mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-09-13 21:02:09 +02:00
858 lines
No EOL
30 KiB
JSON
858 lines
No EOL
30 KiB
JSON
[
|
||
{
|
||
"id": 436974241,
|
||
"name": "log4shell-vulnerable-app",
|
||
"full_name": "christophetd\/log4shell-vulnerable-app",
|
||
"owner": {
|
||
"login": "christophetd",
|
||
"id": 136675,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4",
|
||
"html_url": "https:\/\/github.com\/christophetd",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app",
|
||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T12:38:20Z",
|
||
"updated_at": "2025-02-21T00:31:33Z",
|
||
"pushed_at": "2024-04-26T03:16:26Z",
|
||
"stargazers_count": 1115,
|
||
"watchers_count": 1115,
|
||
"has_discussions": false,
|
||
"forks_count": 537,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 537,
|
||
"watchers": 1115,
|
||
"score": 0,
|
||
"subscribers_count": 23
|
||
},
|
||
{
|
||
"id": 437124793,
|
||
"name": "log4noshell",
|
||
"full_name": "winnpixie\/log4noshell",
|
||
"owner": {
|
||
"login": "winnpixie",
|
||
"id": 31022473,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4",
|
||
"html_url": "https:\/\/github.com\/winnpixie",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/winnpixie\/log4noshell",
|
||
"description": "A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 (\"Log4Shell\").",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T21:59:31Z",
|
||
"updated_at": "2024-10-30T09:59:36Z",
|
||
"pushed_at": "2024-10-30T09:59:33Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"apache",
|
||
"cve",
|
||
"log4j",
|
||
"patch",
|
||
"security",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 437139341,
|
||
"name": "log4j-shell-poc",
|
||
"full_name": "kozmer\/log4j-shell-poc",
|
||
"owner": {
|
||
"login": "kozmer",
|
||
"id": 87979263,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4",
|
||
"html_url": "https:\/\/github.com\/kozmer",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kozmer\/log4j-shell-poc",
|
||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||
"fork": false,
|
||
"created_at": "2021-12-10T23:19:28Z",
|
||
"updated_at": "2025-02-26T18:25:28Z",
|
||
"pushed_at": "2024-02-12T22:37:25Z",
|
||
"stargazers_count": 1820,
|
||
"watchers_count": 1820,
|
||
"has_discussions": false,
|
||
"forks_count": 532,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"java",
|
||
"log4j",
|
||
"security"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 532,
|
||
"watchers": 1820,
|
||
"score": 0,
|
||
"subscribers_count": 26
|
||
},
|
||
{
|
||
"id": 437142312,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "racoon-rac\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "racoon-rac",
|
||
"id": 64579294,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4",
|
||
"html_url": "https:\/\/github.com\/racoon-rac",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-10T23:37:55Z",
|
||
"updated_at": "2021-12-11T01:11:19Z",
|
||
"pushed_at": "2023-08-29T19:02:35Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 437273514,
|
||
"name": "CVE-2021-44228-playground",
|
||
"full_name": "b-abderrahmane\/CVE-2021-44228-playground",
|
||
"owner": {
|
||
"login": "b-abderrahmane",
|
||
"id": 10504574,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10504574?v=4",
|
||
"html_url": "https:\/\/github.com\/b-abderrahmane",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/b-abderrahmane\/CVE-2021-44228-playground",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-11T12:16:45Z",
|
||
"updated_at": "2024-04-29T17:48:37Z",
|
||
"pushed_at": "2025-02-28T01:31:25Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 437848570,
|
||
"name": "Log4Shell",
|
||
"full_name": "0xsyr0\/Log4Shell",
|
||
"owner": {
|
||
"login": "0xsyr0",
|
||
"id": 67317571,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67317571?v=4",
|
