": {
|
||
"login": "corretto",
|
||
"id": 44104058,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44104058?v=4",
|
||
"html_url": "https:\/\/github.com\/corretto"
|
||
},
|
||
"html_url": "https:\/\/github.com\/corretto\/hotpatch-for-apache-log4j2",
|
||
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T01:24:51Z",
|
||
"updated_at": "2022-01-13T16:56:49Z",
|
||
"pushed_at": "2021-12-23T20:40:44Z",
|
||
"stargazers_count": 479,
|
||
"watchers_count": 479,
|
||
"forks_count": 61,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 61,
|
||
"watchers": 479,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437438829,
|
||
"name": "python-log4rce",
|
||
"full_name": "alexandre-lavoie\/python-log4rce",
|
||
"owner": {
|
||
"login": "alexandre-lavoie",
|
||
"id": 36684879,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36684879?v=4",
|
||
"html_url": "https:\/\/github.com\/alexandre-lavoie"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alexandre-lavoie\/python-log4rce",
|
||
"description": "An All-In-One Pure Python PoC for CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T02:57:49Z",
|
||
"updated_at": "2022-01-11T07:29:47Z",
|
||
"pushed_at": "2021-12-16T18:34:46Z",
|
||
"stargazers_count": 179,
|
||
"watchers_count": 179,
|
||
"forks_count": 31,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cli",
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"python",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 31,
|
||
"watchers": 179,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437439106,
|
||
"name": "Log4Shell_CVE-2021-44228_related_attacks_IOCs",
|
||
"full_name": "RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs",
|
||
"owner": {
|
||
"login": "RedDrip7",
|
||
"id": 51360411,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51360411?v=4",
|
||
"html_url": "https:\/\/github.com\/RedDrip7"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-12T02:59:54Z",
|
||
"updated_at": "2022-01-11T14:40:29Z",
|
||
"pushed_at": "2021-12-15T10:19:51Z",
|
||
"stargazers_count": 42,
|
||
"watchers_count": 42,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 42,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437440782,
|
||
"name": "CVE-2021-44228-Demo",
|
||
"full_name": "mzlogin\/CVE-2021-44228-Demo",
|
||
"owner": {
|
||
"login": "mzlogin",
|
||
"id": 1646590,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1646590?v=4",
|
||
"html_url": "https:\/\/github.com\/mzlogin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mzlogin\/CVE-2021-44228-Demo",
|
||
"description": "Apache Log4j2 CVE-2021-44228 RCE Demo with RMI and LDAP",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T03:11:14Z",
|
||
"updated_at": "2021-12-14T10:37:01Z",
|
||
"pushed_at": "2021-12-12T03:22:59Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"jndi",
|
||
"ldap",
|
||
"rmi"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437450552,
|
||
"name": "CVE-2021-44228-quickfix-script",
|
||
"full_name": "Ghost-chu\/CVE-2021-44228-quickfix-script",
|
||
"owner": {
|
||
"login": "Ghost-chu",
|
||
"id": 30802565,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30802565?v=4",
|
||
"html_url": "https:\/\/github.com\/Ghost-chu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Ghost-chu\/CVE-2021-44228-quickfix-script",
|
||
"description": "Use environment variable to disable lookup.",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T04:17:08Z",
|
||
"updated_at": "2021-12-12T05:19:16Z",
|
||
"pushed_at": "2021-12-12T05:19:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437451451,
|
||
"name": "vcenter-log4j",
|
||
"full_name": "blake-fm\/vcenter-log4j",
|
||
"owner": {
|
||
"login": "blake-fm",
|
||
"id": 89286531,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89286531?v=4",
|
||
"html_url": "https:\/\/github.com\/blake-fm"
|
||
},
|
||
"html_url": "https:\/\/github.com\/blake-fm\/vcenter-log4j",
|
||
"description": "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T04:23:10Z",
|
||
"updated_at": "2021-12-19T12:31:23Z",
|
||
"pushed_at": "2021-12-15T12:17:19Z",
|
||
"stargazers_count": 16,
|
||
"watchers_count": 16,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 16,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437479258,
|
||
"name": "CVE-2021-44228-Apache-Log4j-Rce__review",
|
||
"full_name": "creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review",
|
||
"owner": {
|
||
"login": "creamIcec",
|
||
"id": 42510470,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42510470?v=4",
|
||
"html_url": "https:\/\/github.com\/creamIcec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review",
|
||
"description": "log4j2漏洞复现",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T07:20:03Z",
|
||
"updated_at": "2021-12-12T07:20:03Z",
|
||
"pushed_at": "2021-12-12T07:20:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437482830,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "bchaber\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "bchaber",
|
||
"id": 45143424,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45143424?v=4",
|
||
"html_url": "https:\/\/github.com\/bchaber"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bchaber\/CVE-2021-44228",
|
||
"description": "My take on Log4j2 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T07:39:51Z",
|
||
"updated_at": "2021-12-12T07:41:16Z",
|
||
"pushed_at": "2021-12-12T07:41:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437501121,
|
||
"name": "cve-2021-44228-helpers",
|
||
"full_name": "uint0\/cve-2021-44228-helpers",
|
||
"owner": {
|
||
"login": "uint0",
|
||
"id": 11325389,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4",
|
||
"html_url": "https:\/\/github.com\/uint0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/uint0\/cve-2021-44228-helpers",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-12T09:21:09Z",
|
||
"updated_at": "2021-12-13T00:01:22Z",
|
||
"pushed_at": "2021-12-13T00:01:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437511755,
|
||
"name": "apache-log4j-poc",
|
||
"full_name": "RK800-DEV\/apache-log4j-poc",
|
||
"owner": {
|
||
"login": "RK800-DEV",
|
||
"id": 85429713,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85429713?v=4",
|
||
"html_url": "https:\/\/github.com\/RK800-DEV"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RK800-DEV\/apache-log4j-poc",
|
||
"description": "CVE-2021-44228(Apache Log4j Remote Code Execution)",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T10:17:13Z",
|
||
"updated_at": "2021-12-12T10:17:47Z",
|
||
"pushed_at": "2021-12-12T10:17:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437512798,
|
||
"name": "log4j-CVE-2021-44228",
|
||
"full_name": "sud0x00\/log4j-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "sud0x00",
|
||
"id": 91898207,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91898207?v=4",
|
||
"html_url": "https:\/\/github.com\/sud0x00"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sud0x00\/log4j-CVE-2021-44228",
|
||
"description": "On December 5, 2021, Apache identified a vulnerability (later identified as CVE-2021-44228) in their widely used Log4j logging service. The vulnerability, also known as Log4shell, enables attackers to gain full control of affected servers by allowing unauthenticated remote code execution if the user is running an application utilizing the Java logging library. Log4j is heavily integrated into a broad set of devops frameworks, enterprise IT systems, and vendor software and cloud products.",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T10:22:45Z",
|
||
"updated_at": "2021-12-18T17:52:19Z",
|
||
"pushed_at": "2021-12-12T14:08:08Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437518939,
|
||
"name": "CVE-2021-44228-docker-example",
|
||
"full_name": "DiCanio\/CVE-2021-44228-docker-example",
|
||
"owner": {
|
||
"login": "DiCanio",
|
||
"id": 6052859,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6052859?v=4",
|
||
"html_url": "https:\/\/github.com\/DiCanio"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DiCanio\/CVE-2021-44228-docker-example",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-12T10:53:15Z",
|
||
"updated_at": "2021-12-13T03:58:51Z",
|
||
"pushed_at": "2021-12-13T00:03:51Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437522139,
|
||
"name": "CVE-2021-44228-research",
|
||
"full_name": "mute1997\/CVE-2021-44228-research",
|
||
"owner": {
|
||
"login": "mute1997",
|
||
"id": 4436476,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436476?v=4",
|
||
"html_url": "https:\/\/github.com\/mute1997"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mute1997\/CVE-2021-44228-research",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-12T11:08:54Z",
|
||
"updated_at": "2021-12-16T17:49:50Z",
|
||
"pushed_at": "2021-12-12T11:09:26Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437525008,
|
||
"name": "cve-2021-44228-minecraft-poc",
|
||
"full_name": "myyxl\/cve-2021-44228-minecraft-poc",
|
||
"owner": {
|
||
"login": "myyxl",
|
||
"id": 22593897,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22593897?v=4",
|
||
"html_url": "https:\/\/github.com\/myyxl"
|
||
},
|
||
"html_url": "https:\/\/github.com\/myyxl\/cve-2021-44228-minecraft-poc",
|
||
"description": "Log4J CVE-2021-44228 Minecraft PoC",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T11:22:51Z",
|
||
"updated_at": "2022-01-12T15:05:09Z",
|
||
"pushed_at": "2021-12-12T11:34:50Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4shell",
|
||
"poc"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437525445,
|
||
"name": "Awesome-CVE-2021-44228",
|
||
"full_name": "RrUZi\/Awesome-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "RrUZi",
|
||
"id": 43235635,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43235635?v=4",
|
||
"html_url": "https:\/\/github.com\/RrUZi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RrUZi\/Awesome-CVE-2021-44228",
|
||
"description": "An awesome curated list of repos for CVE-2021-44228. ``Apache Log4j 2``",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T11:25:00Z",
|
||
"updated_at": "2021-12-12T11:35:58Z",
|
||
"pushed_at": "2021-12-12T11:33:43Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j2"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437525803,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "0-x-2-2\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "0-x-2-2",
|
||
"id": 9968651,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9968651?v=4",
|
||
"html_url": "https:\/\/github.com\/0-x-2-2"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0-x-2-2\/CVE-2021-44228",
|
||
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T11:26:42Z",
|
||
"updated_at": "2022-01-09T18:01:12Z",
|
||
"pushed_at": "2021-12-12T17:37:11Z",
|
||
"stargazers_count": 53,
|
||
"watchers_count": 53,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"exploit",
|
||
"jndi",
|
||
"ldap",
|
||
"log4j",
|
||
"minecraft",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 53,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437526168,
|
||
"name": "Log4JShell-Bytecode-Detector",
|
||
"full_name": "CodeShield-Security\/Log4JShell-Bytecode-Detector",
|
||
"owner": {
|
||
"login": "CodeShield-Security",
|
||
"id": 60257643,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60257643?v=4",
|
||
"html_url": "https:\/\/github.com\/CodeShield-Security"
|
||
},
|
||
"html_url": "https:\/\/github.com\/CodeShield-Security\/Log4JShell-Bytecode-Detector",
|
||
"description": "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T11:28:34Z",
|
||
"updated_at": "2022-01-13T17:55:54Z",
|
||
"pushed_at": "2022-01-12T09:53:43Z",
|
||
"stargazers_count": 45,
|
||
"watchers_count": 45,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"bytecode",
|
||
"cve-2021-44228",
|
||
"log4j2",
|
||
"log4jshell",
|
||
"log4shell",
|
||
"scanner",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 45,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437526871,
|
||
"name": "log4j-poc",
|
||
"full_name": "Crane-Mocker\/log4j-poc",
|
||
"owner": {
|
||
"login": "Crane-Mocker",
|
||
"id": 46662246,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46662246?v=4",
|
||
"html_url": "https:\/\/github.com\/Crane-Mocker"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Crane-Mocker\/log4j-poc",
|
||
"description": "Poc of log4j2 (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T11:31:45Z",
|
||
"updated_at": "2021-12-12T12:19:15Z",
|
||
"pushed_at": "2021-12-12T12:19:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437536404,
|
||
"name": "divd-2021-00038--log4j-scanner",
|
||
"full_name": "dtact\/divd-2021-00038--log4j-scanner",
|
||
"owner": {
|
||
"login": "dtact",
|
||
"id": 65305480,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65305480?v=4",
|
||
"html_url": "https:\/\/github.com\/dtact"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dtact\/divd-2021-00038--log4j-scanner",
|
||
"description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T12:16:07Z",
|
||
"updated_at": "2022-01-12T07:38:51Z",
|
||
"pushed_at": "2021-12-28T22:21:52Z",
|
||
"stargazers_count": 49,
|
||
"watchers_count": 49,
|
||
"forks_count": 9,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 9,
|
||
"watchers": 49,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437538957,
|
||
"name": "CVE-2021-44228-log4Shell",
|
||
"full_name": "kali-dass\/CVE-2021-44228-log4Shell",
|
||
"owner": {
|
||
"login": "kali-dass",
|
||
"id": 28717904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28717904?v=4",
|
||
"html_url": "https:\/\/github.com\/kali-dass"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kali-dass\/CVE-2021-44228-log4Shell",
|
||
"description": "Sample log4j shell exploit",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T12:27:39Z",
|
||
"updated_at": "2021-12-13T16:37:25Z",
|
||
"pushed_at": "2021-12-13T16:37:22Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437546559,
|
||
"name": "log4j2-CVE-2021-44228",
|
||
"full_name": "pravin-pp\/log4j2-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "pravin-pp",
|
||
"id": 12995541,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4",
|
||
"html_url": "https:\/\/github.com\/pravin-pp"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-12T13:00:38Z",
|
||
"updated_at": "2021-12-13T04:00:49Z",
|
||
"pushed_at": "2021-12-12T13:25:27Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437550473,
|
||
"name": "Exploitation-of-Log4j2-CVE-2021-44228",
|
||
"full_name": "Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "Malwar3Ninja",
|
||
"id": 34618086,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34618086?v=4",
|
||
"html_url": "https:\/\/github.com\/Malwar3Ninja"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228",
|
||
"description": "IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 ",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T13:17:18Z",
|
||
"updated_at": "2022-01-02T09:57:02Z",
|
||
"pushed_at": "2021-12-19T12:42:02Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437551037,
|
||
"name": "docker-log4shell",
|
||
"full_name": "urholaukkarinen\/docker-log4shell",
|
||
"owner": {
|
||
"login": "urholaukkarinen",
|
||
"id": 5576504,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5576504?v=4",
|
||
"html_url": "https:\/\/github.com\/urholaukkarinen"
|
||
},
|
||
"html_url": "https:\/\/github.com\/urholaukkarinen\/docker-log4shell",
|
||
"description": "Dockerized Go app for testing the CVE-2021-44228 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T13:19:50Z",
|
||
"updated_at": "2021-12-12T13:23:50Z",
|
||
"pushed_at": "2021-12-12T13:21:28Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437553138,
|
||
"name": "scan4log4j",
|
||
"full_name": "ssl\/scan4log4j",
|
||
"owner": {
|
||
"login": "ssl",
|
||
"id": 25695071,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25695071?v=4",
|
||
"html_url": "https:\/\/github.com\/ssl"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ssl\/scan4log4j",
|
||
"description": "Python script that sends CVE-2021-44228 log4j payload requests to url list",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T13:28:31Z",
|
||
"updated_at": "2021-12-20T13:16:16Z",
|
||
"pushed_at": "2021-12-12T13:39:45Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437557116,
|
||
"name": "nginx-mitigate-log4shell",
|
||
"full_name": "infiniroot\/nginx-mitigate-log4shell",
|
||
"owner": {
|
||
"login": "infiniroot",
|
||
"id": 29702565,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29702565?v=4",
|
||
"html_url": "https:\/\/github.com\/infiniroot"
|
||
},
|
||
"html_url": "https:\/\/github.com\/infiniroot\/nginx-mitigate-log4shell",
|
||
"description": "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T13:45:08Z",
|
||
"updated_at": "2021-12-29T16:13:21Z",
|
||
"pushed_at": "2021-12-15T08:14:56Z",
|
||
"stargazers_count": 35,
|
||
"watchers_count": 35,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4shell",
|
||
"lua",
|
||
"mitigation",
|
||
"nginx",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 35,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437560690,
|
||
"name": "log4j-cve-2021-44228",
|
||
"full_name": "lohanichaten\/log4j-cve-2021-44228",
|
||
"owner": {
|
||
"login": "lohanichaten",
|
||
"id": 70852336,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70852336?v=4",
|
||
"html_url": "https:\/\/github.com\/lohanichaten"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lohanichaten\/log4j-cve-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-12T13:59:38Z",
|
||
"updated_at": "2021-12-12T14:03:46Z",
|
||
"pushed_at": "2021-12-12T14:03:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437562080,
|
||
"name": "log4j-log4shell-affected",
|
||
"full_name": "authomize\/log4j-log4shell-affected",
|
||
"owner": {
|
||
"login": "authomize",
|
||
"id": 57180096,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57180096?v=4",
|
||
"html_url": "https:\/\/github.com\/authomize"
|
||
},
|
||
"html_url": "https:\/\/github.com\/authomize\/log4j-log4shell-affected",
|
||
"description": "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability ",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T14:05:05Z",
|
||
"updated_at": "2022-01-05T17:10:37Z",
|
||
"pushed_at": "2021-12-19T07:40:25Z",
|
||
"stargazers_count": 48,
|
||
"watchers_count": 48,
|
||
"forks_count": 9,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4j-rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 9,
|
||
"watchers": 48,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437567489,
|
||
"name": "CVE-2021-44228_IoCs",
|
||
"full_name": "guardicode\/CVE-2021-44228_IoCs",
|
||
"owner": {
|
||
"login": "guardicode",
|
||
"id": 64462782,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64462782?v=4",
|
||
"html_url": "https:\/\/github.com\/guardicode"
|
||
},
|
||
"html_url": "https:\/\/github.com\/guardicode\/CVE-2021-44228_IoCs",
|
||
"description": "Known IoCs for log4j framework vulnerability ",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T14:27:28Z",
|
||
"updated_at": "2022-01-02T08:53:49Z",
|
||
"pushed_at": "2022-01-02T08:53:47Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437574258,
|
||
"name": "log4j-poc",
|
||
"full_name": "fireflyingup\/log4j-poc",
|
||
"owner": {
|
||
"login": "fireflyingup",
|
||
"id": 48504204,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4",
|
||
"html_url": "https:\/\/github.com\/fireflyingup"
|
||
},
|
||
"html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc",
|
||
"description": "CVE-2021-44228 test demo",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T14:54:25Z",
|
||
"updated_at": "2021-12-13T05:10:53Z",
|
||
"pushed_at": "2021-12-13T05:10:50Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437575607,
|
||
"name": "cve-2021-44228-qingteng-patch",
|
||
"full_name": "qingtengyun\/cve-2021-44228-qingteng-patch",
|
||
"owner": {
|
||
"login": "qingtengyun",
|
||
"id": 18526503,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4",
|
||
"html_url": "https:\/\/github.com\/qingtengyun"
|
||
},
|
||
"html_url": "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-patch",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-12T15:00:04Z",
|
||
"updated_at": "2021-12-30T06:02:24Z",
|
||
"pushed_at": "2021-12-12T16:03:21Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437582859,
|
||
"name": "log4j-jndi-be-gone",
|
||
"full_name": "nccgroup\/log4j-jndi-be-gone",
|
||
"owner": {
|
||
"login": "nccgroup",
|
||
"id": 4067082,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4",
|
||
"html_url": "https:\/\/github.com\/nccgroup"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nccgroup\/log4j-jndi-be-gone",
|
||
"description": "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T15:29:20Z",
|
||
"updated_at": "2022-01-11T17:29:36Z",
|
||
"pushed_at": "2022-01-04T02:03:58Z",
|
||
"stargazers_count": 68,
|
||
"watchers_count": 68,
|
||
"forks_count": 12,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 12,
|
||
"watchers": 68,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437583301,
|
||
"name": "cve-2021-44228-qingteng-online-patch",
|
||
"full_name": "qingtengyun\/cve-2021-44228-qingteng-online-patch",
|
||
"owner": {
|
||
"login": "qingtengyun",
|
||
"id": 18526503,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4",
|
||
"html_url": "https:\/\/github.com\/qingtengyun"
|
||
},
|
||
"html_url": "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-online-patch",
|
||
"description": "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T15:30:55Z",
|
||
"updated_at": "2022-01-01T14:41:00Z",
|
||
"pushed_at": "2021-12-18T10:46:45Z",
|
||
"stargazers_count": 25,
|
||
"watchers_count": 25,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"log4j",
|
||
"log4jshell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 25,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437586734,
|
||
"name": "horrors-log4shell",
|
||
"full_name": "tasooshi\/horrors-log4shell",
|
||
"owner": {
|
||
"login": "tasooshi",
|
||
"id": 44586478,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44586478?v=4",
|
||
"html_url": "https:\/\/github.com\/tasooshi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tasooshi\/horrors-log4shell",
|
||
"description": "A micro lab for CVE-2021-44228 (log4j)",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T15:44:49Z",
|
||
"updated_at": "2021-12-29T15:10:45Z",
|
||
"pushed_at": "2021-12-29T15:10:42Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437602257,
|
||
"name": "evil-rmi-server",
|
||
"full_name": "Hydragyrum\/evil-rmi-server",
|
||
"owner": {
|
||
"login": "Hydragyrum",
|
||
"id": 4928181,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
|
||
"html_url": "https:\/\/github.com\/Hydragyrum"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Hydragyrum\/evil-rmi-server",
|
||
"description": "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T16:49:45Z",
|
||
"updated_at": "2022-01-11T11:04:24Z",
|
||
"pushed_at": "2021-12-12T21:48:06Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437603411,
|
||
"name": "Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab",
|
||
"full_name": "twseptian\/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab",
|
||
"owner": {
|
||
"login": "twseptian",
|
||
"id": 9025301,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
|
||
"html_url": "https:\/\/github.com\/twseptian"
|
||
},
|
||
"html_url": "https:\/\/github.com\/twseptian\/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab",
|
||
"description": "Spring Boot Log4j - CVE-2021-44228 Docker Lab ",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T16:54:33Z",
|
||
"updated_at": "2022-01-02T11:19:57Z",
|
||
"pushed_at": "2021-12-17T13:59:44Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 8,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"spring-boot-log4j"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 8,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437630669,
|
||
"name": "log4jcheck",
|
||
"full_name": "OlafHaalstra\/log4jcheck",
|
||
"owner": {
|
||
"login": "OlafHaalstra",
|
||
"id": 6420723,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6420723?v=4",
|
||
"html_url": "https:\/\/github.com\/OlafHaalstra"
|
||
},
|
||
"html_url": "https:\/\/github.com\/OlafHaalstra\/log4jcheck",
|
||
"description": "Check list of URLs against Log4j vulnerability CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T18:57:05Z",
|
||
"updated_at": "2021-12-20T17:32:10Z",