||
"html_url": "https:\/\/github.com\/0xsyr0",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xsyr0\/Log4Shell",
|
||
"description": "This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T11:34:54Z",
|
||
"updated_at": "2024-01-17T16:03:44Z",
|
||
"pushed_at": "2024-02-21T15:47:36Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2021-44228",
|
||
"log4j",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 8,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 437963154,
|
||
"name": "cve-2021-44228",
|
||
"full_name": "corelight\/cve-2021-44228",
|
||
"owner": {
|
||
"login": "corelight",
|
||
"id": 21672558,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||
"html_url": "https:\/\/github.com\/corelight",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/corelight\/cve-2021-44228",
|
||
"description": "Log4j Exploit Detection Logic for Zeek",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T17:25:52Z",
|
||
"updated_at": "2024-10-12T10:55:49Z",
|
||
"pushed_at": "2024-05-04T18:38:58Z",
|
||
"stargazers_count": 19,
|
||
"watchers_count": 19,
|
||
"has_discussions": false,
|
||
"forks_count": 8,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"zeek"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 8,
|
||
"watchers": 19,
|
||
"score": 0,
|
||
"subscribers_count": 12
|
||
},
|
||
{
|
||
"id": 438034703,
|
||
"name": "log4shell-tools",
|
||
"full_name": "alexbakker\/log4shell-tools",
|
||
"owner": {
|
||
"login": "alexbakker",
|
||
"id": 2387841,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4",
|
||
"html_url": "https:\/\/github.com\/alexbakker",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alexbakker\/log4shell-tools",
|
||
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
|
||
"fork": false,
|
||
"created_at": "2021-12-13T21:47:41Z",
|
||
"updated_at": "2024-10-28T07:04:55Z",
|
||
"pushed_at": "2024-04-07T22:45:53Z",
|
||
"stargazers_count": 86,
|
||
"watchers_count": 86,
|
||
"has_discussions": false,
|
||
"forks_count": 17,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"cve-2021-45046",
|
||
"dns",
|
||
"jndi",
|
||
"ldap",
|
||
"log4j",
|
||
"log4shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 17,
|
||
"watchers": 86,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 438144746,
|
||
"name": "LogMePwn",
|
||
"full_name": "0xInfection\/LogMePwn",
|
||
"owner": {
|
||
"login": "0xInfection",
|
||
"id": 39941993,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39941993?v=4",
|
||
"html_url": "https:\/\/github.com\/0xInfection",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xInfection\/LogMePwn",
|
||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T06:37:59Z",
|
||
"updated_at": "2025-02-17T03:30:20Z",
|
||
"pushed_at": "2024-12-11T23:04:50Z",
|
||
"stargazers_count": 398,
|
||
"watchers_count": 398,
|
||
"has_discussions": false,
|
||
"forks_count": 55,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"internet-scanning",
|
||
"log4j",
|
||
"rce-scanner",
|
||
"vulnerability-scanners"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 55,
|
||
"watchers": 398,
|
||
"score": 0,
|
||
"subscribers_count": 12
|
||
},
|
||
{
|
||
"id": 438615335,
|
||
"name": "Log4JHunt",
|
||
"full_name": "redhuntlabs\/Log4JHunt",
|
||
"owner": {
|
||
"login": "redhuntlabs",
|
||
"id": 36505047,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36505047?v=4",
|
||
"html_url": "https:\/\/github.com\/redhuntlabs",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/redhuntlabs\/Log4JHunt",
|
||
"description": "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T12:07:05Z",
|
||
"updated_at": "2025-01-22T10:50:11Z",
|
||
"pushed_at": "2025-01-22T10:50:08Z",
|
||
"stargazers_count": 43,
|
||
"watchers_count": 43,
|
||
"has_discussions": false,
|
||
"forks_count": 8,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 8,
|
||
"watchers": 43,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 438695688,
|
||
"name": "checkmk-log4j-scanner",
|
||
"full_name": "inettgmbh\/checkmk-log4j-scanner",
|
||
"owner": {
|
||
"login": "inettgmbh",
|
||
"id": 12827152,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12827152?v=4",
|
||
"html_url": "https:\/\/github.com\/inettgmbh",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/inettgmbh\/checkmk-log4j-scanner",
|
||
"description": "Scans for Log4j versions effected by CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T16:21:26Z",
|
||
"updated_at": "2024-05-13T12:42:03Z",
|
||
"pushed_at": "2024-05-13T12:44:51Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"checkmk",
|
||
"log4j"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 438773632,
|
||
"name": "Log4Shell-Honeypot",
|
||
"full_name": "michaelsanford\/Log4Shell-Honeypot",
|
||
"owner": {
|
||
"login": "michaelsanford",
|
||
"id": 1800499,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1800499?v=4",
|
||
"html_url": "https:\/\/github.com\/michaelsanford",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/michaelsanford\/Log4Shell-Honeypot",
|
||
"description": "Dockerized honeypot for CVE-2021-44228.",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T21:09:00Z",
|
||
"updated_at": "2023-06-22T04:46:02Z",
|
||
"pushed_at": "2025-02-12T07:52:25Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-44228",
|
||
"docker",
|
||
"honeypot",
|
||
"python"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 438791130,
|
||
"name": "Log4Pot",
|
||
"full_name": "thomaspatzke\/Log4Pot",
|
||
"owner": {
|
||
"login": "thomaspatzke",
|
||
"id": 1845601,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1845601?v=4",
|
||
"html_url": "https:\/\/github.com\/thomaspatzke",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/thomaspatzke\/Log4Pot",
|
||
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
|
||
"fork": false,
|
||
"created_at": "2021-12-15T22:30:34Z",
|
||
"updated_at": "2025-02-28T22:00:46Z",
|
||
"pushed_at": "2024-11-29T22:56:57Z",
|
||
"stargazers_count": 92,
|
||
"watchers_count": 92,
|
||
"has_discussions": true,
|
||
"forks_count": 30,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 30,
|
||
"watchers": 92,
|
||
"score": 0,
|
||
"subscribers_count": 7
|
||
},
|
||
{
|
||
"id": 440216413,
|
||
"name": "Log4j-Scanner-Exploit",
|
||
"full_name": "julian911015\/Log4j-Scanner-Exploit",
|
||
"owner": {
|
||
"login": "julian911015",
|
||
"id": 26369589,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26369589?v=4",
|
||
"html_url": "https:\/\/github.com\/julian911015",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/julian911015\/Log4j-Scanner-Exploit",
|
||
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
|
||
"fork": false,
|
||
"created_at": "2021-12-20T15:22:50Z",
|
||
"updated_at": "2024-09-19T08:09:04Z",
|
||
"pushed_at": "2024-09-03T15:22:31Z",
|
||
"stargazers_count": 29,
|
||
"watchers_count": 29,
|
||
"has_discussions": false,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 29,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 441470836,
|
||
"name": "Log4jUnifi",
|
||
"full_name": "puzzlepeaches\/Log4jUnifi",
|
||
"owner": {
|
||
"login": "puzzlepeaches",
|
||
"id": 8538866,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
|
||
"html_url": "https:\/\/github.com\/puzzlepeaches",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jUnifi",
|
||
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
|
||
"fork": false,
|
||
"created_at": "2021-12-24T13:18:49Z",
|
||
"updated_at": "2025-03-02T21:24:42Z",
|
||
"pushed_at": "2024-01-04T17:12:05Z",
|
||
"stargazers_count": 147,
|
||
"watchers_count": 147,
|
||
"has_discussions": false,
|
||
"forks_count": 28,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 28,
|
||
"watchers": 147,