|
||
"pushed_at": "2021-12-20T17:32:06Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437640059,
|
||
"name": "Saturn",
|
||
"full_name": "psychose-club\/Saturn",
|
||
"owner": {
|
||
"login": "psychose-club",
|
||
"id": 91850449,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91850449?v=4",
|
||
"html_url": "https:\/\/github.com\/psychose-club"
|
||
},
|
||
"html_url": "https:\/\/github.com\/psychose-club\/Saturn",
|
||
"description": "A tool to analyze the log files from minecraft to scan potential security risks from the CVE-2021-44228 Log4J library exploit. ",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T19:42:47Z",
|
||
"updated_at": "2021-12-21T08:17:51Z",
|
||
"pushed_at": "2021-12-18T20:40:56Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"exploit",
|
||
"java",
|
||
"log4j",
|
||
"minecraft",
|
||
"scanner"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437649883,
|
||
"name": "Proof-CVE-2021-44228",
|
||
"full_name": "Panyaprach\/Proof-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "Panyaprach",
|
||
"id": 9110880,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9110880?v=4",
|
||
"html_url": "https:\/\/github.com\/Panyaprach"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Panyaprach\/Proof-CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-12T20:31:19Z",
|
||
"updated_at": "2021-12-13T05:13:22Z",
|
||
"pushed_at": "2021-12-13T05:13:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437660117,
|
||
"name": "Log4j-RCE",
|
||
"full_name": "momos1337\/Log4j-RCE",
|
||
"owner": {
|
||
"login": "momos1337",
|
||
"id": 64172550,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64172550?v=4",
|
||
"html_url": "https:\/\/github.com\/momos1337"
|
||
},
|
||
"html_url": "https:\/\/github.com\/momos1337\/Log4j-RCE",
|
||
"description": "Log4j RCE - (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T21:26:44Z",
|
||
"updated_at": "2021-12-23T14:39:40Z",
|
||
"pushed_at": "2021-12-13T00:54:22Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"bughunter",
|
||
"cve-2021-44228",
|
||
"exploit",
|
||
"hacking",
|
||
"log4j",
|
||
"log4j-rce",
|
||
"rce",
|
||
"remote-code-execution"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437660360,
|
||
"name": "cve-2021-44228-log4j-mitigation",
|
||
"full_name": "palominoinc\/cve-2021-44228-log4j-mitigation",
|
||
"owner": {
|
||
"login": "palominoinc",
|
||
"id": 7401270,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7401270?v=4",
|
||
"html_url": "https:\/\/github.com\/palominoinc"
|
||
},
|
||
"html_url": "https:\/\/github.com\/palominoinc\/cve-2021-44228-log4j-mitigation",
|
||
"description": "Mitigate against log4j vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T21:28:09Z",
|
||
"updated_at": "2021-12-16T15:15:07Z",
|
||
"pushed_at": "2021-12-16T15:15:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437663314,
|
||
"name": "log4j-poc",
|
||
"full_name": "cyberxml\/log4j-poc",
|
||
"owner": {
|
||
"login": "cyberxml",
|
||
"id": 10391872,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10391872?v=4",
|
||
"html_url": "https:\/\/github.com\/cyberxml"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cyberxml\/log4j-poc",
|
||
"description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T21:45:33Z",
|
||
"updated_at": "2022-01-11T06:58:59Z",
|
||
"pushed_at": "2021-12-18T01:08:59Z",
|
||
"stargazers_count": 33,
|
||
"watchers_count": 33,
|
||
"forks_count": 11,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"exploit",
|
||
"log4j",
|
||
"log4shell",
|
||
"poc"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 11,
|
||
"watchers": 33,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437664611,
|
||
"name": "Log4J-CVE-2021-44228-RCE",
|
||
"full_name": "corneacristian\/Log4J-CVE-2021-44228-RCE",
|
||
"owner": {
|
||
"login": "corneacristian",
|
||
"id": 59137279,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59137279?v=4",
|
||
"html_url": "https:\/\/github.com\/corneacristian"
|
||
},
|
||
"html_url": "https:\/\/github.com\/corneacristian\/Log4J-CVE-2021-44228-RCE",
|
||
"description": "Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T21:52:53Z",
|
||
"updated_at": "2021-12-22T16:23:31Z",
|
||
"pushed_at": "2021-12-12T22:36:02Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437674455,
|
||
"name": "nse-log4shell",
|
||
"full_name": "Diverto\/nse-log4shell",
|
||
"owner": {
|
||
"login": "Diverto",
|
||
"id": 11384089,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11384089?v=4",
|
||
"html_url": "https:\/\/github.com\/Diverto"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Diverto\/nse-log4shell",
|
||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T22:52:02Z",
|
||
"updated_at": "2022-01-13T11:15:58Z",
|
||
"pushed_at": "2021-12-20T15:34:21Z",
|
||
"stargazers_count": 303,
|
||
"watchers_count": 303,
|
||
"forks_count": 46,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 46,
|
||
"watchers": 303,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437674999,
|
||
"name": "log4py",
|
||
"full_name": "dotPY-hax\/log4py",
|
||
"owner": {
|
||
"login": "dotPY-hax",
|
||
"id": 67259802,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67259802?v=4",
|
||
"html_url": "https:\/\/github.com\/dotPY-hax"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dotPY-hax\/log4py",
|
||
"description": "pythonic pure python RCE exploit for CVE-2021-44228 log4shell",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T22:55:25Z",
|
||
"updated_at": "2021-12-22T18:43:57Z",
|
||
"pushed_at": "2021-12-12T23:49:01Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"exploit",
|
||
"log4j",
|
||
"python",
|
||
"pythonic",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437681598,
|
||
"name": "CVE-2021-44228-PoC",
|
||
"full_name": "sunnyvale-it\/CVE-2021-44228-PoC",
|
||
"owner": {
|
||
"login": "sunnyvale-it",
|
||
"id": 44291039,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
|
||
"html_url": "https:\/\/github.com\/sunnyvale-it"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC",
|
||
"description": "CVE-2021-44228 (Log4Shell) Proof of Concept",
|
||
"fork": false,
|
||
"created_at": "2021-12-12T23:37:39Z",
|
||
"updated_at": "2022-01-07T07:26:51Z",
|
||
"pushed_at": "2021-12-13T21:23:25Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve",
|
||
"cybersecurity",
|
||
"java",
|
||
"log4j",
|
||
"log4j2",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437685288,
|
||
"name": "log4j2-CVE-2021-44228",
|
||
"full_name": "maxant\/log4j2-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "maxant",
|
||
"id": 1108507,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1108507?v=4",
|
||
"html_url": "https:\/\/github.com\/maxant"
|
||
},
|
||
"html_url": "https:\/\/github.com\/maxant\/log4j2-CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-13T00:02:54Z",
|
||
"updated_at": "2021-12-19T19:56:12Z",
|
||
"pushed_at": "2021-12-19T19:56:08Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437687048,
|
||
"name": "fail2ban-log4j",
|
||
"full_name": "atnetws\/fail2ban-log4j",
|
||
"owner": {
|
||
"login": "atnetws",
|
||
"id": 44603839,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44603839?v=4",
|
||
"html_url": "https:\/\/github.com\/atnetws"
|
||
},
|
||
"html_url": "https:\/\/github.com\/atnetws\/fail2ban-log4j",
|
||
"description": "fail2ban filter that catches attacks againts log4j CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T00:14:31Z",
|
||
"updated_at": "2022-01-07T14:15:01Z",
|
||
"pushed_at": "2022-01-06T20:00:17Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437687082,
|
||
"name": "cve-2021-44228",
|
||
"full_name": "kimobu\/cve-2021-44228",
|
||
"owner": {
|
||
"login": "kimobu",
|
||
"id": 18669130,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18669130?v=4",
|
||
"html_url": "https:\/\/github.com\/kimobu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kimobu\/cve-2021-44228",
|
||
"description": "Some files for red team\/blue team investigations into CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T00:14:45Z",
|
||
"updated_at": "2021-12-14T19:46:05Z",
|
||
"pushed_at": "2021-12-14T19:46:02Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437688500,
|
||
"name": "anti-jndi",
|
||
"full_name": "KainsRache\/anti-jndi",
|
||
"owner": {
|
||
"login": "KainsRache",
|
||
"id": 1352675,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1352675?v=4",
|
||
"html_url": "https:\/\/github.com\/KainsRache"
|
||
},
|
||
"html_url": "https:\/\/github.com\/KainsRache\/anti-jndi",
|
||
"description": "Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers.",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T00:23:20Z",
|
||
"updated_at": "2021-12-13T22:21:20Z",
|
||
"pushed_at": "2021-12-13T22:21:17Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437692169,
|
||
"name": "log4j-win-quick",
|
||
"full_name": "lwsnz\/log4j-win-quick",
|
||
"owner": {
|
||
"login": "lwsnz",
|
||
"id": 24641464,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24641464?v=4",
|
||
"html_url": "https:\/\/github.com\/lwsnz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lwsnz\/log4j-win-quick",
|
||
"description": "CVE-2021-44228. Quick find and mitigate action for Windows OS.",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T00:45:48Z",
|
||
"updated_at": "2021-12-13T00:52:01Z",
|
||
"pushed_at": "2021-12-13T00:49:35Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437704633,
|
||
"name": "Log4j-check",
|
||
"full_name": "bigsizeme\/Log4j-check",
|
||
"owner": {
|
||
"login": "bigsizeme",
|
||
"id": 17845094,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4",
|
||
"html_url": "https:\/\/github.com\/bigsizeme"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check",
|
||
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T01:55:51Z",
|
||
"updated_at": "2022-01-13T11:58:39Z",
|
||
"pushed_at": "2021-12-13T09:18:19Z",
|
||
"stargazers_count": 31,
|
||
"watchers_count": 31,
|
||
"forks_count": 15,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 15,
|
||
"watchers": 31,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437709337,
|
||
"name": "exploit-CVE-2021-44228",
|
||
"full_name": "pedrohavay\/exploit-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "pedrohavay",
|
||
"id": 18234370,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4",
|
||
"html_url": "https:\/\/github.com\/pedrohavay"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pedrohavay\/exploit-CVE-2021-44228",
|
||
"description": "This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T02:18:57Z",
|
||
"updated_at": "2021-12-24T01:06:06Z",
|
||
"pushed_at": "2021-12-13T16:35:58Z",
|
||
"stargazers_count": 14,
|
||
"watchers_count": 14,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 14,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437721429,
|
||
"name": "log4j-nullroute",
|
||
"full_name": "0xRyan\/log4j-nullroute",
|
||
"owner": {
|
||
"login": "0xRyan",
|
||
"id": 87556614,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87556614?v=4",
|
||
"html_url": "https:\/\/github.com\/0xRyan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xRyan\/log4j-nullroute",
|
||
"description": "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T03:15:42Z",
|
||
"updated_at": "2021-12-14T23:03:06Z",
|
||
"pushed_at": "2021-12-14T23:03:03Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437729534,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "fireeye\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "fireeye",
|
||
"id": 4984788,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4984788?v=4",
|
||
"html_url": "https:\/\/github.com\/fireeye"
|
||
},
|
||
"html_url": "https:\/\/github.com\/fireeye\/CVE-2021-44228",
|
||
"description": "OpenIOC rules to facilitate hunting for indicators of compromise",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T03:55:32Z",
|
||
"updated_at": "2022-01-07T14:25:32Z",
|
||
"pushed_at": "2022-01-07T14:25:33Z",
|
||
"stargazers_count": 39,
|
||
"watchers_count": 39,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 39,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437729997,
|
||
"name": "log4j-scan",
|
||
"full_name": "fullhunt\/log4j-scan",
|
||
"owner": {
|
||
"login": "fullhunt",
|
||
"id": 34830403,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34830403?v=4",
|
||
"html_url": "https:\/\/github.com\/fullhunt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/fullhunt\/log4j-scan",
|
||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T03:57:50Z",
|
||
"updated_at": "2022-01-13T17:56:58Z",
|
||
"pushed_at": "2022-01-02T20:21:42Z",
|
||
"stargazers_count": 2596,
|
||
"watchers_count": 2596,
|
||
"forks_count": 618,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 618,
|
||
"watchers": 2596,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437733080,
|
||
"name": "log4j_checker_beta",
|
||
"full_name": "rubo77\/log4j_checker_beta",
|
||
"owner": {
|
||
"login": "rubo77",
|
||
"id": 1591563,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1591563?v=4",
|
||
"html_url": "https:\/\/github.com\/rubo77"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rubo77\/log4j_checker_beta",
|
||
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T04:14:18Z",
|
||
"updated_at": "2022-01-12T15:06:26Z",
|
||
"pushed_at": "2022-01-12T04:13:29Z",
|
||
"stargazers_count": 253,
|
||
"watchers_count": 253,
|
||
"forks_count": 89,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 89,
|
||
"watchers": 253,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437766799,
|
||
"name": "Log4j-RCE-Exploiter",
|
||
"full_name": "thecyberneh\/Log4j-RCE-Exploiter",
|
||
"owner": {
|
||
"login": "thecyberneh",
|
||
"id": 75005384,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75005384?v=4",
|
||
"html_url": "https:\/\/github.com\/thecyberneh"
|
||
},
|
||
"html_url": "https:\/\/github.com\/thecyberneh\/Log4j-RCE-Exploiter",
|
||
"description": "Scanner for Log4j RCE CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T06:53:01Z",
|
||
"updated_at": "2021-12-16T15:11:24Z",
|
||
"pushed_at": "2021-12-13T13:39:01Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437769581,
|
||
"name": "log4j2",
|
||
"full_name": "halibobor\/log4j2",
|
||
"owner": {
|
||
"login": "halibobor",
|
||
"id": 96046545,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96046545?v=4",
|
||
"html_url": "https:\/\/github.com\/halibobor"
|
||
},
|
||
"html_url": "https:\/\/github.com\/halibobor\/log4j2",
|
||
"description": "CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T07:03:50Z",
|
||
"updated_at": "2021-12-13T09:39:44Z",
|
||
"pushed_at": "2021-12-13T09:30:28Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"jmi",
|
||
"log4j2"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437771197,
|
||
"name": "log4j-cve-code-search-resources",
|
||
"full_name": "sourcegraph\/log4j-cve-code-search-resources",
|
||
"owner": {
|
||
"login": "sourcegraph",
|
||
"id": 3979584,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3979584?v=4",
|
||
"html_url": "https:\/\/github.com\/sourcegraph"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sourcegraph\/log4j-cve-code-search-resources",
|
||
"description": "Using code search to help fix\/mitigate log4j CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T07:10:11Z",
|
||
"updated_at": "2022-01-04T11:51:32Z",
|
||
"pushed_at": "2022-01-04T11:51:29Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437774679,
|
||
"name": "Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832",
|
||
"full_name": "thedevappsecguy\/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832",
|
||
"owner": {
|
||
"login": "thedevappsecguy",
|
||
"id": 27088213,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27088213?v=4",
|
||
"html_url": "https:\/\/github.com\/thedevappsecguy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/thedevappsecguy\/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832",
|
||
"description": "Log4J CVE-2021-44228 : Mitigation Cheat Sheet",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T07:24:02Z",
|
||
"updated_at": "2022-01-03T17:43:25Z",
|
||
"pushed_at": "2022-01-03T17:43:06Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437781188,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "helsecert\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "helsecert",
|
||
"id": 2202200,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4",
|
||
"html_url": "https:\/\/github.com\/helsecert"
|
||
},
|
||
"html_url": "https:\/\/github.com\/helsecert\/CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-13T07:48:49Z",
|
||
"updated_at": "2021-12-19T23:28:13Z",
|
||
"pushed_at": "2022-01-04T08:15:11Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437784907,
|
||
"name": "aws-log4j-mitigations",
|
||
"full_name": "markuman\/aws-log4j-mitigations",
|
||
"owner": {
|
||
"login": "markuman",
|
||
"id": 3920157,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4",
|
||
"html_url": "https:\/\/github.com\/markuman"
|
||
},
|
||
"html_url": "https:\/\/github.com\/markuman\/aws-log4j-mitigations",
|
||
"description": "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T08:01:55Z",
|
||
"updated_at": "2021-12-13T08:05:42Z",
|
||
"pushed_at": "2021-12-13T08:03:50Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"ansible",
|
||
"aws",
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"mitigation",
|
||
"waf"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437788180,
|
||
"name": "Log4shell",
|
||
"full_name": "tuyenee\/Log4shell",
|
||
"owner": {
|
||
"login": "tuyenee",
|
||
"id": 29719729,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29719729?v=4",
|
||
"html_url": "https:\/\/github.com\/tuyenee"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tuyenee\/Log4shell",
|
||
"description": "A lab for playing around with the Log4J CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T08:13:07Z",
|
||
"updated_at": "2021-12-13T22:42:03Z",
|
||
"pushed_at": "2021-12-13T09:26:24Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437795998,
|
||
"name": "Log4j-CVE-2021-44228",
|
||
"full_name": "JiuBanSec\/Log4j-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "JiuBanSec",
|
||
"id": 57030243,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4",
|
||
"html_url": "https:\/\/github.com\/JiuBanSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/JiuBanSec\/Log4j-CVE-2021-44228",
|
||
"description": "Log4j Remote Code Injection (Apache Log4j 2.x < 2.15.0-rc2)",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T08:40:13Z",
|
||
"updated_at": "2021-12-13T10:29:05Z",
|
||
"pushed_at": "2021-12-13T12:01:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437797086,
|
||
"name": "Log4Shell-CVE-2021-44228-ENV",
|
||
"full_name": "ycdxsb\/Log4Shell-CVE-2021-44228-ENV",
|
||
"owner": {
|
||
"login": "ycdxsb",
|
||
"id": 32149596,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4",
|
||
"html_url": "https:\/\/github.com\/ycdxsb"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ycdxsb\/Log4Shell-CVE-2021-44228-ENV",
|
||
"description": "Log4Shell Docker Env",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T08:43:45Z",
|
||
"updated_at": "2021-12-19T14:37:26Z",
|
||
"pushed_at": "2021-12-14T02:54:48Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437797971,
|
||
"name": "Sitecore.Solr-log4j-mitigation",
|
||
"full_name": "avwolferen\/Sitecore.Solr-log4j-mitigation",
|
||
"owner": {
|
||
"login": "avwolferen",
|
||
"id": 11447968,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11447968?v=4",
|
||
"html_url": "https:\/\/github.com\/avwolferen"
|
||
},
|
||
"html_url": "https:\/\/github.com\/avwolferen\/Sitecore.Solr-log4j-mitigation",
|
||
"description": "This repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T08:46:41Z",
|
||
"updated_at": "2022-01-05T17:02:45Z",
|
||
"pushed_at": "2022-01-05T17:02:42Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437799663,
|
||
"name": "log4j-scanner-CVE-2021-44228",
|
||
"full_name": "kek-Sec\/log4j-scanner-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "kek-Sec",
|
||
"id": 28791067,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28791067?v=4",
|
||
"html_url": "https:\/\/github.com\/kek-Sec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kek-Sec\/log4j-scanner-CVE-2021-44228",
|
||
"description": "Simple tool for scanning entire directories for attempts of CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T08:51:56Z",
|
||
"updated_at": "2021-12-16T15:11:35Z",
|
||
"pushed_at": "2021-12-14T07:57:25Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437816961,
|
||
"name": "log4shell-spring-framework-research",
|
||
"full_name": "Camphul\/log4shell-spring-framework-research",
|
||
"owner": {
|
||
"login": "Camphul",
|
||
"id": 23475815,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23475815?v=4",
|
||
"html_url": "https:\/\/github.com\/Camphul"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Camphul\/log4shell-spring-framework-research",
|
||
"description": "Research into the implications of CVE-2021-44228 in Spring based applications.",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T09:48:04Z",
|
||
"updated_at": "2021-12-15T10:33:35Z",
|
||
"pushed_at": "2021-12-15T10:33:32Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437820134,
|
||
"name": "cve-2021-44228-log4j-exploits",
|
||
"full_name": "lov3r\/cve-2021-44228-log4j-exploits",
|
||
"owner": {
|
||
"login": "lov3r",
|
||
"id": 33676682,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33676682?v=4",
|
||
"html_url": "https:\/\/github.com\/lov3r"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lov3r\/cve-2021-44228-log4j-exploits",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-13T09:58:11Z",
|
||
"updated_at": "2021-12-13T10:22:19Z",
|
||
"pushed_at": "2021-12-13T10:22:16Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437838249,
|
||
"name": "log4jScan",
|
||
"full_name": "sinakeshmiri\/log4jScan",
|
||
"owner": {
|
||
"login": "sinakeshmiri",
|
||
"id": 72389059,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72389059?v=4",
|
||
"html_url": "https:\/\/github.com\/sinakeshmiri"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sinakeshmiri\/log4jScan",
|
||
"description": "simple python scanner to check if your network is vulnerable to CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T10:59:50Z",
|
||
"updated_at": "2021-12-16T15:08:45Z",
|
||
"pushed_at": "2021-12-13T12:16:03Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437840280,
|
||
"name": "Log4J-Scanner",
|
||
"full_name": "0xDexter0us\/Log4J-Scanner",
|
||
"owner": {
|
||
"login": "0xDexter0us",
|
||
"id": 76158271,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76158271?v=4",
|
||
"html_url": "https:\/\/github.com\/0xDexter0us"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xDexter0us\/Log4J-Scanner",
|
||
"description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T11:06:46Z",
|
||
"updated_at": "2022-01-07T19:36:40Z",
|
||
"pushed_at": "2021-12-26T09:58:06Z",
|
||
"stargazers_count": 69,
|
||
"watchers_count": 69,
|
||
"forks_count": 17,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 17,
|
||
"watchers": 69,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437847140,
|
||
"name": "Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228",
|
||
"full_name": "LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228",
|
||
"owner": {
|
||
"login": "LutziGoz",
|
||
"id": 45577616,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45577616?v=4",
|
||
"html_url": "https:\/\/github.com\/LutziGoz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-13T11:29:57Z",
|
||
"updated_at": "2022-01-08T00:28:45Z",
|
||
"pushed_at": "2022-01-08T00:27:33Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437864729,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "ahmad4fifz\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "ahmad4fifz",
|
||
"id": 45918058,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45918058?v=4",
|
||
"html_url": "https:\/\/github.com\/ahmad4fifz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ahmad4fifz\/CVE-2021-44228",
|
||
"description": "CVE-2021-44228 on Docker & Podman",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T12:30:11Z",
|
||
"updated_at": "2022-01-05T08:46:03Z",
|
||
"pushed_at": "2022-01-05T08:46:01Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2021-44228",
|
||
"docker",
|
||
"docker-compose",
|
||
"log4j2",
|
||