|
||
"score": 0,
|
||
"subscribers_count": 6
|
||
},
|
||
{
|
||
"id": 442217104,
|
||
"name": "l4s_poc",
|
||
"full_name": "s-retlaw\/l4s_poc",
|
||
"owner": {
|
||
"login": "s-retlaw",
|
||
"id": 73955369,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4",
|
||
"html_url": "https:\/\/github.com\/s-retlaw",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/s-retlaw\/l4s_poc",
|
||
"description": "Log4Shell (Cve-2021-44228) Proof Of Concept",
|
||
"fork": false,
|
||
"created_at": "2021-12-27T16:45:58Z",
|
||
"updated_at": "2022-01-04T14:50:09Z",
|
||
"pushed_at": "2023-07-25T20:05:40Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 776289709,
|
||
"name": "CVE-2021-44228-POC",
|
||
"full_name": "sec13b\/CVE-2021-44228-POC",
|
||
"owner": {
|
||
"login": "sec13b",
|
||
"id": 123419537,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123419537?v=4",
|
||
"html_url": "https:\/\/github.com\/sec13b",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sec13b\/CVE-2021-44228-POC",
|
||
"description": "exploit CVE-2021-44228 ",
|
||
"fork": false,
|
||
"created_at": "2024-03-23T05:03:44Z",
|
||
"updated_at": "2024-11-06T18:16:06Z",
|
||
"pushed_at": "2024-11-06T18:16:03Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 855503144,
|
||
"name": "CVE-2021-44228-Log4Shell-",
|
||
"full_name": "OtisSymbos\/CVE-2021-44228-Log4Shell-",
|
||
"owner": {
|
||
"login": "OtisSymbos",
|
||
"id": 78093502,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78093502?v=4",
|
||
"html_url": "https:\/\/github.com\/OtisSymbos",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/OtisSymbos\/CVE-2021-44228-Log4Shell-",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2024-09-11T01:13:35Z",
|
||
"updated_at": "2024-09-11T01:20:42Z",
|
||
"pushed_at": "2024-09-11T01:14:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 855573158,
|
||
"name": "log4j-shell-poc",
|
||
"full_name": "safeer-accuknox\/log4j-shell-poc",
|
||
"owner": {
|
||
"login": "safeer-accuknox",
|
||
"id": 180378107,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4",
|
||
"html_url": "https:\/\/github.com\/safeer-accuknox",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/safeer-accuknox\/log4j-shell-poc",
|
||
"description": "Log4J exploit CVE-2021-44228",
|
||
"fork": false,
|
||
"created_at": "2024-09-11T05:06:50Z",
|
||
"updated_at": "2024-09-11T09:39:58Z",
|
||
"pushed_at": "2024-09-11T09:39:55Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 869690102,
|
||
"name": "TPASLog4ShellPoC",
|
||
"full_name": "Carlos-Mesquita\/TPASLog4ShellPoC",
|
||
"owner": {
|
||
"login": "Carlos-Mesquita",
|
||
"id": 75860783,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75860783?v=4",
|
||
"html_url": "https:\/\/github.com\/Carlos-Mesquita",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Carlos-Mesquita\/TPASLog4ShellPoC",
|
||
"description": "Proof of Concept (PoC) for the Log4Shell vulnerability (CVE-2021-44228), developed as part of the coursework for the curricular unit TPAS in the Master's degree in Information Security at FCUP.",
|
||
"fork": false,
|
||
"created_at": "2024-10-08T18:07:21Z",
|
||
"updated_at": "2024-10-10T14:53:56Z",
|
||
"pushed_at": "2024-10-08T18:19:15Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 886209908,
|
||
"name": "-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-",
|
||
"full_name": "AhmedMansour93\/-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-",
|
||
"owner": {
|
||
"login": "AhmedMansour93",
|
||
"id": 179945455,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179945455?v=4",
|
||
"html_url": "https:\/\/github.com\/AhmedMansour93",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AhmedMansour93\/-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-",
|
||
"description": "In December 2021, the world of cybersecurity was shaken by the discovery of the Log4Shell vulnerability (CVE-2021-44228), embedded within the widely-used Apache Log4j library. With a CVSS score of 10",
|
||
"fork": false,
|
||
"created_at": "2024-11-10T13:45:59Z",
|
||
"updated_at": "2024-11-10T13:47:01Z",
|
||
"pushed_at": "2024-11-10T13:46:58Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 888768773,
|
||
"name": "cve-2021-44228",
|
||
"full_name": "Super-Binary\/cve-2021-44228",
|
||
"owner": {
|
||
"login": "Super-Binary",
|
||
"id": 188337454,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188337454?v=4",
|
||
"html_url": "https:\/\/github.com\/Super-Binary",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Super-Binary\/cve-2021-44228",
|
||
"description": "这是安徽大学 “漏洞分析实验”(大三秋冬)期中作业归档。完整文档位于https:\/\/testgames.me\/2024\/11\/10\/cve-2021-44228\/",
|
||
"fork": false,
|
||
"created_at": "2024-11-15T01:11:25Z",
|
||
"updated_at": "2024-11-23T13:31:31Z",
|
||
"pushed_at": "2024-11-23T13:31:27Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 919340293,
|
||
"name": "CVE-2021-44228",
|
||
"full_name": "ZacharyZcR\/CVE-2021-44228",
|
||
"owner": {
|
||
"login": "ZacharyZcR",
|
||
"id": 48591714,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48591714?v=4",
|
||
"html_url": "https:\/\/github.com\/ZacharyZcR",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ZacharyZcR\/CVE-2021-44228",
|
||
"description": "调试环境",
|
||
"fork": false,
|
||
"created_at": "2025-01-20T08:04:01Z",
|
||
"updated_at": "2025-01-20T08:05:13Z",
|
||
"pushed_at": "2025-01-20T08:05:11Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 927043113,
|
||
"name": "CVE-2021-44228_dockernize",
|
||
"full_name": "qw3rtyou\/CVE-2021-44228_dockernize",
|
||
"owner": {
|
||
"login": "qw3rtyou",
|
||
"id": 103625068,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103625068?v=4",
|
||
"html_url": "https:\/\/github.com\/qw3rtyou",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/qw3rtyou\/CVE-2021-44228_dockernize",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2025-02-04T10:02:01Z",
|
||
"updated_at": "2025-02-04T10:08:45Z",
|
||
"pushed_at": "2025-02-04T10:08:42Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 934037658,
|
||
"name": "Log4Shell-vulnerability-CVE-2021-44228-",
|
||
"full_name": "yadavmukesh\/Log4Shell-vulnerability-CVE-2021-44228-",
|
||
"owner": {
|
||
"login": "yadavmukesh",
|
||
"id": 24803418,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24803418?v=4",
|
||
"html_url": "https:\/\/github.com\/yadavmukesh",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yadavmukesh\/Log4Shell-vulnerability-CVE-2021-44228-",
|
||
"description": "This repository provides an in-depth analysis of the Log4Shell vulnerability (CVE-2021-44228) and implements a machine learning-based approach to detect exploitation attempts in log data.",
|
||
"fork": false,
|
||
"created_at": "2025-02-17T07:03:36Z",
|
||
"updated_at": "2025-02-17T08:14:51Z",
|
||
"pushed_at": "2025-02-17T08:14:47Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2021-44228",
|
||
"cyberattacks",
|
||
"machine",
|
||
"machine-learning"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 942606741,
|
||
"name": "log4shell-tools",
|
||
"full_name": "lustrouscave\/log4shell-tools",
|
||
"owner": {
|
||
"login": "lustrouscave",
|
||
"id": 199445215,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/199445215?v=4",
|
||
"html_url": "https:\/\/github.com\/lustrouscave",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lustrouscave\/log4shell-tools",
|
||
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046 cve-2021-44228, cve-2021-45046, dns, jndi, ldap, log4j, log4shell",
|
||
"fork": false,
|
||
"created_at": "2025-03-04T11:23:43Z",
|
||
"updated_at": "2025-03-04T11:23:52Z",
|
||
"pushed_at": "2025-03-04T11:23:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
}
|
||
] |