"podman"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437866496,
|
||
"name": "log4j-rce-test",
|
||
"full_name": "jeffli1024\/log4j-rce-test",
|
||
"owner": {
|
||
"login": "jeffli1024",
|
||
"id": 33046602,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046602?v=4",
|
||
"html_url": "https:\/\/github.com\/jeffli1024"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jeffli1024\/log4j-rce-test",
|
||
"description": "CVE-2021-44228 - Apache log4j RCE quick test",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T12:35:39Z",
|
||
"updated_at": "2021-12-14T09:39:07Z",
|
||
"pushed_at": "2021-12-13T21:53:39Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437876264,
|
||
"name": "Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service",
|
||
"full_name": "zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service",
|
||
"owner": {
|
||
"login": "zsolt-halo",
|
||
"id": 2437516,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2437516?v=4",
|
||
"html_url": "https:\/\/github.com\/zsolt-halo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-13T13:05:26Z",
|
||
"updated_at": "2021-12-15T10:01:39Z",
|
||
"pushed_at": "2021-12-13T13:26:11Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 12,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437877109,
|
||
"name": "log4j-cve-2021-44228",
|
||
"full_name": "manuel-alvarez-alvarez\/log4j-cve-2021-44228",
|
||
"owner": {
|
||
"login": "manuel-alvarez-alvarez",
|
||
"id": 4885539,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4885539?v=4",
|
||
"html_url": "https:\/\/github.com\/manuel-alvarez-alvarez"
|
||
},
|
||
"html_url": "https:\/\/github.com\/manuel-alvarez-alvarez\/log4j-cve-2021-44228",
|
||
"description": "Log4j CVE-2021-44228 examples: Remote Code Execution (through LDAP, RMI, ...), Forced DNS queries, ...",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T13:08:03Z",
|
||
"updated_at": "2021-12-24T13:02:50Z",
|
||
"pushed_at": "2021-12-21T11:12:40Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437882599,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "VNYui\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "VNYui",
|
||
"id": 14999242,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14999242?v=4",
|
||
"html_url": "https:\/\/github.com\/VNYui"
|
||
},
|
||
"html_url": "https:\/\/github.com\/VNYui\/CVE-2021-44228",
|
||
"description": "Mass recognition tool for CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T13:25:19Z",
|
||
"updated_at": "2021-12-13T13:37:39Z",
|
||
"pushed_at": "2021-12-13T13:37:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437883625,
|
||
"name": "Scan-CVE-2021-44228",
|
||
"full_name": "flxhaas\/Scan-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "flxhaas",
|
||
"id": 5561099,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5561099?v=4",
|
||
"html_url": "https:\/\/github.com\/flxhaas"
|
||
},
|
||
"html_url": "https:\/\/github.com\/flxhaas\/Scan-CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-13T13:28:26Z",
|
||
"updated_at": "2021-12-13T13:28:26Z",
|
||
"pushed_at": "2021-12-13T13:28:27Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437884471,
|
||
"name": "Log4j-CVE-2021-44228",
|
||
"full_name": "justakazh\/Log4j-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "justakazh",
|
||
"id": 36891477,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
|
||
"html_url": "https:\/\/github.com\/justakazh"
|
||
},
|
||
"html_url": "https:\/\/github.com\/justakazh\/Log4j-CVE-2021-44228",
|
||
"description": "Mass Check Vulnerable Log4j CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T13:30:57Z",
|
||
"updated_at": "2021-12-15T14:06:59Z",
|
||
"pushed_at": "2021-12-13T14:17:59Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437888133,
|
||
"name": "f5-waf-quick-patch-cve-2021-44228",
|
||
"full_name": "irgoncalves\/f5-waf-quick-patch-cve-2021-44228",
|
||
"owner": {
|
||
"login": "irgoncalves",
|
||
"id": 23459099,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4",
|
||
"html_url": "https:\/\/github.com\/irgoncalves"
|
||
},
|
||
"html_url": "https:\/\/github.com\/irgoncalves\/f5-waf-quick-patch-cve-2021-44228",
|
||
"description": "This tool creates a custom signature set on F5 WAF and apply to policies in blocking mode",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T13:41:39Z",
|
||
"updated_at": "2021-12-15T08:28:28Z",
|
||
"pushed_at": "2021-12-13T22:42:51Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437902732,
|
||
"name": "JndiLookup",
|
||
"full_name": "madCdan\/JndiLookup",
|
||
"owner": {
|
||
"login": "madCdan",
|
||
"id": 10784600,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10784600?v=4",
|
||
"html_url": "https:\/\/github.com\/madCdan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/madCdan\/JndiLookup",
|
||
"description": "Some tools to help mitigating Apache Log4j 2 CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T14:22:34Z",
|
||
"updated_at": "2021-12-18T02:12:49Z",
|
||
"pushed_at": "2021-12-13T17:07:42Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437904012,
|
||
"name": "MC-Log4j-Patcher",
|
||
"full_name": "Koupah\/MC-Log4j-Patcher",
|
||
"owner": {
|
||
"login": "Koupah",
|
||
"id": 25888315,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25888315?v=4",
|
||
"html_url": "https:\/\/github.com\/Koupah"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Koupah\/MC-Log4j-Patcher",
|
||
"description": "A singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228).",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T14:26:24Z",
|
||
"updated_at": "2022-01-04T03:00:29Z",
|
||
"pushed_at": "2021-12-13T22:44:37Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437917354,
|
||
"name": "Fix-CVE-2021-44228",
|
||
"full_name": "AlexandreHeroux\/Fix-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "AlexandreHeroux",
|
||
"id": 28022186,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28022186?v=4",
|
||
"html_url": "https:\/\/github.com\/AlexandreHeroux"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AlexandreHeroux\/Fix-CVE-2021-44228",
|
||
"description": "Apply class remove process from ear\/war\/jar\/zip archive, see https:\/\/logging.apache.org\/log4j\/2.x\/",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T15:04:31Z",
|
||
"updated_at": "2021-12-15T16:13:04Z",
|
||
"pushed_at": "2021-12-15T02:02:51Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437919806,
|
||
"name": "log4j-CVE-2021-44228-test",
|
||
"full_name": "kossatzd\/log4j-CVE-2021-44228-test",
|
||
"owner": {
|
||
"login": "kossatzd",
|
||
"id": 3578287,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3578287?v=4",
|
||
"html_url": "https:\/\/github.com\/kossatzd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kossatzd\/log4j-CVE-2021-44228-test",
|
||
"description": "demo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T15:11:15Z",
|
||
"updated_at": "2021-12-24T22:09:51Z",
|
||
"pushed_at": "2021-12-24T22:09:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437937629,
|
||
"name": "log4j-CVE-2021-44228",
|
||
"full_name": "tobiasoed\/log4j-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "tobiasoed",
|
||
"id": 12912943,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12912943?v=4",
|
||
"html_url": "https:\/\/github.com\/tobiasoed"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tobiasoed\/log4j-CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-13T16:04:54Z",
|
||
"updated_at": "2021-12-21T02:30:06Z",
|
||
"pushed_at": "2022-01-12T02:30:03Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437948564,
|
||
"name": "log4shell_ioc_ips",
|
||
"full_name": "hackinghippo\/log4shell_ioc_ips",
|
||
"owner": {
|
||
"login": "hackinghippo",
|
||
"id": 96073490,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96073490?v=4",
|
||
"html_url": "https:\/\/github.com\/hackinghippo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hackinghippo\/log4shell_ioc_ips",
|
||
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T16:39:16Z",
|
||
"updated_at": "2022-01-12T01:14:41Z",
|
||
"pushed_at": "2022-01-07T17:00:38Z",
|
||
"stargazers_count": 31,
|
||
"watchers_count": 31,
|
||
"forks_count": 10,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2021-44228",
|
||
"ioc",
|
||
"list",
|
||
"log4j",
|
||
"log4shell",
|
||
"shell4log"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 10,
|
||
"watchers": 31,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437948858,
|
||
"name": "log4j-1.2.15-mod",
|
||
"full_name": "p3dr16k\/log4j-1.2.15-mod",
|
||
"owner": {
|
||
"login": "p3dr16k",
|
||
"id": 9317261,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9317261?v=4",
|
||
"html_url": "https:\/\/github.com\/p3dr16k"
|
||
},
|
||
"html_url": "https:\/\/github.com\/p3dr16k\/log4j-1.2.15-mod",
|
||
"description": "log4j version 1 with a patch for CVE-2021-44228 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T16:40:14Z",
|
||
"updated_at": "2021-12-14T11:41:29Z",
|
||
"pushed_at": "2021-12-14T11:39:43Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437949273,
|
||
"name": "ansible-role-log4shell",
|
||
"full_name": "claranet\/ansible-role-log4shell",
|
||
"owner": {
|
||
"login": "claranet",
|
||
"id": 7526691,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7526691?v=4",
|
||
"html_url": "https:\/\/github.com\/claranet"
|
||
},
|
||
"html_url": "https:\/\/github.com\/claranet\/ansible-role-log4shell",
|
||
"description": "Find Log4Shell CVE-2021-44228 on your system",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T16:41:31Z",
|
||
"updated_at": "2022-01-07T13:20:04Z",
|
||
"pushed_at": "2021-12-17T09:53:52Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"ansible",
|
||
"claranet",
|
||
"log4j",
|
||
"log4shell",
|
||
"role"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 11,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437960695,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "taurusxin\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "taurusxin",
|
||
"id": 17809960,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17809960?v=4",
|
||
"html_url": "https:\/\/github.com\/taurusxin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/taurusxin\/CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-13T17:17:37Z",
|
||
"updated_at": "2021-12-13T17:22:22Z",
|
||
"pushed_at": "2021-12-13T17:22:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437963154,
|
||
"name": "cve-2021-44228",
|
||
"full_name": "corelight\/cve-2021-44228",
|
||
"owner": {
|
||
"login": "corelight",
|
||
"id": 21672558,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||
"html_url": "https:\/\/github.com\/corelight"
|
||
},
|
||
"html_url": "https:\/\/github.com\/corelight\/cve-2021-44228",
|
||
"description": "Log4j Exploit Detection Logic for Zeek",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T17:25:52Z",
|
||
"updated_at": "2022-01-12T19:37:15Z",
|
||
"pushed_at": "2022-01-12T15:39:51Z",
|
||
"stargazers_count": 18,
|
||
"watchers_count": 18,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"zeek"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 18,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437965181,
|
||
"name": "log4j2-prosecutor",
|
||
"full_name": "trevalkov\/log4j2-prosecutor",
|
||
"owner": {
|
||
"login": "trevalkov",
|
||
"id": 52704508,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52704508?v=4",
|
||
"html_url": "https:\/\/github.com\/trevalkov"
|
||
},
|
||
"html_url": "https:\/\/github.com\/trevalkov\/log4j2-prosecutor",
|
||
"description": "CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T17:32:26Z",
|
||
"updated_at": "2021-12-23T10:05:33Z",
|
||
"pushed_at": "2021-12-23T10:05:30Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437968616,
|
||
"name": "CVE-2021-44228_Log4Shell",
|
||
"full_name": "yanghaoi\/CVE-2021-44228_Log4Shell",
|
||
"owner": {
|
||
"login": "yanghaoi",
|
||
"id": 21354684,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4",
|
||
"html_url": "https:\/\/github.com\/yanghaoi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell",
|
||
"description": "Log4Shell A test for CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T17:44:01Z",
|
||
"updated_at": "2021-12-13T18:03:51Z",
|
||
"pushed_at": "2021-12-13T18:06:53Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437983994,
|
||
"name": "log4j_checker",
|
||
"full_name": "lfama\/log4j_checker",
|
||
"owner": {
|
||
"login": "lfama",
|
||
"id": 14056990,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14056990?v=4",
|
||
"html_url": "https:\/\/github.com\/lfama"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lfama\/log4j_checker",
|
||
"description": "Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T18:35:16Z",
|
||
"updated_at": "2021-12-21T16:01:10Z",
|
||
"pushed_at": "2021-12-21T16:01:08Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4shell",
|
||
"python",
|
||
"python3",
|
||
"scan",
|
||
"scanner",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437988861,
|
||
"name": "Log4j-IOCs",
|
||
"full_name": "threatmonit\/Log4j-IOCs",
|
||
"owner": {
|
||
"login": "threatmonit",
|
||
"id": 90388073,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4",
|
||
"html_url": "https:\/\/github.com\/threatmonit"
|
||
},
|
||
"html_url": "https:\/\/github.com\/threatmonit\/Log4j-IOCs",
|
||
"description": "Public IOCs about log4j CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T18:52:19Z",
|
||
"updated_at": "2021-12-14T21:29:51Z",
|
||
"pushed_at": "2021-12-13T19:11:30Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437995131,
|
||
"name": "l4j-info",
|
||
"full_name": "ben-smash\/l4j-info",
|
||
"owner": {
|
||
"login": "ben-smash",
|
||
"id": 95368649,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4",
|
||
"html_url": "https:\/\/github.com\/ben-smash"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ben-smash\/l4j-info",
|
||
"description": "Compiling links of value i find regarding CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T19:14:23Z",
|
||
"updated_at": "2021-12-13T21:11:09Z",
|
||
"pushed_at": "2021-12-13T21:11:06Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438003225,
|
||
"name": "log4j-test",
|
||
"full_name": "strawhatasif\/log4j-test",
|
||
"owner": {
|
||
"login": "strawhatasif",
|
||
"id": 10750101,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4",
|
||
"html_url": "https:\/\/github.com\/strawhatasif"
|
||
},
|
||
"html_url": "https:\/\/github.com\/strawhatasif\/log4j-test",
|
||
"description": "Demonstration of CVE-2021-44228 with a possible strategic fix.",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T19:43:01Z",
|
||
"updated_at": "2021-12-13T20:26:40Z",
|
||
"pushed_at": "2021-12-13T20:26:37Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438012376,
|
||
"name": "nmap-log4shell",
|
||
"full_name": "giterlizzi\/nmap-log4shell",
|
||
"owner": {
|
||
"login": "giterlizzi",
|
||
"id": 1824717,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1824717?v=4",
|
||
"html_url": "https:\/\/github.com\/giterlizzi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/giterlizzi\/nmap-log4shell",
|
||
"description": "Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T20:17:14Z",
|
||
"updated_at": "2022-01-12T20:03:53Z",
|
||
"pushed_at": "2021-12-17T17:23:57Z",
|
||
"stargazers_count": 26,
|
||
"watchers_count": 26,
|
||
"forks_count": 8,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4shell",
|
||
"nmap",
|
||
"nmap-scripts",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 8,
|
||
"watchers": 26,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438013062,
|
||
"name": "Siem-queries-for-CVE-2021-44228",
|
||
"full_name": "tica506\/Siem-queries-for-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "tica506",
|
||
"id": 93236626,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4",
|
||
"html_url": "https:\/\/github.com\/tica506"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-13T20:19:57Z",
|
||
"updated_at": "2021-12-13T20:56:54Z",
|
||
"pushed_at": "2021-12-13T20:56:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438021782,
|
||
"name": "log4shell-example",
|
||
"full_name": "chilit-nl\/log4shell-example",
|
||
"owner": {
|
||
"login": "chilit-nl",
|
||
"id": 96049152,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96049152?v=4",
|
||
"html_url": "https:\/\/github.com\/chilit-nl"
|
||
},
|
||
"html_url": "https:\/\/github.com\/chilit-nl\/log4shell-example",
|
||
"description": "The goal of this project is to demonstrate the log4j cve-2021-44228 exploit vulnerability in a spring-boot setup, and to show how to fix it.",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T20:54:10Z",
|
||
"updated_at": "2021-12-14T08:30:57Z",
|
||
"pushed_at": "2021-12-14T08:18:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4j2",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438026042,
|
||
"name": "log4j-checker",
|
||
"full_name": "Occamsec\/log4j-checker",
|
||
"owner": {
|
||
"login": "Occamsec",
|
||
"id": 55592824,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55592824?v=4",
|
||
"html_url": "https:\/\/github.com\/Occamsec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Occamsec\/log4j-checker",
|
||
"description": "Bash and PowerShell scripts to scan a local filesystem for Log4j .jar files which could be vulnerable to CVE-2021-44228 aka Log4Shell.",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T21:11:18Z",
|
||
"updated_at": "2021-12-21T15:16:18Z",
|
||
"pushed_at": "2021-12-16T17:44:06Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"log4j",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438028657,
|
||
"name": "log4j2-CVE-2021-44228-poc-local",
|
||
"full_name": "snatalius\/log4j2-CVE-2021-44228-poc-local",
|
||
"owner": {
|
||
"login": "snatalius",
|
||
"id": 22771118,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4",
|
||
"html_url": "https:\/\/github.com\/snatalius"
|
||
},
|
||
"html_url": "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local",
|
||
"description": "Just a personal proof of concept of CVE-2021-44228 on log4j2",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T21:21:53Z",
|
||
"updated_at": "2021-12-13T21:21:56Z",
|
||
"pushed_at": "2021-12-13T21:21:53Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438032780,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "Contrast-Security-OSS\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "Contrast-Security-OSS",
|
||
"id": 5577345,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5577345?v=4",
|
||
"html_url": "https:\/\/github.com\/Contrast-Security-OSS"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Contrast-Security-OSS\/CVE-2021-44228",
|
||
"description": "Professional Service scripts to aid in the identification of affected Java applications in TeamServer",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T21:39:39Z",
|
||
"updated_at": "2021-12-14T01:40:19Z",
|
||
"pushed_at": "2021-12-22T13:15:12Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438032826,
|
||
"name": "log4shell-rex",
|
||
"full_name": "back2root\/log4shell-rex",
|
||
"owner": {
|
||
"login": "back2root",
|
||
"id": 9200239,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9200239?v=4",
|
||
"html_url": "https:\/\/github.com\/back2root"
|
||
},
|
||
"html_url": "https:\/\/github.com\/back2root\/log4shell-rex",
|
||
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T21:39:51Z",
|
||
"updated_at": "2022-01-12T01:14:46Z",
|
||
"pushed_at": "2021-12-21T01:24:46Z",
|
||
"stargazers_count": 277,
|
||
"watchers_count": 277,
|
||
"forks_count": 31,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 31,
|
||
"watchers": 277,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438034703,
|
||
"name": "log4shell-tools",
|
||
"full_name": "alexbakker\/log4shell-tools",
|
||
"owner": {
|
||
"login": "alexbakker",
|
||
"id": 2387841,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4",
|
||
"html_url": "https:\/\/github.com\/alexbakker"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alexbakker\/log4shell-tools",
|
||
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T21:47:41Z",
|
||
"updated_at": "2022-01-12T12:54:54Z",
|
||
"pushed_at": "2022-01-02T16:34:49Z",
|
||
"stargazers_count": 49,
|
||
"watchers_count": 49,
|
||
"forks_count": 11,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"dns",
|
||
"jndi",
|
||
"ldap",
|
||
"log4j",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 11,
|
||
"watchers": 49,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438037117,
|
||
"name": "detecting-cve-2021-44228",
|
||
"full_name": "benarculus\/detecting-cve-2021-44228",
|
||
"owner": {
|
||
"login": "benarculus",
|
||
"id": 39167894,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39167894?v=4",
|
||
"html_url": "https:\/\/github.com\/benarculus"
|
||
},
|
||
"html_url": "https:\/\/github.com\/benarculus\/detecting-cve-2021-44228",
|
||
"description": "Looking for ways to use the GitHub stack to help organizations understand if their code is vulnerable to Log4Shell, CVE-2021–44228 or CVE-2021-45046, in Log4j. ",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T21:57:58Z",
|
||
"updated_at": "2021-12-17T14:19:20Z",
|
||
"pushed_at": "2021-12-17T14:19:17Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438043313,
|
||
"name": "find-log4j",
|
||
"full_name": "perryflynn\/find-log4j",
|
||
"owner": {
|
||
"login": "perryflynn",
|
||
"id": 1693988,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1693988?v=4",
|
||
"html_url": "https:\/\/github.com\/perryflynn"
|
||
},
|
||
"html_url": "https:\/\/github.com\/perryflynn\/find-log4j",
|
||
"description": "Find log4j for CVE-2021-44228 on some places * Log4Shell",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T22:26:04Z",
|
||
"updated_at": "2021-12-21T07:48:29Z",
|
||
"pushed_at": "2021-12-14T21:11:59Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4j2",
|
||
"log4jshell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438090697,
|
||
"name": "log4j-cve-2021-44228-sample",
|
||
"full_name": "alpacamybags118\/log4j-cve-2021-44228-sample",
|
||
"owner": {
|
||
"login": "alpacamybags118",
|
||
"id": 16386559,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16386559?v=4",
|
||
"html_url": "https:\/\/github.com\/alpacamybags118"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alpacamybags118\/log4j-cve-2021-44228-sample",
|
||
"description": "Sample docker-compose setup to show how this exploit works",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T02:26:52Z",
|
||
"updated_at": "2021-12-14T02:55:18Z",
|
||
"pushed_at": "2021-12-14T02:49:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438090719,
|
||
"name": "log4j2-issue-check",
|
||
"full_name": "sandarenu\/log4j2-issue-check",
|
||
"owner": {
|
||
"login": "sandarenu",
|
||
"id": 808954,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/808954?v=4",
|
||
"html_url": "https:\/\/github.com\/sandarenu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sandarenu\/log4j2-issue-check",
|
||
"description": "Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T02:26:56Z",
|
||
"updated_at": "2021-12-14T03:53:41Z",
|
||
"pushed_at": "2021-12-14T03:53:38Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438112808,
|
||
"name": "CVE-2021-44228-Demo",
|
||
"full_name": "roticagas\/CVE-2021-44228-Demo",
|
||
"owner": {
|
||
"login": "roticagas",
|
||
"id": 17757134,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17757134?v=4",
|
||
"html_url": "https:\/\/github.com\/roticagas"
|
||
},
|
||
"html_url": "https:\/\/github.com\/roticagas\/CVE-2021-44228-Demo",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-14T04:09:02Z",
|
||
"updated_at": "2021-12-15T07:13:10Z",
|
||
"pushed_at": "2021-12-15T07:13:08Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438115863,
|
||
"name": "cve-2021-44228-log4j",
|
||
"full_name": "archongum\/cve-2021-44228-log4j",
|
||
"owner": {
|
||
"login": "archongum",
|
||
"id": 20929338,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20929338?v=4",
|
||
"html_url": "https:\/\/github.com\/archongum"
|
||
},
|
||
"html_url": "https:\/\/github.com\/archongum\/cve-2021-44228-log4j",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-14T04:25:13Z",
|
||
"updated_at": "2021-12-14T05:51:10Z",
|
||
"pushed_at": "2021-12-14T05:51:07Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438118026,
|
||
"name": "log4j-urlscanner",
|
||
"full_name": "Woahd\/log4j-urlscanner",
|
||
"owner": {
|
||
"login": "Woahd",
|
||
"id": 91861246,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91861246?v=4",
|
||
"html_url": "https:\/\/github.com\/Woahd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Woahd\/log4j-urlscanner",
|
||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T04:35:20Z",
|
||
"updated_at": "2021-12-15T04:54:26Z",
|
||
"pushed_at": "2021-12-15T04:54:23Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438128189,
|
||
"name": "Log4j2-CVE-2021-44228-revshell",
|
||
"full_name": "faisalfs10x\/Log4j2-CVE-2021-44228-revshell",
|
||
"owner": {
|
||
"login": "faisalfs10x",
|
||
"id": 51811615,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
|
||
"html_url": "https:\/\/github.com\/faisalfs10x"
|
||
},
|
||
"html_url": "https:\/\/github.com\/faisalfs10x\/Log4j2-CVE-2021-44228-revshell",
|
||
"description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T05:24:52Z",
|
||
"updated_at": "2021-12-21T19:48:59Z",
|
||
"pushed_at": "2021-12-21T19:48:57Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438133157,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "zjx\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "zjx",
|
||
"id": 1483965,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1483965?v=4",
|
||
"html_url": "https:\/\/github.com\/zjx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zjx\/CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-14T05:48:49Z",
|
||
"updated_at": "2021-12-14T05:48:53Z",
|
||
"pushed_at": "2021-12-14T05:48:50Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438135281,
|
||
"name": "chk_log4j",
|
||
"full_name": "gcmurphy\/chk_log4j",
|
||
"owner": {
|
||
"login": "gcmurphy",
|
||
"id": 222833,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/222833?v=4",
|
||
"html_url": "https:\/\/github.com\/gcmurphy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gcmurphy\/chk_log4j",
|
||
"description": "Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T05:58:28Z",
|
||
"updated_at": "2021-12-14T12:20:59Z",
|
||
"pushed_at": "2021-12-14T12:20:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"jar",
|
||
"log4j",
|
||
"log4shell",
|
||
"rust"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438144746,
|
||
"name": "LogMePwn",
|
||
"full_name": "0xInfection\/LogMePwn",
|
||
"owner": {
|
||
"login": "0xInfection",
|
||
"id": 39941993,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39941993?v=4",
|
||
"html_url": "https:\/\/github.com\/0xInfection"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xInfection\/LogMePwn",
|
||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T06:37:59Z",
|
||
"updated_at": "2022-01-12T11:42:16Z",
|
||
"pushed_at": "2021-12-27T15:12:20Z",
|
||
"stargazers_count": 253,
|
||
"watchers_count": 253,
|
||
"forks_count": 35,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"internet-scanning",
|
||
"log4j",
|
||
"rce-scanner",
|
||
"vulnerability-scanners"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 35,
|
||
"watchers": 253,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438148080,
|
||
"name": "apache-solr-log4j-CVE-2021-44228",
|
||
"full_name": "toramanemre\/apache-solr-log4j-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "toramanemre",
|
||
"id": 24626967,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4",
|
||
"html_url": "https:\/\/github.com\/toramanemre"
|
||
},
|
||
"html_url": "https:\/\/github.com\/toramanemre\/apache-solr-log4j-CVE-2021-44228",
|
||
"description": "A Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T06:51:30Z",
|
||
"updated_at": "2021-12-14T06:51:53Z",
|
||
"pushed_at": "2021-12-14T06:51:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438165990,
|
||
"name": "log4j-scanner",
|
||
"full_name": "codiobert\/log4j-scanner",
|
||
"owner": {
|
||
"login": "codiobert",
|
||
"id": 10519412,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10519412?v=4",
|
||
"html_url": "https:\/\/github.com\/codiobert"
|
||
},
|
||
"html_url": "https:\/\/github.com\/codiobert\/log4j-scanner",
|
||
"description": "Check CVE-2021-44228 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T07:59:14Z",
|
||
"updated_at": "2021-12-25T12:52:56Z",
|
||
"pushed_at": "2021-12-15T17:08:42Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438175327,
|
||
"name": "log4j2-rce-recap",
|
||
"full_name": "cbuschka\/log4j2-rce-recap",
|
||
"owner": {
|
||
"login": "cbuschka",
|
||
"id": 5462513,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5462513?v=4",
|
||
"html_url": "https:\/\/github.com\/cbuschka"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cbuschka\/log4j2-rce-recap",
|
||
"description": "Little recap of the log4j2 remote code execution (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T08:31:47Z",
|
||
"updated_at": "2021-12-14T10:06:36Z",
|
||
"pushed_at": "2021-12-14T10:03:23Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"exploit",
|
||
"java",
|
||
"log4j2",
|
||
"rce",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438182253,
|
||
"name": "log4j-vulnerability-demo",
|
||
"full_name": "andrii-kovalenko-celonis\/log4j-vulnerability-demo",
|
||
"owner": {
|
||
"login": "andrii-kovalenko-celonis",
|
||
"id": 63106217,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63106217?v=4",
|
||
"html_url": "https:\/\/github.com\/andrii-kovalenko-celonis"
|
||
},
|
||
"html_url": "https:\/\/github.com\/andrii-kovalenko-celonis\/log4j-vulnerability-demo",
|
||
"description": "Endpoint to test CVE-2021-44228 – Log4j 2",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T08:55:43Z",
|
||
"updated_at": "2021-12-14T08:57:36Z",
|
||
"pushed_at": "2021-12-14T08:57:33Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438193673,
|
||
"name": "Log4j-CVE-2021-44228",
|
||
"full_name": "jan-muhammad-zaidi\/Log4j-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "jan-muhammad-zaidi",
|
||
"id": 58605984,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58605984?v=4",
|
||
"html_url": "https:\/\/github.com\/jan-muhammad-zaidi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jan-muhammad-zaidi\/Log4j-CVE-2021-44228",
|
||
"description": "On Thursday (December 9th), a 0-day exploit in the popular Java logging library log4j (version 2) was discovered that results in Remote Code Execution (RCE) by logging a certain string. Given how ubiquitous this library is, the impact of the exploit (full server control), and how easy it is to exploit, the impact of this vulnerability is quite severe. We're calling it \"Log4Shell\" for short.",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T09:33:22Z",
|
||
"updated_at": "2021-12-14T09:35:51Z",
|
||
"pushed_at": "2021-12-14T09:35:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438203240,
|
||
"name": "log4j-finder",
|
||
"full_name": "fox-it\/log4j-finder",
|
||
"owner": {
|
||
"login": "fox-it",
|
||
"id": 468621,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/468621?v=4",
|
||
"html_url": "https:\/\/github.com\/fox-it"
|
||
},
|
||
"html_url": "https:\/\/github.com\/fox-it\/log4j-finder",
|
||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T10:04:42Z",
|
||
"updated_at": "2022-01-12T10:05:37Z",
|
||
"pushed_at": "2022-01-12T03:31:50Z",
|
||
"stargazers_count": 385,
|
||
"watchers_count": 385,
|
||
"forks_count": 82,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"cve-2021-45105",
|
||
"log4j",
|
||
"log4j-finder",
|
||
"log4j2",
|
||
"log4shell",
|
||
"python"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 82,
|
||
"watchers": 385,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438247209,
|
||
"name": "CVE-2021-44228-Log4j-Payloads",
|
||
"full_name": "rwincey\/CVE-2021-44228-Log4j-Payloads",
|
||
"owner": {
|
||
"login": "rwincey",
|
||
"id": 5438659,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5438659?v=4",
|
||
"html_url": "https:\/\/github.com\/rwincey"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rwincey\/CVE-2021-44228-Log4j-Payloads",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-14T12:37:23Z",
|
||
"updated_at": "2022-01-11T15:35:38Z",
|
||
"pushed_at": "2022-01-06T18:15:24Z",
|
||
"stargazers_count": 54,
|
||
"watchers_count": 54,
|
||
"forks_count": 13,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 13,
|
||
"watchers": 54,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438248880,
|
||
"name": "JNDI-Exploit-1.2-log4shell",
|
||
"full_name": "34zY\/JNDI-Exploit-1.2-log4shell",
|
||
"owner": {
|
||
"login": "34zY",
|
||
"id": 55347142,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
|
||
"html_url": "https:\/\/github.com\/34zY"
|
||
},
|
||
"html_url": "https:\/\/github.com\/34zY\/JNDI-Exploit-1.2-log4shell",
|
||
"description": "Details : CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T12:42:54Z",
|
||
"updated_at": "2021-12-19T07:58:01Z",
|
||
"pushed_at": "2021-12-19T07:57:58Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438250402,
|
||
"name": "cve-2021-44228",
|
||
"full_name": "didoatanasov\/cve-2021-44228",
|
||
"owner": {
|
||
"login": "didoatanasov",
|
||
"id": 7069625,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7069625?v=4",
|
||
"html_url": "https:\/\/github.com\/didoatanasov"
|
||
},
|
||
"html_url": "https:\/\/github.com\/didoatanasov\/cve-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-14T12:47:56Z",
|
||
"updated_at": "2021-12-14T14:30:02Z",
|
||
"pushed_at": "2021-12-14T14:29:59Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438289849,
|
||
"name": "Security-Log4J-Tester",
|
||
"full_name": "ReynerGonzalez\/Security-Log4J-Tester",
|
||
"owner": {
|
||
"login": "ReynerGonzalez",
|
||
"id": 51517256,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51517256?v=4",
|
||
"html_url": "https:\/\/github.com\/ReynerGonzalez"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ReynerGonzalez\/Security-Log4J-Tester",
|
||
"description": "The vulnerability, which can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell.",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T14:46:08Z",
|
||
"updated_at": "2021-12-14T15:04:49Z",
|
||
"pushed_at": "2021-12-14T15:04:46Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438291572,
|
||
"name": "org.shaneking.demo.cve.y2021.s44228",
|
||
"full_name": "ShaneKingBlog\/org.shaneking.demo.cve.y2021.s44228",
|
||
"owner": {
|
||
"login": "ShaneKingBlog",
|
||
"id": 76613703,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76613703?v=4",
|
||
"html_url": "https:\/\/github.com\/ShaneKingBlog"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ShaneKingBlog\/org.shaneking.demo.cve.y2021.s44228",
|
||
"description": "CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T14:51:26Z",
|
||
"updated_at": "2021-12-14T18:03:52Z",
|
||
"pushed_at": "2021-12-14T18:03:49Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438299030,
|
||
"name": "log4j",
|
||
"full_name": "wortell\/log4j",
|
||
"owner": {
|
||
"login": "wortell",
|
||
"id": 54625905,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54625905?v=4",
|
||
"html_url": "https:\/\/github.com\/wortell"
|
||
},
|
||
"html_url": "https:\/\/github.com\/wortell\/log4j",
|
||
"description": "Repo containing all info, scripts, etc. related to CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T15:13:06Z",
|
||
"updated_at": "2022-01-08T17:32:42Z",
|
||
"pushed_at": "2021-12-29T19:46:22Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438302340,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "roswellit\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "roswellit",
|
||
"id": 58468963,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58468963?v=4",
|
||
"html_url": "https:\/\/github.com\/roswellit"
|
||
},
|
||
"html_url": "https:\/\/github.com\/roswellit\/CVE-2021-44228",
|
||
"description": "Log4Shell Enumeration, Mitigation and Attack Detection Tool",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T15:22:50Z",
|
||
"updated_at": "2021-12-16T10:37:41Z",
|
||
"pushed_at": "2021-12-14T15:34:58Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438328048,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "yanicksenn\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "yanicksenn",
|
||
"id": 7055493,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7055493?v=4",
|
||
"html_url": "https:\/\/github.com\/yanicksenn"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yanicksenn\/CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-14T16:42:45Z",
|
||
"updated_at": "2021-12-14T16:45:36Z",
|
||
"pushed_at": "2021-12-14T16:45:33Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438349219,
|
||
"name": "CVE-2021-44228-Scanner",
|
||
"full_name": "municipalparkingservices\/CVE-2021-44228-Scanner",
|
||
"owner": {
|
||
"login": "municipalparkingservices",
|
||
"id": 3780687,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3780687?v=4",
|
||
"html_url": "https:\/\/github.com\/municipalparkingservices"
|
||
},
|
||
"html_url": "https:\/\/github.com\/municipalparkingservices\/CVE-2021-44228-Scanner",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-14T17:53:37Z",
|
||
"updated_at": "2021-12-14T17:58:15Z",
|
||
"pushed_at": "2021-12-14T17:54:33Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438353510,
|
||
"name": "log4j-honeypot-flask",
|
||
"full_name": "BinaryDefense\/log4j-honeypot-flask",
|
||
"owner": {
|
||
"login": "BinaryDefense",
|
||
"id": 10130449,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10130449?v=4",
|
||
"html_url": "https:\/\/github.com\/BinaryDefense"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BinaryDefense\/log4j-honeypot-flask",
|
||
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T18:08:45Z",
|
||
"updated_at": "2022-01-10T14:45:44Z",
|
||
"pushed_at": "2021-12-20T14:44:27Z",
|
||
"stargazers_count": 130,
|
||
"watchers_count": 130,
|
||
"forks_count": 21,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 21,
|
||
"watchers": 130,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438369987,
|
||
"name": "Log4jTools",
|
||
"full_name": "MalwareTech\/Log4jTools",
|
||
"owner": {
|
||
"login": "MalwareTech",
|
||
"id": 7256561,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7256561?v=4",
|
||
"html_url": "https:\/\/github.com\/MalwareTech"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MalwareTech\/Log4jTools",
|
||
"description": "Tools for investigating Log4j CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T19:08:14Z",
|
||
"updated_at": "2021-12-31T16:24:51Z",
|
||
"pushed_at": "2021-12-23T21:03:08Z",
|
||
"stargazers_count": 83,
|
||
"watchers_count": 83,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 83,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438375603,
|
||
"name": "log4jail",
|
||
"full_name": "mufeedvh\/log4jail",
|
||
"owner": {
|
||
"login": "mufeedvh",
|
||
"id": 26198477,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26198477?v=4",
|
||
"html_url": "https:\/\/github.com\/mufeedvh"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mufeedvh\/log4jail",
|
||
"description": "A firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T19:29:11Z",
|
||
"updated_at": "2021-12-22T15:00:47Z",
|
||
"pushed_at": "2021-12-14T21:14:33Z",
|
||
"stargazers_count": 20,
|
||
"watchers_count": 20,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 20,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438390351,
|
||
"name": "log4shellpoc",
|
||
"full_name": "guerzon\/log4shellpoc",
|
||
"owner": {
|
||
"login": "guerzon",
|
||
"id": 44284609,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44284609?v=4",
|
||
"html_url": "https:\/\/github.com\/guerzon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/guerzon\/log4shellpoc",
|
||
"description": "Simple Spring Boot application vulnerable to CVE-2021-44228 (a.k.a log4shell)",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T20:27:26Z",
|
||
"updated_at": "2021-12-30T03:43:48Z",
|
||
"pushed_at": "2021-12-17T23:47:41Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"jndi-exploit",
|
||
"log4j",
|
||
"log4j2",
|
||
"penetration-testing",
|
||
"proof-of-concept"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438406090,
|
||
"name": "CVE-2021-44228_PoC",
|
||
"full_name": "ab0x90\/CVE-2021-44228_PoC",
|
||
"owner": {
|
||
"login": "ab0x90",
|
||
"id": 36925640,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36925640?v=4",
|
||
"html_url": "https:\/\/github.com\/ab0x90"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ab0x90\/CVE-2021-44228_PoC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-14T21:32:42Z",
|
||
"updated_at": "2021-12-18T02:21:35Z",
|
||
"pushed_at": "2021-12-15T11:23:38Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438409343,
|
||
"name": "log4j-remediation-tools",
|
||
"full_name": "stripe\/log4j-remediation-tools",
|
||
"owner": {
|
||
"login": "stripe",
|
||
"id": 856813,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/856813?v=4",
|
||
"html_url": "https:\/\/github.com\/stripe"
|
||
},
|
||
"html_url": "https:\/\/github.com\/stripe\/log4j-remediation-tools",
|
||
"description": "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T21:47:04Z",
|
||
"updated_at": "2022-01-08T21:49:27Z",
|
||
"pushed_at": "2021-12-15T20:37:05Z",
|
||
"stargazers_count": 38,
|
||
"watchers_count": 38,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"log4j2",
|
||
"remediation",
|
||
"tools"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 38,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438416799,
|
||
"name": "CVE-2021-44228-Mass-RCE",
|
||
"full_name": "razz0r\/CVE-2021-44228-Mass-RCE",
|
||
"owner": {
|
||
"login": "razz0r",
|
||
"id": 96150618,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96150618?v=4",
|
||
"html_url": "https:\/\/github.com\/razz0r"
|
||
},
|
||
"html_url": "https:\/\/github.com\/razz0r\/CVE-2021-44228-Mass-RCE",
|
||
"description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T22:19:29Z",
|
||
"updated_at": "2022-01-13T15:58:54Z",
|
||
"pushed_at": "2022-01-13T10:36:15Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"exploit",
|
||
"java",
|
||
"ldap",
|
||
"log4j",
|
||
"log4j-rce",
|
||
"log4j2",
|
||
"log4shell",
|
||
"poc",
|
||
"remote-code-execution"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438417506,
|
||
"name": "log4jshield",
|
||
"full_name": "xsultan\/log4jshield",
|
||
"owner": {
|
||
"login": "xsultan",
|
||
"id": 231387,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/231387?v=4",
|
||
"html_url": "https:\/\/github.com\/xsultan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xsultan\/log4jshield",
|
||
"description": "Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T22:22:15Z",
|
||
"updated_at": "2021-12-23T04:50:40Z",
|
||
"pushed_at": "2021-12-23T04:50:38Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"log4j",
|
||
"log4j2",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 12,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438418716,
|
||
"name": "log4shell-finder",
|
||
"full_name": "HynekPetrak\/log4shell-finder",
|
||
"owner": {
|
||
"login": "HynekPetrak",
|
||
"id": 8593983,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8593983?v=4",
|
||
"html_url": "https:\/\/github.com\/HynekPetrak"
|
||
},
|
||
"html_url": "https:\/\/github.com\/HynekPetrak\/log4shell-finder",
|
||
"description": "Fastest filesystem scanner for CVE-2021-44228 and CVE-2021-45046 vulnerable instances of log4j library, including embedded ones. Excellent performance and low memory footprint.",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T22:27:14Z",
|
||
"updated_at": "2022-01-11T13:28:06Z",
|
||
"pushed_at": "2022-01-12T13:47:55Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"log4j",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 11,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438423480,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "0xThiebaut\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "0xThiebaut",
|
||
"id": 46688461,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46688461?v=4",
|
||
"html_url": "https:\/\/github.com\/0xThiebaut"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xThiebaut\/CVE-2021-44228",
|
||
"description": "CVE-2021-44228 Response Scripts",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T22:50:05Z",
|
||
"updated_at": "2021-12-15T00:30:22Z",
|
||
"pushed_at": "2021-12-15T00:27:46Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438432868,
|
||
"name": "CVE-2021-44228_scanner",
|
||
"full_name": "CERTCC\/CVE-2021-44228_scanner",
|
||
"owner": {
|
||
"login": "CERTCC",
|
||
"id": 37221555,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37221555?v=4",
|
||
"html_url": "https:\/\/github.com\/CERTCC"
|
||
},
|
||
"html_url": "https:\/\/github.com\/CERTCC\/CVE-2021-44228_scanner",
|
||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T23:33:51Z",
|
||
"updated_at": "2022-01-13T15:56:25Z",
|
||
"pushed_at": "2022-01-12T03:28:41Z",
|
||
"stargazers_count": 315,
|
||
"watchers_count": 315,
|
||
"forks_count": 84,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 84,
|
||
"watchers": 315,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438469082,
|
||
"name": "log4j_scanner",
|
||
"full_name": "dbzoo\/log4j_scanner",
|
||
"owner": {
|
||
"login": "dbzoo",
|
||
"id": 1550399,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1550399?v=4",
|
||
"html_url": "https:\/\/github.com\/dbzoo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dbzoo\/log4j_scanner",
|
||
"description": "Fast filesystem scanner for CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T02:29:34Z",
|
||
"updated_at": "2022-01-09T18:17:10Z",
|
||
"pushed_at": "2022-01-10T14:52:40Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438469428,
|
||
"name": "CVE-2021-44228_scanner",
|
||
"full_name": "jeremyrsellars\/CVE-2021-44228_scanner",
|
||
"owner": {
|
||
"login": "jeremyrsellars",
|
||
"id": 1396319,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1396319?v=4",
|
||
"html_url": "https:\/\/github.com\/jeremyrsellars"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jeremyrsellars\/CVE-2021-44228_scanner",
|
||
"description": "Aims to find JndiLookup.class in nearly any directory or zip, jar, ear, war file, even deeply nested.",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T02:31:14Z",
|
||
"updated_at": "2021-12-15T22:30:35Z",
|
||
"pushed_at": "2021-12-15T22:30:32Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438480170,
|
||
"name": "C1-WS-LOG4SHELL",
|
||
"full_name": "JustinDPerkins\/C1-WS-LOG4SHELL",
|
||
"owner": {
|
||
"login": "JustinDPerkins",
|
||
"id": 60413733,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60413733?v=4",
|
||
"html_url": "https:\/\/github.com\/JustinDPerkins"
|
||
},
|
||
"html_url": "https:\/\/github.com\/JustinDPerkins\/C1-WS-LOG4SHELL",
|
||
"description": "Quick Deploy to show case cve-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T03:20:25Z",
|
||
"updated_at": "2021-12-17T17:07:45Z",
|
||
"pushed_at": "2021-12-17T17:07:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438490030,
|
||
"name": "Log4j-Updater",
|
||
"full_name": "VinniMarcon\/Log4j-Updater",
|
||
"owner": {
|
||
"login": "VinniMarcon",
|
||
"id": 42422427,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42422427?v=4",
|
||
"html_url": "https:\/\/github.com\/VinniMarcon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/VinniMarcon\/Log4j-Updater",
|
||
"description": "Log4J Updater Bash Script to automate the framework update process on numerous machines and prevent the CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T04:08:15Z",
|
||
"updated_at": "2021-12-16T17:25:55Z",
|
||
"pushed_at": "2021-12-15T06:20:17Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438504265,
|
||
"name": "log4j-vul",
|
||
"full_name": "bhprin\/log4j-vul",
|
||
"owner": {
|
||
"login": "bhprin",
|
||
"id": 1876456,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1876456?v=4",
|
||
"html_url": "https:\/\/github.com\/bhprin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bhprin\/log4j-vul",
|
||
"description": "This project is just to show Apache Log4j2 Vulnerability - aka CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T05:19:13Z",
|
||
"updated_at": "2021-12-22T04:39:30Z",
|
||
"pushed_at": "2021-12-22T04:39:27Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438523356,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "avirahul007\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "avirahul007",
|
||
"id": 63554722,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63554722?v=4",
|
||
"html_url": "https:\/\/github.com\/avirahul007"
|
||
},
|
||
"html_url": "https:\/\/github.com\/avirahul007\/CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-15T06:40:35Z",
|
||
"updated_at": "2021-12-15T06:40:35Z",
|
||
"pushed_at": "2021-12-15T06:40:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438541418,
|
||
"name": "log4j-log4shell-playground",
|
||
"full_name": "rgl\/log4j-log4shell-playground",
|
||
"owner": {
|
||
"login": "rgl",
|
||
"id": 43356,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43356?v=4",
|
||
"html_url": "https:\/\/github.com\/rgl"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rgl\/log4j-log4shell-playground",
|
||
"description": "A playground for poking at the Log4Shell (CVE-2021-44228) vulnerability mitigations",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T07:51:12Z",
|
||
"updated_at": "2021-12-16T11:59:53Z",
|
||
"pushed_at": "2021-12-15T08:44:16Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"log4j",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438541504,
|
||
"name": "how-to-check-patch-secure-log4j-CVE-2021-44228",
|
||
"full_name": "anuvindhs\/how-to-check-patch-secure-log4j-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "anuvindhs",
|
||
"id": 46879183,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46879183?v=4",
|
||
"html_url": "https:\/\/github.com\/anuvindhs"
|
||
},
|
||
"html_url": "https:\/\/github.com\/anuvindhs\/how-to-check-patch-secure-log4j-CVE-2021-44228",
|
||
"description": "A one-stop repo\/ information hub for all log4j vulnerability-related information.",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T07:51:28Z",
|
||
"updated_at": "2022-01-08T02:58:30Z",
|
||
"pushed_at": "2022-01-08T02:58:27Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"vulnerability-detection"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438593574,
|
||
"name": "Get-log4j-Windows.ps1",
|
||
"full_name": "KeysAU\/Get-log4j-Windows.ps1",
|
||
"owner": {
|
||
"login": "KeysAU",
|
||
"id": 38932932,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38932932?v=4",
|
||
"html_url": "https:\/\/github.com\/KeysAU"
|
||
},
|
||
"html_url": "https:\/\/github.com\/KeysAU\/Get-log4j-Windows.ps1",
|
||
"description": "Identifying all log4j components across all windows servers, entire domain, can be multi domain. CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T10:49:36Z",
|
||
"updated_at": "2022-01-12T12:25:17Z",
|
||
"pushed_at": "2021-12-20T06:29:15Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438595299,
|
||
"name": "log4j-CVE-2021-44228",
|
||
"full_name": "kubearmor\/log4j-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "kubearmor",
|
||
"id": 86793284,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86793284?v=4",
|
||
"html_url": "https:\/\/github.com\/kubearmor"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kubearmor\/log4j-CVE-2021-44228",
|
||
"description": "Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T10:55:35Z",
|
||
"updated_at": "2022-01-12T16:35:41Z",
|
||
"pushed_at": "2021-12-15T16:29:14Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438600716,
|
||
"name": "logpresso-CVE-2021-44228-Scanner",
|
||
"full_name": "jyotisahu98\/logpresso-CVE-2021-44228-Scanner",
|
||
"owner": {
|
||
"login": "jyotisahu98",
|
||
"id": 96179721,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96179721?v=4",
|
||
"html_url": "https:\/\/github.com\/jyotisahu98"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jyotisahu98\/logpresso-CVE-2021-44228-Scanner",
|
||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T11:15:25Z",
|
||
"updated_at": "2021-12-27T14:28:30Z",
|
||
"pushed_at": "2021-12-15T11:15:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438605924,
|
||
"name": "log4j-resources",
|
||
"full_name": "gitlab-de\/log4j-resources",
|
||
"owner": {
|
||
"login": "gitlab-de",
|
||
"id": 75491323,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75491323?v=4",
|
||
"html_url": "https:\/\/github.com\/gitlab-de"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gitlab-de\/log4j-resources",
|
||
"description": "This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 and CVE-2021-45046 (mirror from GitLab.com)",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T11:34:02Z",
|
||
"updated_at": "2021-12-18T15:25:17Z",
|
||
"pushed_at": "2021-12-18T15:25:14Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"log4j"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438615335,
|
||
"name": "Log4JHunt",
|
||
"full_name": "redhuntlabs\/Log4JHunt",
|
||
"owner": {
|
||
"login": "redhuntlabs",
|
||
"id": 36505047,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36505047?v=4",
|
||
"html_url": "https:\/\/github.com\/redhuntlabs"
|
||
},
|
||
"html_url": "https:\/\/github.com\/redhuntlabs\/Log4JHunt",
|
||
"description": "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T12:07:05Z",
|
||
"updated_at": "2022-01-11T03:14:38Z",
|
||
"pushed_at": "2021-12-17T07:41:47Z",
|
||
"stargazers_count": 33,
|
||
"watchers_count": 33,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 33,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438635569,
|
||
"name": "log4shell-hotfix-side-effect",
|
||
"full_name": "mss\/log4shell-hotfix-side-effect",
|
||
"owner": {
|
||
"login": "mss",
|
||
"id": 5391,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5391?v=4",
|
||
"html_url": "https:\/\/github.com\/mss"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mss\/log4shell-hotfix-side-effect",
|
||
"description": "Test case to check if the Log4Shell\/CVE-2021-44228 hotfix will raise any unexpected exceptions",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T13:14:34Z",
|
||
"updated_at": "2021-12-18T18:18:37Z",
|
||
"pushed_at": "2021-12-18T12:02:09Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"java",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438650245,
|
||
"name": "log4j_temp_CVE-2021-44228",
|
||
"full_name": "111coding\/log4j_temp_CVE-2021-44228",
|
||
"owner": {
|
||
"login": "111coding",
|
||
"id": 49793527,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49793527?v=4",
|
||
"html_url": "https:\/\/github.com\/111coding"
|
||
},
|
||
"html_url": "https:\/\/github.com\/111coding\/log4j_temp_CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-15T14:01:23Z",
|
||
"updated_at": "2021-12-18T17:13:29Z",
|
||
"pushed_at": "2021-12-18T17:13:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438664340,
|
||
"name": "log4j-vuln-coverage-check",
|
||
"full_name": "MeterianHQ\/log4j-vuln-coverage-check",
|
||
"owner": {
|
||
"login": "MeterianHQ",
|
||
"id": 28596672,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28596672?v=4",
|
||
"html_url": "https:\/\/github.com\/MeterianHQ"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MeterianHQ\/log4j-vuln-coverage-check",
|
||
"description": "A simple project to check coverage of Log4J vuln CVE-2021-44228 (and related)",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T14:44:14Z",
|
||
"updated_at": "2021-12-16T14:00:05Z",
|
||
"pushed_at": "2021-12-16T14:00:01Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438680847,
|
||
"name": "jmeter-fix-cve-2021-44228-windows",
|
||
"full_name": "sebiboga\/jmeter-fix-cve-2021-44228-windows",
|
||
"owner": {
|
||
"login": "sebiboga",
|
||
"id": 41440889,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41440889?v=4",
|
||
"html_url": "https:\/\/github.com\/sebiboga"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sebiboga\/jmeter-fix-cve-2021-44228-windows",
|
||
"description": "fix cve 44228 for windows",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T15:34:19Z",
|
||
"updated_at": "2021-12-15T15:50:19Z",
|
||
"pushed_at": "2021-12-15T15:51:46Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438683307,
|
||
"name": "log4shell-cloud-scanner",
|
||
"full_name": "mitiga\/log4shell-cloud-scanner",
|
||
"owner": {
|
||
"login": "mitiga",
|
||
"id": 82891013,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82891013?v=4",
|
||
"html_url": "https:\/\/github.com\/mitiga"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mitiga\/log4shell-cloud-scanner",
|
||
"description": "we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T15:42:06Z",
|
||
"updated_at": "2022-01-04T14:01:16Z",
|
||
"pushed_at": "2021-12-17T16:00:03Z",
|
||
"stargazers_count": 13,
|
||
"watchers_count": 13,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 13,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438689577,
|
||
"name": "Log4j",
|
||
"full_name": "isuruwa\/Log4j",
|
||
"owner": {
|
||
"login": "isuruwa",
|
||
"id": 72663288,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72663288?v=4",
|
||
"html_url": "https:\/\/github.com\/isuruwa"
|
||
},
|
||
"html_url": "https:\/\/github.com\/isuruwa\/Log4j",
|
||
"description": "A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228 ",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T16:01:36Z",
|
||
"updated_at": "2021-12-25T09:42:50Z",
|
||
"pushed_at": "2021-12-15T19:15:07Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"java",
|
||
"log4j"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438692384,
|
||
"name": "log4shell-data",
|
||
"full_name": "honeynet\/log4shell-data",
|
||
"owner": {
|
||
"login": "honeynet",
|
||
"id": 3327517,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3327517?v=4",
|
||
"html_url": "https:\/\/github.com\/honeynet"
|
||
},
|
||
"html_url": "https:\/\/github.com\/honeynet\/log4shell-data",
|
||
"description": "Data we are receiving from our honeypots about CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T16:10:54Z",
|
||
"updated_at": "2021-12-16T16:08:37Z",
|
||
"pushed_at": "2021-12-16T16:08:35Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438695688,
|
||
"name": "checkmk-log4j-scanner",
|
||
"full_name": "inettgmbh\/checkmk-log4j-scanner",
|
||
"owner": {
|
||
"login": "inettgmbh",
|
||
"id": 12827152,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12827152?v=4",
|
||
"html_url": "https:\/\/github.com\/inettgmbh"
|
||
},
|
||
"html_url": "https:\/\/github.com\/inettgmbh\/checkmk-log4j-scanner",
|
||
"description": "Scans for Log4j versions effected by CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T16:21:26Z",
|
||
"updated_at": "2022-01-03T11:01:26Z",
|
||
"pushed_at": "2022-01-03T11:01:23Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438719808,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "MkTech-0-8YT3\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "MkTech-0-8YT3",
|
||
"id": 61518601,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61518601?v=4",
|
||
"html_url": "https:\/\/github.com\/MkTech-0-8YT3"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MkTech-0-8YT3\/CVE-2021-44228",
|
||
"description": "CVE-2021-44228 demo webapp",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T17:42:13Z",
|
||
"updated_at": "2021-12-20T19:25:27Z",
|
||
"pushed_at": "2021-12-20T19:25:24Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438739105,
|
||
"name": "CVE-2021-44228-Log4j",
|
||
"full_name": "VerveIndustrialProtection\/CVE-2021-44228-Log4j",
|
||
"owner": {
|
||
"login": "VerveIndustrialProtection",
|
||
"id": 96202973,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96202973?v=4",
|
||
"html_url": "https:\/\/github.com\/VerveIndustrialProtection"
|
||
},
|
||
"html_url": "https:\/\/github.com\/VerveIndustrialProtection\/CVE-2021-44228-Log4j",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-15T18:51:07Z",
|
||
"updated_at": "2022-01-01T14:37:49Z",
|
||
"pushed_at": "2022-01-04T21:10:54Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438745261,
|
||
"name": "log4j",
|
||
"full_name": "alenazi90\/log4j",
|
||
"owner": {
|
||
"login": "alenazi90",
|
||
"id": 3836915,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3836915?v=4",
|
||
"html_url": "https:\/\/github.com\/alenazi90"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alenazi90\/log4j",
|
||
"description": "An automated header extensive scanner for detecting log4j RCE CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T19:15:00Z",
|
||
"updated_at": "2021-12-16T15:10:52Z",
|
||
"pushed_at": "2021-12-15T19:21:02Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438747026,
|
||
"name": "log4j-cve-2021-44228",
|
||
"full_name": "pmontesd\/log4j-cve-2021-44228",
|
||
"owner": {
|
||
"login": "pmontesd",
|
||
"id": 8183561,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8183561?v=4",
|
||
"html_url": "https:\/\/github.com\/pmontesd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pmontesd\/log4j-cve-2021-44228",
|
||
"description": "Very simple Ansible playbook that scan filesystem for JAR files vulnerable to Log4Shell",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T19:21:39Z",
|
||
"updated_at": "2022-01-12T13:13:44Z",
|
||
"pushed_at": "2021-12-15T20:39:16Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438756678,
|
||
"name": "log4shell",
|
||
"full_name": "LiveOverflow\/log4shell",
|
||
"owner": {
|
||
"login": "LiveOverflow",
|
||
"id": 12161158,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12161158?v=4",
|
||
"html_url": "https:\/\/github.com\/LiveOverflow"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LiveOverflow\/log4shell",
|
||
"description": "Small example repo for looking into log4j CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T19:59:38Z",
|
||
"updated_at": "2022-01-13T16:39:43Z",
|
||
"pushed_at": "2021-12-24T15:44:53Z",
|
||
"stargazers_count": 51,
|
||
"watchers_count": 51,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 51,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438761150,
|
||
"name": "kubernetes-log4j-cve-2021-44228-node-agent",
|
||
"full_name": "aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent",
|
||
"owner": {
|
||
"login": "aws-samples",
|
||
"id": 8931462,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931462?v=4",
|
||
"html_url": "https:\/\/github.com\/aws-samples"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-15T20:17:41Z",
|
||
"updated_at": "2022-01-05T23:26:33Z",
|
||
"pushed_at": "2022-01-05T16:26:16Z",
|
||
"stargazers_count": 84,
|
||
"watchers_count": 84,
|
||
"forks_count": 16,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 16,
|
||
"watchers": 84,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438773632,
|
||
"name": "Log4Shell-Honeypot",
|
||
"full_name": "michaelsanford\/Log4Shell-Honeypot",
|
||
"owner": {
|
||
"login": "michaelsanford",
|
||
"id": 1800499,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1800499?v=4",
|
||
"html_url": "https:\/\/github.com\/michaelsanford"
|
||
},
|
||
"html_url": "https:\/\/github.com\/michaelsanford\/Log4Shell-Honeypot",
|
||
"description": "Dockerized honeypot for CVE-2021-44228.",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T21:09:00Z",
|
||
"updated_at": "2022-01-04T20:43:53Z",
|
||
"pushed_at": "2021-12-16T05:03:07Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"docker",
|
||
"honeypot",
|
||
"python"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438791130,
|
||
"name": "Log4Pot",
|
||
"full_name": "thomaspatzke\/Log4Pot",
|
||
"owner": {
|
||
"login": "thomaspatzke",
|
||
"id": 1845601,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1845601?v=4",
|
||
"html_url": "https:\/\/github.com\/thomaspatzke"
|
||
},
|
||
"html_url": "https:\/\/github.com\/thomaspatzke\/Log4Pot",
|
||
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T22:30:34Z",
|
||
"updated_at": "2022-01-13T17:56:42Z",
|
||
"pushed_at": "2022-01-12T22:16:28Z",
|
||
"stargazers_count": 55,
|
||
"watchers_count": 55,
|
||
"forks_count": 15,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 15,
|
||
"watchers": 55,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438797049,
|
||
"name": "cve-2021-44228-rce-poc",
|
||
"full_name": "ubitech\/cve-2021-44228-rce-poc",
|
||
"owner": {
|
||
"login": "ubitech",
|
||
"id": 998323,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/998323?v=4",
|
||
"html_url": "https:\/\/github.com\/ubitech"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ubitech\/cve-2021-44228-rce-poc",
|
||
"description": "A Remote Code Execution PoC for Log4Shell (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T23:00:25Z",
|
||
"updated_at": "2021-12-17T06:29:13Z",
|
||
"pushed_at": "2021-12-15T23:03:44Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438825521,
|
||
"name": "log4v-vuln-check",
|
||
"full_name": "rv4l3r3\/log4v-vuln-check",
|
||
"owner": {
|
||
"login": "rv4l3r3",
|
||
"id": 90338959,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90338959?v=4",
|
||
"html_url": "https:\/\/github.com\/rv4l3r3"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rv4l3r3\/log4v-vuln-check",
|
||
"description": "This script is used to perform a fast check if your server is possibly affected by CVE-2021-44228 (the log4j vulnerability).",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T01:38:25Z",
|
||
"updated_at": "2021-12-20T22:11:34Z",
|
||
"pushed_at": "2021-12-20T22:11:31Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438853805,
|
||
"name": "log4j_scanner_wrapper",
|
||
"full_name": "dpomnean\/log4j_scanner_wrapper",
|
||
"owner": {
|
||
"login": "dpomnean",
|
||
"id": 17032114,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17032114?v=4",
|
||
"html_url": "https:\/\/github.com\/dpomnean"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dpomnean\/log4j_scanner_wrapper",
|
||
"description": "log4j vulnerability wrapper scanner for CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T03:57:41Z",
|
||
"updated_at": "2021-12-17T15:23:34Z",
|
||
"pushed_at": "2021-12-16T14:10:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438920047,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "roxas-tan\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "roxas-tan",
|
||
"id": 63656689,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63656689?v=4",
|
||
"html_url": "https:\/\/github.com\/roxas-tan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/roxas-tan\/CVE-2021-44228",
|
||
"description": "This Log4j RCE exploit originated from https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T08:46:55Z",
|
||
"updated_at": "2022-01-11T11:16:37Z",
|
||
"pushed_at": "2021-12-16T08:59:14Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438931405,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "shamo0\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "shamo0",
|
||
"id": 48299520,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4",
|
||
"html_url": "https:\/\/github.com\/shamo0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shamo0\/CVE-2021-44228",
|
||
"description": "log4shell (CVE-2021-44228) scanning tool",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T09:26:37Z",
|
||
"updated_at": "2021-12-16T15:12:45Z",
|
||
"pushed_at": "2021-12-16T10:00:15Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"2021",
|
||
"44228",
|
||
"apache",
|
||
"code",
|
||
"cve",
|
||
"cve-2021-44228",
|
||
"execution",
|
||
"exploit",
|
||
"log",
|
||
"log4j",
|
||
"log4j2",
|
||
"log4shell",
|
||
"logging",
|
||
"poc",
|
||
"rce",
|
||
"remote",
|
||
"scanner",
|
||
"scanning",
|
||
"tool"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438940454,
|
||
"name": "log4j-Scan-Burpsuite",
|
||
"full_name": "snow0715\/log4j-Scan-Burpsuite",
|
||
"owner": {
|
||
"login": "snow0715",
|
||
"id": 54879520,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54879520?v=4",
|
||
"html_url": "https:\/\/github.com\/snow0715"
|
||
},
|
||
"html_url": "https:\/\/github.com\/snow0715\/log4j-Scan-Burpsuite",
|
||
"description": "Log4j漏洞(CVE-2021-44228)的Burpsuite检测插件",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T09:58:02Z",
|
||
"updated_at": "2021-12-27T06:24:07Z",
|
||
"pushed_at": "2021-12-16T10:36:13Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438951347,
|
||
"name": "Log4j-Windows-Scanner",
|
||
"full_name": "Joefreedy\/Log4j-Windows-Scanner",
|
||
"owner": {
|
||
"login": "Joefreedy",
|
||
"id": 47759132,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47759132?v=4",
|
||
"html_url": "https:\/\/github.com\/Joefreedy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Joefreedy\/Log4j-Windows-Scanner",
|
||
"description": "CVE-2021-44228 vulnerability in Apache Log4j library | Log4j vulnerability scanner on Windows machines.",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T10:37:16Z",
|
||
"updated_at": "2021-12-18T12:47:25Z",
|
||
"pushed_at": "2021-12-18T12:47:22Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438971911,
|
||
"name": "log4fix",
|
||
"full_name": "Nanitor\/log4fix",
|
||
"owner": {
|
||
"login": "Nanitor",
|
||
"id": 6453685,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6453685?v=4",
|
||
"html_url": "https:\/\/github.com\/Nanitor"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Nanitor\/log4fix",
|
||
"description": "Detect and fix log4j log4shell vulnerability (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T11:54:11Z",
|
||
"updated_at": "2021-12-29T15:44:16Z",
|
||
"pushed_at": "2021-12-24T13:08:46Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438979039,
|
||
"name": "scanlist-log4j",
|
||
"full_name": "Gyrfalc0n\/scanlist-log4j",
|
||
"owner": {
|
||
"login": "Gyrfalc0n",
|
||
"id": 46728024,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46728024?v=4",
|
||
"html_url": "https:\/\/github.com\/Gyrfalc0n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Gyrfalc0n\/scanlist-log4j",
|
||
"description": "Simple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T12:20:00Z",
|
||
"updated_at": "2021-12-20T15:36:11Z",
|
||
"pushed_at": "2022-01-12T08:53:23Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438985997,
|
||
"name": "log4shell-demo",
|
||
"full_name": "korteke\/log4shell-demo",
|
||
"owner": {
|
||
"login": "korteke",
|
||
"id": 2558348,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2558348?v=4",
|
||
"html_url": "https:\/\/github.com\/korteke"
|
||
},
|
||
"html_url": "https:\/\/github.com\/korteke\/log4shell-demo",
|
||
"description": "Simple webapp that is vulnerable to Log4Shell (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T12:44:24Z",
|
||
"updated_at": "2021-12-22T12:14:02Z",
|
||
"pushed_at": "2021-12-18T19:06:42Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438992218,
|
||
"name": "vuln_spring_log4j2",
|
||
"full_name": "recanavar\/vuln_spring_log4j2",
|
||
"owner": {
|
||
"login": "recanavar",
|
||
"id": 9977753,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9977753?v=4",
|
||
"html_url": "https:\/\/github.com\/recanavar"
|
||
},
|
||
"html_url": "https:\/\/github.com\/recanavar\/vuln_spring_log4j2",
|
||
"description": "Simple Vulnerable Spring Boot Application to Test the CVE-2021-44228 ",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T13:05:38Z",
|
||
"updated_at": "2021-12-16T15:50:45Z",
|
||
"pushed_at": "2021-12-16T14:34:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"java",
|
||
"log4j2",
|
||
"spring"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438998103,
|
||
"name": "Burp-Log4j-HammerTime",
|
||
"full_name": "DXC-StrikeForce\/Burp-Log4j-HammerTime",
|
||
"owner": {
|
||
"login": "DXC-StrikeForce",
|
||
"id": 77387831,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77387831?v=4",
|
||
"html_url": "https:\/\/github.com\/DXC-StrikeForce"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DXC-StrikeForce\/Burp-Log4j-HammerTime",
|
||
"description": "Burp Active Scan extension to identify Log4j vulnerabilities CVE-2021-44228 and CVE-2021-45046",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T13:25:03Z",
|
||
"updated_at": "2022-01-08T17:32:58Z",
|
||
"pushed_at": "2021-12-16T17:02:30Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439018822,
|
||
"name": "log4j-filescan",
|
||
"full_name": "andalik\/log4j-filescan",
|
||
"owner": {
|
||
"login": "andalik",
|
||
"id": 12278569,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12278569?v=4",
|
||
"html_url": "https:\/\/github.com\/andalik"
|
||
},
|
||
"html_url": "https:\/\/github.com\/andalik\/log4j-filescan",
|
||
"description": "Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T14:29:05Z",
|
||
"updated_at": "2022-01-13T15:52:19Z",
|
||
"pushed_at": "2022-01-13T16:34:10Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439019569,
|
||
"name": "CVE-2021-44228-Apache-Log4j",
|
||
"full_name": "lonecloud\/CVE-2021-44228-Apache-Log4j",
|
||
"owner": {
|
||
"login": "lonecloud",
|
||
"id": 17854123,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17854123?v=4",
|
||
"html_url": "https:\/\/github.com\/lonecloud"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lonecloud\/CVE-2021-44228-Apache-Log4j",
|
||
"description": "CVE-2021-44228-Apache-Log4j",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T14:31:14Z",
|
||
"updated_at": "2021-12-16T14:31:45Z",
|
||
"pushed_at": "2021-12-16T14:31:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439030654,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "gyaansastra\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "gyaansastra",
|
||
"id": 35690123,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4",
|
||
"html_url": "https:\/\/github.com\/gyaansastra"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gyaansastra\/CVE-2021-44228",
|
||
"description": "Log4Shell CVE-2021-44228 Vulnerability Scanner and POC",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T15:04:23Z",
|
||
"updated_at": "2021-12-21T05:46:51Z",
|
||
"pushed_at": "2021-12-21T07:03:36Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439060792,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "axisops\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "axisops",
|
||
"id": 5512152,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5512152?v=4",
|
||
"html_url": "https:\/\/github.com\/axisops"
|
||
},
|
||
"html_url": "https:\/\/github.com\/axisops\/CVE-2021-44228",
|
||
"description": "log4j mitigation work",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T16:42:44Z",
|
||
"updated_at": "2021-12-16T16:42:44Z",
|
||
"pushed_at": "2021-12-16T16:42:46Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439071699,
|
||
"name": "MyLog4Shell",
|
||
"full_name": "kal1gh0st\/MyLog4Shell",
|
||
"owner": {
|
||
"login": "kal1gh0st",
|
||
"id": 56889513,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
|
||
"html_url": "https:\/\/github.com\/kal1gh0st"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kal1gh0st\/MyLog4Shell",
|
||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T17:21:22Z",
|
||
"updated_at": "2021-12-30T23:42:23Z",
|
||
"pushed_at": "2021-12-30T23:42:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439071959,
|
||
"name": "log4shell",
|
||
"full_name": "hozyx\/log4shell",
|
||
"owner": {
|
||
"login": "hozyx",
|
||
"id": 96227119,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96227119?v=4",
|
||
"html_url": "https:\/\/github.com\/hozyx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hozyx\/log4shell",
|
||
"description": "Applications that are vulnerable to the log4j CVE-2021-44228\/45046 issue may be detectable by scanning jar, war, ear, zip files to search for the presence of JndiLookup.class.",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T17:22:17Z",
|
||
"updated_at": "2021-12-16T19:22:07Z",
|
||
"pushed_at": "2021-12-16T19:22:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439093094,
|
||
"name": "log4j-cve-2021-44228",
|
||
"full_name": "Vulnmachines\/log4j-cve-2021-44228",
|
||
"owner": {
|
||
"login": "Vulnmachines",
|
||
"id": 79006904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Vulnmachines\/log4j-cve-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-16T18:42:08Z",
|
||
"updated_at": "2021-12-16T18:42:11Z",
|
||
"pushed_at": "2021-12-16T18:42:08Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439112800,
|
||
"name": "CVE-2021-44228-Apache-Log4j-Rce",
|
||
"full_name": "kannthu\/CVE-2021-44228-Apache-Log4j-Rce",
|
||
"owner": {
|
||
"login": "kannthu",
|
||
"id": 22802035,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22802035?v=4",
|
||
"html_url": "https:\/\/github.com\/kannthu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kannthu\/CVE-2021-44228-Apache-Log4j-Rce",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-16T20:02:09Z",
|
||
"updated_at": "2021-12-16T20:05:17Z",
|
||
"pushed_at": "2021-12-16T20:05:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439129728,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "Kr0ff\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "Kr0ff",
|
||
"id": 35173514,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4",
|
||
"html_url": "https:\/\/github.com\/Kr0ff"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Kr0ff\/CVE-2021-44228",
|
||
"description": "Log4Shell Proof of Concept (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T21:19:17Z",
|
||
"updated_at": "2022-01-10T00:56:59Z",
|
||
"pushed_at": "2022-01-10T00:56:55Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439151562,
|
||
"name": "log4shell4shell",
|
||
"full_name": "suuhm\/log4shell4shell",
|
||
"owner": {
|
||
"login": "suuhm",
|
||
"id": 11504990,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11504990?v=4",
|
||
"html_url": "https:\/\/github.com\/suuhm"
|
||
},
|
||
"html_url": "https:\/\/github.com\/suuhm\/log4shell4shell",
|
||
"description": "Log4shell - Multi-Toolkit. Find, Fix & Test possible CVE-2021-44228 vulneraries - provides a complete LOG4SHELL test\/attack environment on shell",
|
||
"fork": false,
|
||
"created_at": "2021-12-16T23:13:09Z",
|
||
"updated_at": "2021-12-30T18:33:37Z",
|
||
"pushed_at": "2021-12-23T00:09:08Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"checker",
|
||
"hacking",
|
||
"linux",
|
||
"log4j",
|
||
"log4j2",
|
||
"log4shell",
|
||
"macos",
|
||
"patch",
|
||
"penetration-testing",
|
||
"pentesting",
|
||
"proof-of-concept",
|
||
"scanner",
|
||
"security",
|
||
"tomcat",
|
||
"vulnerability-scanners",
|
||
"windows"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439173515,
|
||
"name": "Log4j-CVE-2021-44228-EXP",
|
||
"full_name": "AnYi-Sec\/Log4j-CVE-2021-44228-EXP",
|
||
"owner": {
|
||
"login": "AnYi-Sec",
|
||
"id": 96271843,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96271843?v=4",
|
||
"html_url": "https:\/\/github.com\/AnYi-Sec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AnYi-Sec\/Log4j-CVE-2021-44228-EXP",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-17T01:19:37Z",
|
||
"updated_at": "2021-12-23T07:20:56Z",
|
||
"pushed_at": "2021-12-23T06:59:48Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439179362,
|
||
"name": "log4shell-test-exploit",
|
||
"full_name": "wajda\/log4shell-test-exploit",
|
||
"owner": {
|
||
"login": "wajda",
|
||
"id": 795479,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/795479?v=4",
|
||
"html_url": "https:\/\/github.com\/wajda"
|
||
},
|
||
"html_url": "https:\/\/github.com\/wajda\/log4shell-test-exploit",
|
||
"description": "Test exploit of CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T01:50:22Z",
|
||
"updated_at": "2021-12-23T13:48:51Z",
|
||
"pushed_at": "2021-12-23T13:48:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439208776,
|
||
"name": "log4shell-poc-lab",
|
||
"full_name": "obscuritylabs\/log4shell-poc-lab",
|
||
"owner": {
|
||
"login": "obscuritylabs",
|
||
"id": 36056630,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36056630?v=4",
|
||
"html_url": "https:\/\/github.com\/obscuritylabs"
|
||
},
|
||
"html_url": "https:\/\/github.com\/obscuritylabs\/log4shell-poc-lab",
|
||
"description": "A lab demonstration of the log4shell vulnerability: CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T04:20:40Z",
|
||
"updated_at": "2021-12-23T05:33:16Z",
|
||
"pushed_at": "2021-12-17T17:21:50Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439217985,
|
||
"name": "vCenter-Server-Workaround-Script-CVE-2021-44228",
|
||
"full_name": "Fazmin\/vCenter-Server-Workaround-Script-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "Fazmin",
|
||
"id": 1432117,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1432117?v=4",
|
||
"html_url": "https:\/\/github.com\/Fazmin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Fazmin\/vCenter-Server-Workaround-Script-CVE-2021-44228",
|
||
"description": "Script - Workaround instructions to address CVE-2021-44228 in vCenter Server ",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T05:14:05Z",
|
||
"updated_at": "2021-12-19T19:30:56Z",
|
||
"pushed_at": "2022-01-13T14:19:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439234639,
|
||
"name": "CVE-2021-44228-Log4j-PoC-RCE",
|
||
"full_name": "Grupo-Kapa-7\/CVE-2021-44228-Log4j-PoC-RCE",
|
||
"owner": {
|
||
"login": "Grupo-Kapa-7",
|
||
"id": 80293225,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80293225?v=4",
|
||
"html_url": "https:\/\/github.com\/Grupo-Kapa-7"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Grupo-Kapa-7\/CVE-2021-44228-Log4j-PoC-RCE",
|
||
"description": "PoC RCE Log4j CVE-2021-4428 para pruebas",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T06:34:51Z",
|
||
"updated_at": "2021-12-17T06:38:25Z",
|
||
"pushed_at": "2022-01-04T16:58:10Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439263342,
|
||
"name": "CVE-2021-44228_scanner",
|
||
"full_name": "rohankumardubey\/CVE-2021-44228_scanner",
|
||
"owner": {
|
||
"login": "rohankumardubey",
|
||
"id": 82864904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82864904?v=4",
|
||
"html_url": "https:\/\/github.com\/rohankumardubey"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rohankumardubey\/CVE-2021-44228_scanner",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-17T08:32:20Z",
|
||
"updated_at": "2021-12-17T08:32:31Z",
|
||
"pushed_at": "2021-12-17T08:32:27Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439267545,
|
||
"name": "log4j",
|
||
"full_name": "Heliferepo\/log4j",
|
||
"owner": {
|
||
"login": "Heliferepo",
|
||
"id": 62753801,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62753801?v=4",
|
||
"html_url": "https:\/\/github.com\/Heliferepo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Heliferepo\/log4j",
|
||
"description": "CVE-2021-44228 vulnerability in Apache Log4j library",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T08:48:59Z",
|
||
"updated_at": "2021-12-17T08:49:46Z",
|
||
"pushed_at": "2021-12-17T08:49:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439273329,
|
||
"name": "Fix-Log4j-PowershellScript",
|
||
"full_name": "sysadmin0815\/Fix-Log4j-PowershellScript",
|
||
"owner": {
|
||
"login": "sysadmin0815",
|
||
"id": 81157346,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81157346?v=4",
|
||
"html_url": "https:\/\/github.com\/sysadmin0815"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sysadmin0815\/Fix-Log4j-PowershellScript",
|
||
"description": "Log4Shell mitigation (CVE-2021-44228) - search and remove JNDI class from *log4j*.jar files on the system with Powershell (Windows)",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T09:09:56Z",
|
||
"updated_at": "2021-12-23T11:47:25Z",
|
||
"pushed_at": "2021-12-23T10:44:58Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439273557,
|
||
"name": "log4j-lookups-vulnerability",
|
||
"full_name": "RenYuH\/log4j-lookups-vulnerability",
|
||
"owner": {
|
||
"login": "RenYuH",
|
||
"id": 25149383,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25149383?v=4",
|
||
"html_url": "https:\/\/github.com\/RenYuH"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RenYuH\/log4j-lookups-vulnerability",
|
||
"description": "Log4j2 Vulnerability (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T09:10:50Z",
|
||
"updated_at": "2021-12-17T09:52:30Z",
|
||
"pushed_at": "2021-12-17T09:52:28Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439288883,
|
||
"name": "py-log4shellscanner",
|
||
"full_name": "scheibling\/py-log4shellscanner",
|
||
"owner": {
|
||
"login": "scheibling",
|
||
"id": 24367830,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24367830?v=4",
|
||
"html_url": "https:\/\/github.com\/scheibling"
|
||
},
|
||
"html_url": "https:\/\/github.com\/scheibling\/py-log4shellscanner",
|
||
"description": "Scanner for the Log4j vulnerability dubbed Log4Shell (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T10:06:07Z",
|
||
"updated_at": "2021-12-17T10:40:07Z",
|
||
"pushed_at": "2021-12-17T10:40:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439295725,
|
||
"name": "log4shell-honeypot",
|
||
"full_name": "GroupePSA\/log4shell-honeypot",
|
||
"owner": {
|
||
"login": "GroupePSA",
|
||
"id": 22168041,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22168041?v=4",
|
||
"html_url": "https:\/\/github.com\/GroupePSA"
|
||
},
|
||
"html_url": "https:\/\/github.com\/GroupePSA\/log4shell-honeypot",
|
||
"description": "Java application vulnerable to the CVE-2021-44228 (a.k.a log4shell) vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T10:32:39Z",
|
||
"updated_at": "2021-12-17T10:54:42Z",
|
||
"pushed_at": "2021-12-17T10:51:33Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439296638,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "zane00\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "zane00",
|
||
"id": 54664755,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54664755?v=4",
|
||
"html_url": "https:\/\/github.com\/zane00"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zane00\/CVE-2021-44228",
|
||
"description": "Log4Shell (CVE-2021-44228): Descrizione, Exploitation e Mitigazione",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T10:36:16Z",
|
||
"updated_at": "2021-12-21T11:08:13Z",
|
||
"pushed_at": "2021-12-21T08:50:27Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"jndi-exploit",
|
||
"jndi-lookups",
|
||
"log4j2",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439330776,
|
||
"name": "log4j-quick-scan",
|
||
"full_name": "metodidavidovic\/log4j-quick-scan",
|
||
"owner": {
|
||
"login": "metodidavidovic",
|
||
"id": 75225635,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75225635?v=4",
|
||
"html_url": "https:\/\/github.com\/metodidavidovic"
|
||
},
|
||
"html_url": "https:\/\/github.com\/metodidavidovic\/log4j-quick-scan",
|
||
"description": "Scan your IP network and determine hosts with possible CVE-2021-44228 vulnerability in log4j library.",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T12:49:59Z",
|
||
"updated_at": "2021-12-21T14:51:50Z",
|
||
"pushed_at": "2021-12-21T14:51:47Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439385857,
|
||
"name": "log4shell-iocs",
|
||
"full_name": "WatchGuard-Threat-Lab\/log4shell-iocs",
|
||
"owner": {
|
||
"login": "WatchGuard-Threat-Lab",
|
||
"id": 31286181,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31286181?v=4",
|
||
"html_url": "https:\/\/github.com\/WatchGuard-Threat-Lab"
|
||
},
|
||
"html_url": "https:\/\/github.com\/WatchGuard-Threat-Lab\/log4shell-iocs",
|
||
"description": "A collection of IOCs for CVE-2021-44228 also known as Log4Shell",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T15:58:14Z",
|
||
"updated_at": "2021-12-17T15:59:33Z",
|
||
"pushed_at": "2021-12-17T15:58:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439393950,
|
||
"name": "log4j-patched",
|
||
"full_name": "Aschen\/log4j-patched",
|
||
"owner": {
|
||
"login": "Aschen",
|
||
"id": 4447392,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4447392?v=4",
|
||
"html_url": "https:\/\/github.com\/Aschen"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Aschen\/log4j-patched",
|
||
"description": "Provide patched version of Log4J against CVE-2021-44228 and CVE-2021-45046 as well as a script to manually patch it yourself",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T16:26:12Z",
|
||
"updated_at": "2021-12-19T18:29:10Z",
|
||
"pushed_at": "2021-12-17T18:41:35Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439409726,
|
||
"name": "cve-2021-44228",
|
||
"full_name": "Nikolas-Charalambidis\/cve-2021-44228",
|
||
"owner": {
|
||
"login": "Nikolas-Charalambidis",
|
||
"id": 21295587,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21295587?v=4",
|
||
"html_url": "https:\/\/github.com\/Nikolas-Charalambidis"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Nikolas-Charalambidis\/cve-2021-44228",
|
||
"description": "A simple simulation of the CVE-2021-44228 issue.",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T17:23:47Z",
|
||
"updated_at": "2021-12-25T23:11:34Z",
|
||
"pushed_at": "2021-12-18T13:45:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"java",
|
||
"java-11",
|
||
"log4j",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439420251,
|
||
"name": "detect-log4j-exploitable",
|
||
"full_name": "m0rath\/detect-log4j-exploitable",
|
||
"owner": {
|
||
"login": "m0rath",
|
||
"id": 17716312,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17716312?v=4",
|
||
"html_url": "https:\/\/github.com\/m0rath"
|
||
},
|
||
"html_url": "https:\/\/github.com\/m0rath\/detect-log4j-exploitable",
|
||
"description": "CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T18:03:50Z",
|
||
"updated_at": "2021-12-20T17:53:14Z",
|
||
"pushed_at": "2021-12-20T17:53:11Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439430099,
|
||
"name": "CVE-2021-44228-VULN-APP",
|
||
"full_name": "nu11secur1ty\/CVE-2021-44228-VULN-APP",
|
||
"owner": {
|
||
"login": "nu11secur1ty",
|
||
"id": 3677559,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3677559?v=4",
|
||
"html_url": "https:\/\/github.com\/nu11secur1ty"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nu11secur1ty\/CVE-2021-44228-VULN-APP",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-17T18:45:19Z",
|
||
"updated_at": "2021-12-17T18:52:36Z",
|
||
"pushed_at": "2021-12-17T18:52:34Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439444176,
|
||
"name": "log4j-docker",
|
||
"full_name": "ankur-katiyar\/log4j-docker",
|
||
"owner": {
|
||
"login": "ankur-katiyar",
|
||
"id": 7027426,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7027426?v=4",
|
||
"html_url": "https:\/\/github.com\/ankur-katiyar"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ankur-katiyar\/log4j-docker",
|
||
"description": "Docker images and k8s YAMLs for Log4j Vulnerability POC (Log4j (CVE-2021-44228 RCE Vulnerability)",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T19:50:40Z",
|
||
"updated_at": "2021-12-21T02:11:16Z",
|
||
"pushed_at": "2021-12-20T16:39:28Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439447817,
|
||
"name": "Log4j-JNDIServer",
|
||
"full_name": "immunityinc\/Log4j-JNDIServer",
|
||
"owner": {
|
||
"login": "immunityinc",
|
||
"id": 17729016,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17729016?v=4",
|
||
"html_url": "https:\/\/github.com\/immunityinc"
|
||
},
|
||
"html_url": "https:\/\/github.com\/immunityinc\/Log4j-JNDIServer",
|
||
"description": "This project will help to test the Log4j CVE-2021-44228 vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T20:07:12Z",
|
||
"updated_at": "2021-12-29T05:29:26Z",
|
||
"pushed_at": "2021-12-22T20:17:36Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439496578,
|
||
"name": "PowerShell-Log4J-Scanner",
|
||
"full_name": "DANSI\/PowerShell-Log4J-Scanner",
|
||
"owner": {
|
||
"login": "DANSI",
|
||
"id": 4057240,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4057240?v=4",
|
||
"html_url": "https:\/\/github.com\/DANSI"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DANSI\/PowerShell-Log4J-Scanner",
|
||
"description": "can find, analyse and patch Log4J files because of CVE-2021-44228, CVE-2021-45046",
|
||
"fork": false,
|
||
"created_at": "2021-12-18T00:51:46Z",
|
||
"updated_at": "2021-12-31T13:32:41Z",
|
||
"pushed_at": "2021-12-31T13:32:39Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439497466,
|
||
"name": "CVE-2021-44228-Apache-Log4j-Rce",
|
||
"full_name": "Pengfei-Lu\/CVE-2021-44228-Apache-Log4j-Rce",
|
||
"owner": {
|
||
"login": "Pengfei-Lu",
|
||
"id": 7485400,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7485400?v=4",
|
||
"html_url": "https:\/\/github.com\/Pengfei-Lu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Pengfei-Lu\/CVE-2021-44228-Apache-Log4j-Rce",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-18T00:58:32Z",
|
||
"updated_at": "2021-12-18T01:00:23Z",
|
||
"pushed_at": "2021-12-18T01:00:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439547156,
|
||
"name": "log4j_getshell",
|
||
"full_name": "shakeman8\/log4j_getshell",
|
||
"owner": {
|
||
"login": "shakeman8",
|
||
"id": 96327503,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96327503?v=4",
|
||
"html_url": "https:\/\/github.com\/shakeman8"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shakeman8\/log4j_getshell",
|
||
"description": "CVE-2021-44228 Getshell",
|
||
"fork": false,
|
||
"created_at": "2021-12-18T06:41:56Z",
|
||
"updated_at": "2021-12-18T07:11:32Z",
|
||
"pushed_at": "2021-12-18T07:11:29Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439595430,
|
||
"name": "scan-log4shell",
|
||
"full_name": "suniastar\/scan-log4shell",
|
||
"owner": {
|
||
"login": "suniastar",
|
||
"id": 19646660,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19646660?v=4",
|
||
"html_url": "https:\/\/github.com\/suniastar"
|
||
},
|
||
"html_url": "https:\/\/github.com\/suniastar\/scan-log4shell",
|
||
"description": "A scanning suite to find servers affected by the log4shell flaw (CVE-2021-44228) with example to test it",
|
||
"fork": false,
|
||
"created_at": "2021-12-18T11:16:06Z",
|
||
"updated_at": "2021-12-18T15:55:00Z",
|
||
"pushed_at": "2021-12-18T15:54:57Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439596852,
|
||
"name": "log4jvulnerability-CVE-2021-44228",
|
||
"full_name": "shivakumarjayaraman\/log4jvulnerability-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "shivakumarjayaraman",
|
||
"id": 63054448,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63054448?v=4",
|
||
"html_url": "https:\/\/github.com\/shivakumarjayaraman"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shivakumarjayaraman\/log4jvulnerability-CVE-2021-44228",
|
||
"description": "An attempt to understand the log4j vulnerability by looking through the code",
|
||
"fork": false,
|
||
"created_at": "2021-12-18T11:23:35Z",
|
||
"updated_at": "2021-12-18T15:32:08Z",
|
||
"pushed_at": "2021-12-18T15:32:06Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439612080,
|
||
"name": "CVE-2021-44228-PoC",
|
||
"full_name": "j3kz\/CVE-2021-44228-PoC",
|
||
"owner": {
|
||
"login": "j3kz",
|
||
"id": 6310563,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6310563?v=4",
|
||
"html_url": "https:\/\/github.com\/j3kz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/j3kz\/CVE-2021-44228-PoC",
|
||
"description": "Self-contained lab environment that runs the exploit safely, all from docker compose",
|
||
"fork": false,
|
||
"created_at": "2021-12-18T12:42:04Z",
|
||
"updated_at": "2021-12-18T14:08:28Z",
|
||
"pushed_at": "2021-12-18T14:08:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439658571,
|
||
"name": "log4j-pcap-activity",
|
||
"full_name": "Apipia\/log4j-pcap-activity",
|
||
"owner": {
|
||
"login": "Apipia",
|
||
"id": 17787069,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17787069?v=4",
|
||
"html_url": "https:\/\/github.com\/Apipia"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Apipia\/log4j-pcap-activity",
|
||
"description": "A fun activity using a packet capture file from the log4j exploit (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-18T16:09:49Z",
|
||
"updated_at": "2021-12-22T02:30:38Z",
|
||
"pushed_at": "2021-12-18T16:51:29Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439698618,
|
||
"name": "log4shell-docker-lab",
|
||
"full_name": "axelcurmi\/log4shell-docker-lab",
|
||
"owner": {
|
||
"login": "axelcurmi",
|
||
"id": 23001923,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23001923?v=4",
|
||
"html_url": "https:\/\/github.com\/axelcurmi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/axelcurmi\/log4shell-docker-lab",
|
||
"description": "Log4Shell (CVE-2021-44228) docker lab",
|
||
"fork": false,
|
||
"created_at": "2021-12-18T19:30:35Z",
|
||
"updated_at": "2022-01-05T14:55:14Z",
|
||
"pushed_at": "2021-12-24T10:28:47Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439712818,
|
||
"name": "log4j-2021-vulnerability-study",
|
||
"full_name": "otaviokr\/log4j-2021-vulnerability-study",
|
||
"owner": {
|
||
"login": "otaviokr",
|
||
"id": 3641421,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3641421?v=4",
|
||
"html_url": "https:\/\/github.com\/otaviokr"
|
||
},
|
||
"html_url": "https:\/\/github.com\/otaviokr\/log4j-2021-vulnerability-study",
|
||
"description": "This is a showcase how the Log4J vulnerability (CVE-2021-44228) could be explored. This code is safe to run, but understand what it does and how it works!",
|
||
"fork": false,
|
||
"created_at": "2021-12-18T20:53:06Z",
|
||
"updated_at": "2021-12-18T20:53:10Z",
|
||
"pushed_at": "2021-12-18T20:53:07Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439769164,
|
||
"name": "log4j_CVE-2021-44228",
|
||
"full_name": "kkyehit\/log4j_CVE-2021-44228",
|
||
"owner": {
|
||
"login": "kkyehit",
|
||
"id": 53825723,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53825723?v=4",
|
||
"html_url": "https:\/\/github.com\/kkyehit"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kkyehit\/log4j_CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-19T03:47:54Z",
|
||
"updated_at": "2021-12-19T03:54:50Z",
|
||
"pushed_at": "2021-12-19T03:54:47Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439771479,
|
||
"name": "inspec-log4j",
|
||
"full_name": "trickyearlobe\/inspec-log4j",
|
||
"owner": {
|
||
"login": "trickyearlobe",
|
||
"id": 3001322,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3001322?v=4",
|
||
"html_url": "https:\/\/github.com\/trickyearlobe"
|
||
},
|
||
"html_url": "https:\/\/github.com\/trickyearlobe\/inspec-log4j",
|
||
"description": "An Inspec profile to check for Log4j CVE-2021-44228 and CVE-2021-45046",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T04:04:57Z",
|
||
"updated_at": "2021-12-19T05:29:36Z",
|
||
"pushed_at": "2021-12-19T05:29:33Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439780948,
|
||
"name": "Log4J-Simulation-Tool",
|
||
"full_name": "TheInterception\/Log4J-Simulation-Tool",
|
||
"owner": {
|
||
"login": "TheInterception",
|
||
"id": 58417506,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58417506?v=4",
|
||
"html_url": "https:\/\/github.com\/TheInterception"
|
||
},
|
||
"html_url": "https:\/\/github.com\/TheInterception\/Log4J-Simulation-Tool",
|
||
"description": "Vulnerability analysis, patch management and exploitation tool forCVE-2021-44228 \/ CVE-2021-45046 \/ CVE-2021-4104",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T05:13:25Z",
|
||
"updated_at": "2021-12-28T09:48:27Z",
|
||
"pushed_at": "2021-12-25T01:51:35Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"attackvector",
|
||
"cyber-security",
|
||
"ethical-hacking",
|
||
"network-analysis",
|
||
"redteam"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439803220,
|
||
"name": "Get-log4j-Windows-local",
|
||
"full_name": "KeysAU\/Get-log4j-Windows-local",
|
||
"owner": {
|
||
"login": "KeysAU",
|
||
"id": 38932932,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38932932?v=4",
|
||
"html_url": "https:\/\/github.com\/KeysAU"
|
||
},
|
||
"html_url": "https:\/\/github.com\/KeysAU\/Get-log4j-Windows-local",
|
||
"description": "Identifying all log4j components across on local windows servers. CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T07:35:01Z",
|
||
"updated_at": "2021-12-22T18:50:17Z",
|
||
"pushed_at": "2021-12-19T08:09:11Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439839460,
|
||
"name": "Log4Shell-demo",
|
||
"full_name": "mschmnet\/Log4Shell-demo",
|
||
"owner": {
|
||
"login": "mschmnet",
|
||
"id": 11050119,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11050119?v=4",
|
||
"html_url": "https:\/\/github.com\/mschmnet"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mschmnet\/Log4Shell-demo",
|
||
"description": "Demo to show how Log4Shell \/ CVE-2021-44228 vulnerability works",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T10:57:16Z",
|
||
"updated_at": "2021-12-23T11:59:55Z",
|
||
"pushed_at": "2021-12-23T11:59:53Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439882882,
|
||
"name": "Log4j_scan_Advance",
|
||
"full_name": "Rk-000\/Log4j_scan_Advance",
|
||
"owner": {
|
||
"login": "Rk-000",
|
||
"id": 72359463,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72359463?v=4",
|
||
"html_url": "https:\/\/github.com\/Rk-000"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Rk-000\/Log4j_scan_Advance",
|
||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T14:20:54Z",
|
||
"updated_at": "2021-12-19T14:23:40Z",
|
||
"pushed_at": "2021-12-19T14:23:37Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439889436,
|
||
"name": "Log4jCenter",
|
||
"full_name": "puzzlepeaches\/Log4jCenter",
|
||
"owner": {
|
||
"login": "puzzlepeaches",
|
||
"id": 8538866,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
|
||
"html_url": "https:\/\/github.com\/puzzlepeaches"
|
||
},
|
||
"html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jCenter",
|
||
"description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T14:48:30Z",
|
||
"updated_at": "2022-01-08T15:30:01Z",
|
||
"pushed_at": "2021-12-22T15:56:21Z",
|
||
"stargazers_count": 55,
|
||
"watchers_count": 55,
|
||
"forks_count": 13,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 13,
|
||
"watchers": 55,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439931338,
|
||
"name": "log4shell-rmi-poc",
|
||
"full_name": "Labout\/log4shell-rmi-poc",
|
||
"owner": {
|
||
"login": "Labout",
|
||
"id": 28622593,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28622593?v=4",
|
||
"html_url": "https:\/\/github.com\/Labout"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Labout\/log4shell-rmi-poc",
|
||
"description": "A Proof of Concept of the Log4j vulnerabilities (CVE-2021-44228) over Java-RMI",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T17:53:31Z",
|
||
"updated_at": "2022-01-13T17:16:39Z",
|
||
"pushed_at": "2021-12-19T22:09:40Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439952044,
|
||
"name": "Log4Me",
|
||
"full_name": "djungeldan\/Log4Me",
|
||
"owner": {
|
||
"login": "djungeldan",
|
||
"id": 79529185,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79529185?v=4",
|
||
"html_url": "https:\/\/github.com\/djungeldan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/djungeldan\/Log4Me",
|
||
"description": "A tool to automatically obtain a shell using CVE-2021-44228. EDUCATIONAL AND TESTING PURPOSES ONLY. UNAUTHORISED USE OF THIS PROGRAM CAN RESULT IN PROCECUTION. ",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T19:37:48Z",
|
||
"updated_at": "2021-12-22T15:04:11Z",
|
||
"pushed_at": "2021-12-22T14:15:50Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439973473,
|
||
"name": "l4shunter",
|
||
"full_name": "sudo6\/l4shunter",
|
||
"owner": {
|
||
"login": "sudo6",
|
||
"id": 96394781,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96394781?v=4",
|
||
"html_url": "https:\/\/github.com\/sudo6"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sudo6\/l4shunter",
|
||
"description": "L4Shunter - Log4Shell Hunter - Remote scanner for CVE-2021-44228 or CVE-2021-45046",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T21:39:28Z",
|
||
"updated_at": "2021-12-19T23:01:02Z",
|
||
"pushed_at": "2021-12-19T22:50:07Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440009725,
|
||
"name": "f-for-java",
|
||
"full_name": "ArkAngeL43\/f-for-java",
|
||
"owner": {
|
||
"login": "ArkAngeL43",
|
||
"id": 87203697,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87203697?v=4",
|
||
"html_url": "https:\/\/github.com\/ArkAngeL43"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ArkAngeL43\/f-for-java",
|
||
"description": "a project written in go and java i abandoned for CVE-2021-44228 try to fix it if you can XD",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T01:31:06Z",
|
||
"updated_at": "2021-12-24T18:06:45Z",
|
||
"pushed_at": "2021-12-24T18:06:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440029288,
|
||
"name": "log4j2-exploit",
|
||
"full_name": "spasam\/log4j2-exploit",
|
||
"owner": {
|
||
"login": "spasam",
|
||
"id": 438507,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/438507?v=4",
|
||
"html_url": "https:\/\/github.com\/spasam"
|
||
},
|
||
"html_url": "https:\/\/github.com\/spasam\/log4j2-exploit",
|
||
"description": "log4j2 Log4Shell CVE-2021-44228 proof of concept",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T03:16:01Z",
|
||
"updated_at": "2021-12-21T18:32:07Z",
|
||
"pushed_at": "2021-12-20T03:19:10Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"log4j2",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440140065,
|
||
"name": "cve-2021-44228-log4j-test",
|
||
"full_name": "bumheehan\/cve-2021-44228-log4j-test",
|
||
"owner": {
|
||
"login": "bumheehan",
|
||
"id": 15325225,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15325225?v=4",
|
||
"html_url": "https:\/\/github.com\/bumheehan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bumheehan\/cve-2021-44228-log4j-test",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-20T11:07:21Z",
|
||
"updated_at": "2021-12-22T04:27:08Z",
|
||
"pushed_at": "2021-12-22T04:27:05Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440154999,
|
||
"name": "log4j-dork-scanner",
|
||
"full_name": "JagarYousef\/log4j-dork-scanner",
|
||
"owner": {
|
||
"login": "JagarYousef",
|
||
"id": 41321155,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41321155?v=4",
|
||
"html_url": "https:\/\/github.com\/JagarYousef"
|
||
},
|
||
"html_url": "https:\/\/github.com\/JagarYousef\/log4j-dork-scanner",
|
||
"description": "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T12:01:52Z",
|
||
"updated_at": "2021-12-21T00:45:15Z",
|
||
"pushed_at": "2021-12-20T12:03:48Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"dork-scanner",
|
||
"log4j",
|
||
"python-script",
|
||
"scanner"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440177006,
|
||
"name": "log4shell-war-fixer",
|
||
"full_name": "dmitsuo\/log4shell-war-fixer",
|
||
"owner": {
|
||
"login": "dmitsuo",
|
||
"id": 1348764,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1348764?v=4",
|
||
"html_url": "https:\/\/github.com\/dmitsuo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dmitsuo\/log4shell-war-fixer",
|
||
"description": "Shell script to remove JndiLookup class from Log4J 2 jar file, inside WAR file, in order to mitigate CVE-2021-44228, a.k.a., #Log4Shell",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T13:18:57Z",
|
||
"updated_at": "2021-12-20T19:21:49Z",
|
||
"pushed_at": "2021-12-20T16:04:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440183835,
|
||
"name": "Log4jShell-Scan",
|
||
"full_name": "Y0-kan\/Log4jShell-Scan",
|
||
"owner": {
|
||
"login": "Y0-kan",
|
||
"id": 96424613,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96424613?v=4",
|
||
"html_url": "https:\/\/github.com\/Y0-kan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Y0-kan\/Log4jShell-Scan",
|
||
"description": "log4j2 RCE漏洞(CVE-2021-44228)内网扫描器,可用于在不出网的条件下进行漏洞扫描,帮助企业内部快速发现Log4jShell漏洞。",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T13:41:35Z",
|
||
"updated_at": "2022-01-12T14:48:27Z",
|
||
"pushed_at": "2021-12-21T06:11:58Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440216413,
|
||
"name": "Log4j-Scanner-Exploit",
|
||
"full_name": "julian911015\/Log4j-Scanner-Exploit",
|
||
"owner": {
|
||
"login": "julian911015",
|
||
"id": 26369589,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26369589?v=4",
|
||
"html_url": "https:\/\/github.com\/julian911015"
|
||
},
|
||
"html_url": "https:\/\/github.com\/julian911015\/Log4j-Scanner-Exploit",
|
||
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T15:22:50Z",
|
||
"updated_at": "2021-12-21T17:37:29Z",
|
||
"pushed_at": "2021-12-21T17:37:26Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440220972,
|
||
"name": "CVE-2021-44228---detection-with-PowerShell",
|
||
"full_name": "intel-xeon\/CVE-2021-44228---detection-with-PowerShell",
|
||
"owner": {
|
||
"login": "intel-xeon",
|
||
"id": 37773731,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37773731?v=4",
|
||
"html_url": "https:\/\/github.com\/intel-xeon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/intel-xeon\/CVE-2021-44228---detection-with-PowerShell",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-20T15:38:07Z",
|
||
"updated_at": "2021-12-23T13:23:27Z",
|
||
"pushed_at": "2021-12-23T13:23:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440221338,
|
||
"name": "log4j-fix-CVE-2021-44228",
|
||
"full_name": "chandru-gunasekaran\/log4j-fix-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "chandru-gunasekaran",
|
||
"id": 87476739,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87476739?v=4",
|
||
"html_url": "https:\/\/github.com\/chandru-gunasekaran"
|
||
},
|
||
"html_url": "https:\/\/github.com\/chandru-gunasekaran\/log4j-fix-CVE-2021-44228",
|
||
"description": "Windows Batch Scrip to Fix the log4j-issue-CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T15:39:20Z",
|
||
"updated_at": "2021-12-23T09:20:09Z",
|
||
"pushed_at": "2021-12-23T09:19:36Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440261792,
|
||
"name": "TekiumLog4jApp",
|
||
"full_name": "erickrr-bd\/TekiumLog4jApp",
|
||
"owner": {
|
||
"login": "erickrr-bd",
|
||
"id": 77643346,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77643346?v=4",
|
||
"html_url": "https:\/\/github.com\/erickrr-bd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/erickrr-bd\/TekiumLog4jApp",
|
||
"description": "Application vulnerable to CVE-2021-44228.",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T17:59:56Z",
|
||
"updated_at": "2021-12-21T22:18:29Z",
|
||
"pushed_at": "2021-12-21T22:48:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"app",
|
||
"cve-2021-44228",
|
||
"docker",
|
||
"exploitation",
|
||
"java",
|
||
"jndi",
|
||
"log4j2",
|
||
"security",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440275278,
|
||
"name": "damn-vulnerable-log4j-app",
|
||
"full_name": "snapattack\/damn-vulnerable-log4j-app",
|
||
"owner": {
|
||
"login": "snapattack",
|
||
"id": 92945688,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92945688?v=4",
|
||
"html_url": "https:\/\/github.com\/snapattack"
|
||
},
|
||
"html_url": "https:\/\/github.com\/snapattack\/damn-vulnerable-log4j-app",
|
||
"description": "Vulnerable web application to test CVE-2021-44228 \/ log4shell and forensic artifacts from an example attack",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T18:51:52Z",
|
||
"updated_at": "2021-12-27T14:07:36Z",
|
||
"pushed_at": "2021-12-20T18:55:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440373235,
|
||
"name": "loguccino",
|
||
"full_name": "sassoftware\/loguccino",
|
||
"owner": {
|
||
"login": "sassoftware",
|
||
"id": 5289877,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5289877?v=4",
|
||
"html_url": "https:\/\/github.com\/sassoftware"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sassoftware\/loguccino",
|
||
"description": "Scan and patch tool for CVE-2021-44228 and related log4j concerns. ",
|
||
"fork": false,
|
||
"created_at": "2021-12-21T03:01:36Z",
|
||
"updated_at": "2022-01-12T20:24:27Z",
|
||
"pushed_at": "2022-01-13T04:32:55Z",
|
||
"stargazers_count": 29,
|
||
"watchers_count": 29,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 29,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440408111,
|
||
"name": "apache-log4j2-CVE-2021-44228",
|
||
"full_name": "xx-zhang\/apache-log4j2-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "xx-zhang",
|
||
"id": 47806549,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47806549?v=4",
|
||
"html_url": "https:\/\/github.com\/xx-zhang"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xx-zhang\/apache-log4j2-CVE-2021-44228",
|
||
"description": "相关的复现和文档",
|
||
"fork": false,
|
||
"created_at": "2021-12-21T06:03:18Z",
|
||
"updated_at": "2021-12-21T06:03:18Z",
|
||
"pushed_at": "2021-12-21T06:03:18Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440439859,
|
||
"name": "Log4Shell-Scanner",
|
||
"full_name": "r00thunter\/Log4Shell-Scanner",
|
||
"owner": {
|
||
"login": "r00thunter",
|
||
"id": 33806985,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33806985?v=4",
|
||
"html_url": "https:\/\/github.com\/r00thunter"
|
||
},
|
||
"html_url": "https:\/\/github.com\/r00thunter\/Log4Shell-Scanner",
|
||
"description": "Python script to detect Log4Shell Vulnerability CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-21T08:13:35Z",
|
||
"updated_at": "2021-12-21T08:15:05Z",
|
||
"pushed_at": "2021-12-21T08:15:02Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440555354,
|
||
"name": "log4j-spring-vuln-poc",
|
||
"full_name": "mn-io\/log4j-spring-vuln-poc",
|
||
"owner": {
|
||
"login": "mn-io",
|
||
"id": 4397504,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4397504?v=4",
|
||
"html_url": "https:\/\/github.com\/mn-io"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mn-io\/log4j-spring-vuln-poc",
|
||
"description": "POC for CVE-2021-44228 within Springboot",
|
||
"fork": false,
|
||
"created_at": "2021-12-21T15:00:58Z",
|
||
"updated_at": "2021-12-22T08:58:25Z",
|
||
"pushed_at": "2021-12-22T08:58:22Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440601926,
|
||
"name": "log4j2-hack-springboot",
|
||
"full_name": "rejupillai\/log4j2-hack-springboot",
|
||
"owner": {
|
||
"login": "rejupillai",
|
||
"id": 15153045,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15153045?v=4",
|
||
"html_url": "https:\/\/github.com\/rejupillai"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rejupillai\/log4j2-hack-springboot",
|
||
"description": "Log4j2 CVE-2021-44228 hack demo for a springboot app",
|
||
"fork": false,
|
||
"created_at": "2021-12-21T17:40:02Z",
|
||
"updated_at": "2021-12-21T19:26:23Z",
|
||
"pushed_at": "2021-12-21T19:26:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440663893,
|
||
"name": "log4j-cve-2021-44228",
|
||
"full_name": "lucab85\/log4j-cve-2021-44228",
|
||
"owner": {
|
||
"login": "lucab85",
|
||
"id": 24267107,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24267107?v=4",
|
||
"html_url": "https:\/\/github.com\/lucab85"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lucab85\/log4j-cve-2021-44228",
|
||
"description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2021-12-21T22:14:24Z",
|
||
"updated_at": "2022-01-11T08:11:37Z",
|
||
"pushed_at": "2022-01-10T19:13:04Z",
|
||
"stargazers_count": 58,
|
||
"watchers_count": 58,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"ansible",
|
||
"cve-2021-44228",
|
||
"devsecops",
|
||
"log4j",
|
||
"log4shell",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 58,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440722343,
|
||
"name": "Log4Shell-CVE-2021-44228-Demo",
|
||
"full_name": "BabooPan\/Log4Shell-CVE-2021-44228-Demo",
|
||
"owner": {
|
||
"login": "BabooPan",
|
||
"id": 16317991,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16317991?v=4",
|
||
"html_url": "https:\/\/github.com\/BabooPan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BabooPan\/Log4Shell-CVE-2021-44228-Demo",
|
||
"description": "Log4Shell Demo with AWS",
|
||
"fork": false,
|
||
"created_at": "2021-12-22T03:34:40Z",
|
||
"updated_at": "2021-12-24T08:56:47Z",
|
||
"pushed_at": "2021-12-24T08:56:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440741105,
|
||
"name": "CVE-2021-44228---Log4J",
|
||
"full_name": "NitinGavhane\/CVE-2021-44228---Log4J",
|
||
"owner": {
|
||
"login": "NitinGavhane",
|
||
"id": 51412436,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51412436?v=4",
|
||
"html_url": "https:\/\/github.com\/NitinGavhane"
|
||
},
|
||
"html_url": "https:\/\/github.com\/NitinGavhane\/CVE-2021-44228---Log4J",
|
||
"description": "CVE-2021-44228 - Log4J Start To End Guide Book",
|
||
"fork": false,
|
||
"created_at": "2021-12-22T05:16:59Z",
|
||
"updated_at": "2021-12-22T05:17:02Z",
|
||
"pushed_at": "2021-12-22T05:16:59Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440788757,
|
||
"name": "log4shell_sentinel",
|
||
"full_name": "ossie-git\/log4shell_sentinel",
|
||
"owner": {
|
||
"login": "ossie-git",
|
||
"id": 25382296,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25382296?v=4",
|
||
"html_url": "https:\/\/github.com\/ossie-git"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ossie-git\/log4shell_sentinel",
|
||
"description": "A Smart Log4Shell\/Log4j\/CVE-2021-44228 Scanner",
|
||
"fork": false,
|
||
"created_at": "2021-12-22T08:35:04Z",
|
||
"updated_at": "2021-12-31T09:22:33Z",
|
||
"pushed_at": "2021-12-22T08:40:58Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 12,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440799948,
|
||
"name": "Log4Shell",
|
||
"full_name": "r00thunter\/Log4Shell",
|
||
"owner": {
|
||
"login": "r00thunter",
|
||
"id": 33806985,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33806985?v=4",
|
||
"html_url": "https:\/\/github.com\/r00thunter"
|
||
},
|
||
"html_url": "https:\/\/github.com\/r00thunter\/Log4Shell",
|
||
"description": "Generic Scanner for Apache log4j RCE CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-22T09:15:47Z",
|
||
"updated_at": "2021-12-31T09:52:16Z",
|
||
"pushed_at": "2021-12-22T09:19:15Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440816228,
|
||
"name": "cve-2021-44228-fix-jars",
|
||
"full_name": "asyzdykov\/cve-2021-44228-fix-jars",
|
||
"owner": {
|
||
"login": "asyzdykov",
|
||
"id": 1106604,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1106604?v=4",
|
||
"html_url": "https:\/\/github.com\/asyzdykov"
|
||
},
|
||
"html_url": "https:\/\/github.com\/asyzdykov\/cve-2021-44228-fix-jars",
|
||
"description": "CVE-2021-44228-FIX-JARS",
|
||
"fork": false,
|
||
"created_at": "2021-12-22T10:16:22Z",
|
||
"updated_at": "2021-12-23T09:04:57Z",
|
||
"pushed_at": "2021-12-23T09:04:54Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440898542,
|
||
"name": "Log4JPOC",
|
||
"full_name": "NatteeSetobol\/Log4JPOC",
|
||
"owner": {
|
||
"login": "NatteeSetobol",
|
||
"id": 6789925,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6789925?v=4",
|
||
"html_url": "https:\/\/github.com\/NatteeSetobol"
|
||
},
|
||
"html_url": "https:\/\/github.com\/NatteeSetobol\/Log4JPOC",
|
||
"description": "POC for CVE-2021-44228 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-22T15:15:12Z",
|
||
"updated_at": "2021-12-24T10:15:11Z",
|
||
"pushed_at": "2021-12-24T10:14:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440932687,
|
||
"name": "log4j-scanner",
|
||
"full_name": "BJLIYANLIANG\/log4j-scanner",
|
||
"owner": {
|
||
"login": "BJLIYANLIANG",
|
||
"id": 34064679,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34064679?v=4",
|
||
"html_url": "https:\/\/github.com\/BJLIYANLIANG"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BJLIYANLIANG\/log4j-scanner",
|
||
"description": "Log4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS",
|
||
"fork": false,
|
||
"created_at": "2021-12-22T17:17:59Z",
|
||
"updated_at": "2021-12-24T00:57:34Z",
|
||
"pushed_at": "2021-12-19T01:59:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441001904,
|
||
"name": "Apache-Log4j-POC",
|
||
"full_name": "0x3SC4L4T3\/Apache-Log4j-POC",
|
||
"owner": {
|
||
"login": "0x3SC4L4T3",
|
||
"id": 61085462,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61085462?v=4",
|
||
"html_url": "https:\/\/github.com\/0x3SC4L4T3"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0x3SC4L4T3\/Apache-Log4j-POC",
|
||
"description": "Proof of Concept of apache log4j LDAP lookup vulnerability. CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-22T22:44:07Z",
|
||
"updated_at": "2021-12-31T09:52:50Z",
|
||
"pushed_at": "2021-12-22T22:51:12Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441034050,
|
||
"name": "CVE-2021-44228-log4jVulnScanner-metasploit",
|
||
"full_name": "TaroballzChen\/CVE-2021-44228-log4jVulnScanner-metasploit",
|
||
"owner": {
|
||
"login": "TaroballzChen",
|
||
"id": 27862593,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
|
||
"html_url": "https:\/\/github.com\/TaroballzChen"
|
||
},
|
||
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-44228-log4jVulnScanner-metasploit",
|
||
"description": "open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-23T01:59:03Z",
|
||
"updated_at": "2021-12-31T09:53:03Z",
|
||
"pushed_at": "2021-12-23T07:40:13Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441048904,
|
||
"name": "CVE-2021-44228-poc",
|
||
"full_name": "c4dr01d\/CVE-2021-44228-poc",
|
||
"owner": {
|
||
"login": "c4dr01d",
|
||
"id": 50952350,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50952350?v=4",
|
||
"html_url": "https:\/\/github.com\/c4dr01d"
|
||
},
|
||
"html_url": "https:\/\/github.com\/c4dr01d\/CVE-2021-44228-poc",
|
||
"description": "Apache log4j2 CVE-20210-44228 poc",
|
||
"fork": false,
|
||
"created_at": "2021-12-23T03:18:26Z",
|
||
"updated_at": "2022-01-10T04:54:42Z",
|
||
"pushed_at": "2021-12-23T03:19:11Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441188076,
|
||
"name": "ansible-role-log4shell",
|
||
"full_name": "lucab85\/ansible-role-log4shell",
|
||
"owner": {
|
||
"login": "lucab85",
|
||
"id": 24267107,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24267107?v=4",
|
||
"html_url": "https:\/\/github.com\/lucab85"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lucab85\/ansible-role-log4shell",
|
||
"description": "Ansible playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 for Log4Shell (CVE-2021-44228).",
|
||
"fork": false,
|
||
"created_at": "2021-12-23T13:24:41Z",
|
||
"updated_at": "2022-01-10T13:03:24Z",
|
||
"pushed_at": "2022-01-10T22:21:34Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"devsecops",
|
||
"log4j",
|
||
"log4shell",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441346163,
|
||
"name": "log4j-scan",
|
||
"full_name": "ainrm\/log4j-scan",
|
||
"owner": {
|
||
"login": "ainrm",
|
||
"id": 26603728,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26603728?v=4",
|
||
"html_url": "https:\/\/github.com\/ainrm"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ainrm\/log4j-scan",
|
||
"description": "CVE-2021-44228 检查工具",
|
||
"fork": false,
|
||
"created_at": "2021-12-24T02:31:47Z",
|
||
"updated_at": "2022-01-13T06:33:39Z",
|
||
"pushed_at": "2021-12-24T02:39:06Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441364313,
|
||
"name": "log4j-CVE-2021-44228-workaround",
|
||
"full_name": "grimch\/log4j-CVE-2021-44228-workaround",
|
||
"owner": {
|
||
"login": "grimch",
|
||
"id": 58831200,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58831200?v=4",
|
||
"html_url": "https:\/\/github.com\/grimch"
|
||
},
|
||
"html_url": "https:\/\/github.com\/grimch\/log4j-CVE-2021-44228-workaround",
|
||
"description": "general purpose workaround for the log4j CVE-2021-44228 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-24T04:23:17Z",
|
||
"updated_at": "2021-12-24T13:35:26Z",
|
||
"pushed_at": "2021-12-24T13:35:23Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441423344,
|
||
"name": "log4j-shell-csw",
|
||
"full_name": "cybersecurityworks553\/log4j-shell-csw",
|
||
"owner": {
|
||
"login": "cybersecurityworks553",
|
||
"id": 63910792,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
|
||
"html_url": "https:\/\/github.com\/cybersecurityworks553"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cybersecurityworks553\/log4j-shell-csw",
|
||
"description": "A Proof-Of-Concept Exploit for CVE-2021-44228 vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2021-12-24T09:26:38Z",
|
||
"updated_at": "2021-12-27T13:54:12Z",
|
||
"pushed_at": "2021-12-24T10:16:10Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441470836,
|
||
"name": "Log4jUnifi",
|
||
"full_name": "puzzlepeaches\/Log4jUnifi",
|
||
"owner": {
|
||
"login": "puzzlepeaches",
|
||
"id": 8538866,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
|
||
"html_url": "https:\/\/github.com\/puzzlepeaches"
|
||
},
|
||
"html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jUnifi",
|
||
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
|
||
"fork": false,
|
||
"created_at": "2021-12-24T13:18:49Z",
|
||
"updated_at": "2022-01-04T08:34:29Z",
|
||
"pushed_at": "2021-12-29T12:56:57Z",
|
||
"stargazers_count": 22,
|
||
"watchers_count": 22,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 22,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441536293,
|
||
"name": "apache-tomcat-log4j",
|
||
"full_name": "many-fac3d-g0d\/apache-tomcat-log4j",
|
||
"owner": {
|
||
"login": "many-fac3d-g0d",
|
||
"id": 54078651,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54078651?v=4",
|
||
"html_url": "https:\/\/github.com\/many-fac3d-g0d"
|
||
},
|
||
"html_url": "https:\/\/github.com\/many-fac3d-g0d\/apache-tomcat-log4j",
|
||
"description": "Log4j2 CVE-2021-44228 Vulnerability POC in Apache Tomcat",
|
||
"fork": false,
|
||
"created_at": "2021-12-24T18:54:46Z",
|
||
"updated_at": "2022-01-12T19:02:25Z",
|
||
"pushed_at": "2021-12-24T18:57:32Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441540913,
|
||
"name": "Log4Shell_PoC",
|
||
"full_name": "CrashOverflow\/Log4Shell_PoC",
|
||
"owner": {
|
||
"login": "CrashOverflow",
|
||
"id": 22402683,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22402683?v=4",
|
||
"html_url": "https:\/\/github.com\/CrashOverflow"
|
||
},
|
||
"html_url": "https:\/\/github.com\/CrashOverflow\/Log4Shell_PoC",
|
||
"description": "A simple exploitation guide for CVE-2021-44228.",
|
||
"fork": false,
|
||
"created_at": "2021-12-24T19:26:36Z",
|
||
"updated_at": "2021-12-25T23:03:58Z",
|
||
"pushed_at": "2021-12-25T11:26:49Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441545718,
|
||
"name": "log4shell-vulnerable-app",
|
||
"full_name": "bsigouin\/log4shell-vulnerable-app",
|
||
"owner": {
|
||
"login": "bsigouin",
|
||
"id": 48130586,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48130586?v=4",
|
||
"html_url": "https:\/\/github.com\/bsigouin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bsigouin\/log4shell-vulnerable-app",
|
||
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
|
||
"fork": false,
|
||
"created_at": "2021-12-24T20:00:12Z",
|
||
"updated_at": "2022-01-06T13:31:29Z",
|
||
"pushed_at": "2022-01-06T13:31:52Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 441678815,
|
||
"name": "XSYS-Log4J2Shell-Ex",
|
||
"full_name": "ToxicEnvelope\/XSYS-Log4J2Shell-Ex",
|
||
"owner": {
|
||
"login": "ToxicEnvelope",
|
||
"id": 23465872,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23465872?v=4",
|
||
"html_url": "https:\/\/github.com\/ToxicEnvelope"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ToxicEnvelope\/XSYS-Log4J2Shell-Ex",
|
||
"description": "this repository contains a POC of CVE-2021-44228 (log4j2shell) as part of a security research",
|
||
"fork": false,
|
||
"created_at": "2021-12-25T12:53:13Z",
|
||
"updated_at": "2021-12-27T20:08:44Z",
|
||
"pushed_at": "2021-12-27T20:08:41Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442071358,
|
||
"name": "Log4j_Attacker_IPList",
|
||
"full_name": "ceyhuncamli\/Log4j_Attacker_IPList",
|
||
"owner": {
|
||
"login": "ceyhuncamli",
|
||
"id": 57198926,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57198926?v=4",
|
||
"html_url": "https:\/\/github.com\/ceyhuncamli"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ceyhuncamli\/Log4j_Attacker_IPList",
|
||
"description": "CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-27T06:29:12Z",
|
||
"updated_at": "2021-12-27T06:34:21Z",
|
||
"pushed_at": "2021-12-27T06:34:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442073643,
|
||
"name": "log4j-vulnerability",
|
||
"full_name": "mazhar-hassan\/log4j-vulnerability",
|
||
"owner": {
|
||
"login": "mazhar-hassan",
|
||
"id": 32394814,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32394814?v=4",
|
||
"html_url": "https:\/\/github.com\/mazhar-hassan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mazhar-hassan\/log4j-vulnerability",
|
||
"description": "Log4Shell (CVE-2021-44228) is a zero-day vulnerability in Log4j",
|
||
"fork": false,
|
||
"created_at": "2021-12-27T06:39:40Z",
|
||
"updated_at": "2021-12-27T09:33:39Z",
|
||
"pushed_at": "2021-12-27T09:33:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442118241,
|
||
"name": "VTI-IOCs-CVE-2021-44228",
|
||
"full_name": "cungts\/VTI-IOCs-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "cungts",
|
||
"id": 78672731,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78672731?v=4",
|
||
"html_url": "https:\/\/github.com\/cungts"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cungts\/VTI-IOCs-CVE-2021-44228",
|
||
"description": "IOCs for CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-27T09:51:13Z",
|
||
"updated_at": "2021-12-27T09:51:13Z",
|
||
"pushed_at": "2021-12-27T09:51:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442217104,
|
||
"name": "l4s_poc",
|
||
"full_name": "s-retlaw\/l4s_poc",
|
||
"owner": {
|
||
"login": "s-retlaw",
|
||
"id": 73955369,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4",
|
||
"html_url": "https:\/\/github.com\/s-retlaw"
|
||
},
|
||
"html_url": "https:\/\/github.com\/s-retlaw\/l4s_poc",
|
||
"description": "Log4Shell (Cve-2021-44228) Proof Of Concept",
|
||
"fork": false,
|
||
"created_at": "2021-12-27T16:45:58Z",
|
||
"updated_at": "2022-01-04T14:50:09Z",
|
||
"pushed_at": "2022-01-04T14:50:07Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442222189,
|
||
"name": "CVE-2021-44228-Apache-Log4j-Rce-main",
|
||
"full_name": "Ravid-CheckMarx\/CVE-2021-44228-Apache-Log4j-Rce-main",
|
||
"owner": {
|
||
"login": "Ravid-CheckMarx",
|
||
"id": 84515813,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84515813?v=4",
|
||
"html_url": "https:\/\/github.com\/Ravid-CheckMarx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Ravid-CheckMarx\/CVE-2021-44228-Apache-Log4j-Rce-main",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-27T17:06:26Z",
|
||
"updated_at": "2021-12-28T08:39:10Z",
|
||
"pushed_at": "2021-12-27T17:06:29Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442235397,
|
||
"name": "log4j-payload-generator",
|
||
"full_name": "yesspider-hacker\/log4j-payload-generator",
|
||
"owner": {
|
||
"login": "yesspider-hacker",
|
||
"id": 76931387,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76931387?v=4",
|
||
"html_url": "https:\/\/github.com\/yesspider-hacker"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yesspider-hacker\/log4j-payload-generator",
|
||
"description": "log4j-paylaod generator : A generic payload generator for Apache log4j RCE CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-27T18:02:15Z",
|
||
"updated_at": "2021-12-27T18:38:13Z",
|
||
"pushed_at": "2021-12-27T18:38:10Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442255773,
|
||
"name": "log4shell_scanner",
|
||
"full_name": "LinkMJB\/log4shell_scanner",
|
||
"owner": {
|
||
"login": "LinkMJB",
|
||
"id": 8824103,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8824103?v=4",
|
||
"html_url": "https:\/\/github.com\/LinkMJB"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LinkMJB\/log4shell_scanner",
|
||
"description": "Quick and dirty scanner, hitting common ports looking for Log4Shell (CVE-2021-44228) vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-27T19:36:29Z",
|
||
"updated_at": "2021-12-27T19:40:45Z",
|
||
"pushed_at": "2021-12-27T19:40:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442473099,
|
||
"name": "RS4LOGJ-CVE-2021-44228",
|
||
"full_name": "tslenter\/RS4LOGJ-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "tslenter",
|
||
"id": 26123061,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26123061?v=4",
|
||
"html_url": "https:\/\/github.com\/tslenter"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tslenter\/RS4LOGJ-CVE-2021-44228",
|
||
"description": "Fix: CVE-2021-44228 4LOGJ",
|
||
"fork": false,
|
||
"created_at": "2021-12-28T13:32:16Z",
|
||
"updated_at": "2021-12-28T13:50:33Z",
|
||
"pushed_at": "2021-12-28T13:50:30Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442846791,
|
||
"name": "log4j-exploit-builder",
|
||
"full_name": "a5tra\/log4j-exploit-builder",
|
||
"owner": {
|
||
"login": "a5tra",
|
||
"id": 91462415,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91462415?v=4",
|
||
"html_url": "https:\/\/github.com\/a5tra"
|
||
},
|
||
"html_url": "https:\/\/github.com\/a5tra\/log4j-exploit-builder",
|
||
"description": "Script to create a log4j (CVE-2021-44228) exploit with support for different methods of getting a reverse shell",
|
||
"fork": false,
|
||
"created_at": "2021-12-29T17:41:48Z",
|
||
"updated_at": "2021-12-30T11:48:11Z",
|
||
"pushed_at": "2021-12-29T18:34:45Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"bash",
|
||
"java",
|
||
"log4j",
|
||
"security-vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 443163405,
|
||
"name": "log4j-vulnerability",
|
||
"full_name": "MarceloLeite2604\/log4j-vulnerability",
|
||
"owner": {
|
||
"login": "MarceloLeite2604",
|
||
"id": 13152452,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13152452?v=4",
|
||
"html_url": "https:\/\/github.com\/MarceloLeite2604"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MarceloLeite2604\/log4j-vulnerability",
|
||
"description": "Presents how to exploit CVE-2021-44228 vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2021-12-30T19:10:21Z",
|
||
"updated_at": "2022-01-03T17:14:53Z",
|
||
"pushed_at": "2022-01-03T17:14:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 443422203,
|
||
"name": "log4shell-vulnerable-app",
|
||
"full_name": "romanutti\/log4shell-vulnerable-app",
|
||
"owner": {
|
||
"login": "romanutti",
|
||
"id": 36601005,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36601005?v=4",
|
||
"html_url": "https:\/\/github.com\/romanutti"
|
||
},
|
||
"html_url": "https:\/\/github.com\/romanutti\/log4shell-vulnerable-app",
|
||
"description": "This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as log4shell.",
|
||
"fork": false,
|
||
"created_at": "2021-12-31T20:39:44Z",
|
||
"updated_at": "2022-01-01T10:57:33Z",
|
||
"pushed_at": "2022-01-01T10:57:30Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 443563564,
|
||
"name": "-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
|
||
"full_name": "marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
|
||
"owner": {
|
||
"login": "marklindsey11",
|
||
"id": 81498475,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
|
||
"html_url": "https:\/\/github.com\/marklindsey11"
|
||
},
|
||
"html_url": "https:\/\/github.com\/marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
|
||
"description": "Log4j Vulnerability Scanner",
|
||
"fork": false,
|
||
"created_at": "2022-01-01T15:13:22Z",
|
||
"updated_at": "2022-01-01T19:44:27Z",
|
||
"pushed_at": "2022-01-01T15:31:15Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": true,
|
||
"topics": [
|
||
"hunting",
|
||
"threat"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 443614046,
|
||
"name": "gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
|
||
"full_name": "marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
|
||
"owner": {
|
||
"login": "marklindsey11",
|
||
"id": 81498475,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
|
||
"html_url": "https:\/\/github.com\/marklindsey11"
|
||
},
|
||
"html_url": "https:\/\/github.com\/marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
|
||
"description": "Log4j-Scanner",
|
||
"fork": false,
|
||
"created_at": "2022-01-01T20:01:01Z",
|
||
"updated_at": "2022-01-01T20:01:06Z",
|
||
"pushed_at": "2022-01-01T20:01:03Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 443628359,
|
||
"name": "CVE-2021-44228-github-repository",
|
||
"full_name": "sdogancesur\/CVE-2021-44228-github-repository",
|
||
"owner": {
|
||
"login": "sdogancesur",
|
||
"id": 34608448,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34608448?v=4",
|
||
"html_url": "https:\/\/github.com\/sdogancesur"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sdogancesur\/CVE-2021-44228-github-repository",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-01-01T21:36:40Z",
|
||
"updated_at": "2022-01-01T21:36:40Z",
|
||
"pushed_at": "2022-01-01T21:36:40Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 443941194,
|
||
"name": "log4j2-test",
|
||
"full_name": "mklinkj\/log4j2-test",
|
||
"owner": {
|
||
"login": "mklinkj",
|
||
"id": 96992046,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96992046?v=4",
|
||
"html_url": "https:\/\/github.com\/mklinkj"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mklinkj\/log4j2-test",
|
||
"description": "Log4j2 LDAP 취약점 테스트 (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2022-01-03T04:36:41Z",
|
||
"updated_at": "2022-01-09T19:59:25Z",
|
||
"pushed_at": "2022-01-09T19:59:23Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"log4j2"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 444275342,
|
||
"name": "4jfinder.github.io",
|
||
"full_name": "4jfinder\/4jfinder.github.io",
|
||
"owner": {
|
||
"login": "4jfinder",
|
||
"id": 97116800,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97116800?v=4",
|
||
"html_url": "https:\/\/github.com\/4jfinder"
|
||
},
|
||
"html_url": "https:\/\/github.com\/4jfinder\/4jfinder.github.io",
|
||
"description": "Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List",
|
||
"fork": false,
|
||
"created_at": "2022-01-04T03:37:03Z",
|
||
"updated_at": "2022-01-10T22:47:31Z",
|
||
"pushed_at": "2022-01-11T14:02:40Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 444603389,
|
||
"name": "CVE-2021-44228_scanner-main-Modified-",
|
||
"full_name": "alexpena5635\/CVE-2021-44228_scanner-main-Modified-",
|
||
"owner": {
|
||
"login": "alexpena5635",
|
||
"id": 74330769,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74330769?v=4",
|
||
"html_url": "https:\/\/github.com\/alexpena5635"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alexpena5635\/CVE-2021-44228_scanner-main-Modified-",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-01-05T00:14:08Z",
|
||
"updated_at": "2022-01-09T01:45:00Z",
|
||
"pushed_at": "2022-01-09T01:44:58Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 444719044,
|
||
"name": "log4j2-web-vulnerable",
|
||
"full_name": "kanitan\/log4j2-web-vulnerable",
|
||
"owner": {
|
||
"login": "kanitan",
|
||
"id": 26276619,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26276619?v=4",
|
||
"html_url": "https:\/\/github.com\/kanitan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kanitan\/log4j2-web-vulnerable",
|
||
"description": "A vulnerable web app for log4j2 RCE(CVE-2021-44228) exploit test.",
|
||
"fork": false,
|
||
"created_at": "2022-01-05T08:13:32Z",
|
||
"updated_at": "2022-01-05T09:11:45Z",
|
||
"pushed_at": "2022-01-05T09:11:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 444777926,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "mr-r3b00t\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "mr-r3b00t",
|
||
"id": 14963690,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
|
||
"html_url": "https:\/\/github.com\/mr-r3b00t"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-44228",
|
||
"description": "Backdoor detection for VMware view",
|
||
"fork": false,
|
||
"created_at": "2022-01-05T11:27:16Z",
|
||
"updated_at": "2022-01-12T09:25:48Z",
|
||
"pushed_at": "2022-01-05T12:37:39Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 444852717,
|
||
"name": "Log4j_Vulnerability_Demo",
|
||
"full_name": "ChandanShastri\/Log4j_Vulnerability_Demo",
|
||
"owner": {
|
||
"login": "ChandanShastri",
|
||
"id": 25263964,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25263964?v=4",
|
||
"html_url": "https:\/\/github.com\/ChandanShastri"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ChandanShastri\/Log4j_Vulnerability_Demo",
|
||
"description": "A simple program to demonstrate how Log4j vulnerability can be exploited ( CVE-2021-44228 ) ",
|
||
"fork": false,
|
||
"created_at": "2022-01-05T15:24:20Z",
|
||
"updated_at": "2022-01-05T16:49:48Z",
|
||
"pushed_at": "2022-01-12T04:36:45Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 444967250,
|
||
"name": "Log4jHorizon",
|
||
"full_name": "puzzlepeaches\/Log4jHorizon",
|
||
"owner": {
|
||
"login": "puzzlepeaches",
|
||
"id": 8538866,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
|
||
"html_url": "https:\/\/github.com\/puzzlepeaches"
|
||
},
|
||
"html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jHorizon",
|
||
"description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.",
|
||
"fork": false,
|
||
"created_at": "2022-01-05T22:25:42Z",
|
||
"updated_at": "2022-01-12T16:13:42Z",
|
||
"pushed_at": "2022-01-10T19:26:59Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 445474259,
|
||
"name": "log4jshell_CVE-2021-44228",
|
||
"full_name": "Vulnmachines\/log4jshell_CVE-2021-44228",
|
||
"owner": {
|
||
"login": "Vulnmachines",
|
||
"id": 79006904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Vulnmachines\/log4jshell_CVE-2021-44228",
|
||
"description": "Log4jshell - CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2022-01-07T09:56:30Z",
|
||
"updated_at": "2022-01-12T06:44:17Z",
|
||
"pushed_at": "2022-01-07T14:01:18Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 445687561,
|
||
"name": "log4j-fuzzer",
|
||
"full_name": "mr-vill4in\/log4j-fuzzer",
|
||
"owner": {
|
||
"login": "mr-vill4in",
|
||
"id": 51061936,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51061936?v=4",
|
||
"html_url": "https:\/\/github.com\/mr-vill4in"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mr-vill4in\/log4j-fuzzer",
|
||
"description": "CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2022-01-08T00:28:32Z",
|
||
"updated_at": "2022-01-11T02:48:40Z",
|
||
"pushed_at": "2022-01-09T02:53:20Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 445745731,
|
||
"name": "vuln4japi",
|
||
"full_name": "nix-xin\/vuln4japi",
|
||
"owner": {
|
||
"login": "nix-xin",
|
||
"id": 9593989,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9593989?v=4",
|
||
"html_url": "https:\/\/github.com\/nix-xin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nix-xin\/vuln4japi",
|
||
"description": "A vulnerable Java based REST API for demonstrating CVE-2021-44228 (log4shell).",
|
||
"fork": false,
|
||
"created_at": "2022-01-08T06:45:44Z",
|
||
"updated_at": "2022-01-10T08:20:25Z",
|
||
"pushed_at": "2022-01-10T08:20:22Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 446032126,
|
||
"name": "log4j-cve-2021-44228",
|
||
"full_name": "cryptoforcecommand\/log4j-cve-2021-44228",
|
||
"owner": {
|
||
"login": "cryptoforcecommand",
|
||
"id": 97143513,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97143513?v=4",
|
||
"html_url": "https:\/\/github.com\/cryptoforcecommand"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cryptoforcecommand\/log4j-cve-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-01-09T08:22:24Z",
|
||
"updated_at": "2022-01-10T19:21:49Z",
|
||
"pushed_at": "2022-01-11T06:19:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 446098711,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "maximofernandezriera\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "maximofernandezriera",
|
||
"id": 43608040,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43608040?v=4",
|
||
"html_url": "https:\/\/github.com\/maximofernandezriera"
|
||
},
|
||
"html_url": "https:\/\/github.com\/maximofernandezriera\/CVE-2021-44228",
|
||
"description": "This Log4j RCE exploit originated from https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
|
||
"fork": false,
|
||
"created_at": "2022-01-09T13:38:38Z",
|
||
"updated_at": "2022-01-10T01:12:08Z",
|
||
"pushed_at": "2022-01-09T13:43:35Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 446285273,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "c4dr01d\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "c4dr01d",
|
||
"id": 50952350,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50952350?v=4",
|
||
"html_url": "https:\/\/github.com\/c4dr01d"
|
||
},
|
||
"html_url": "https:\/\/github.com\/c4dr01d\/CVE-2021-44228",
|
||
"description": "Experimental exploit for Log4Shell",
|
||
"fork": false,
|
||
"created_at": "2022-01-10T04:55:23Z",
|
||
"updated_at": "2022-01-11T07:54:58Z",
|
||
"pushed_at": "2022-01-11T07:55:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 447404470,
|
||
"name": "log4shell",
|
||
"full_name": "jxerome\/log4shell",
|
||
"owner": {
|
||
"login": "jxerome",
|
||
"id": 1355634,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4",
|
||
"html_url": "https:\/\/github.com\/jxerome"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jxerome\/log4shell",
|
||
"description": "Démo du fonctionnement de log4shell (CVE-2021-44228)",
|
||
"fork": false,
|
||
"created_at": "2022-01-12T23:44:20Z",
|
||
"updated_at": "2022-01-12T23:59:13Z",
|
||
"pushed_at": "2022-01-13T17:42:29Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 447615580,
|
||
"name": "Log4j-CVE-2021-44228",
|
||
"full_name": "solitarysp\/Log4j-CVE-2021-44228",
|
||
"owner": {
|
||
"login": "solitarysp",
|
||
"id": 20993683,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20993683?v=4",
|
||
"html_url": "https:\/\/github.com\/solitarysp"
|
||
},
|
||
"html_url": "https:\/\/github.com\/solitarysp\/Log4j-CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-01-13T13:46:12Z",
|
||
"updated_at": "2022-01-13T13:46:52Z",
|
||
"pushed_at": "2022-01-13T14:43:03Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |