PoC-in-GitHub/2021/CVE-2021-44228.json
2025-03-07 03:12:43 +09:00

858 lines
No EOL
30 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 436974241,
"name": "log4shell-vulnerable-app",
"full_name": "christophetd\/log4shell-vulnerable-app",
"owner": {
"login": "christophetd",
"id": 136675,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4",
"html_url": "https:\/\/github.com\/christophetd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app",
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2025-02-21T00:31:33Z",
"pushed_at": "2024-04-26T03:16:26Z",
"stargazers_count": 1115,
"watchers_count": 1115,
"has_discussions": false,
"forks_count": 537,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"log4shell"
],
"visibility": "public",
"forks": 537,
"watchers": 1115,
"score": 0,
"subscribers_count": 23
},
{
"id": 437124793,
"name": "log4noshell",
"full_name": "winnpixie\/log4noshell",
"owner": {
"login": "winnpixie",
"id": 31022473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4",
"html_url": "https:\/\/github.com\/winnpixie",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/winnpixie\/log4noshell",
"description": "A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 (\"Log4Shell\").",
"fork": false,
"created_at": "2021-12-10T21:59:31Z",
"updated_at": "2024-10-30T09:59:36Z",
"pushed_at": "2024-10-30T09:59:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve",
"log4j",
"patch",
"security",
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 437139341,
"name": "log4j-shell-poc",
"full_name": "kozmer\/log4j-shell-poc",
"owner": {
"login": "kozmer",
"id": 87979263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4",
"html_url": "https:\/\/github.com\/kozmer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kozmer\/log4j-shell-poc",
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2025-02-26T18:25:28Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1820,
"watchers_count": 1820,
"has_discussions": false,
"forks_count": 532,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"java",
"log4j",
"security"
],
"visibility": "public",
"forks": 532,
"watchers": 1820,
"score": 0,
"subscribers_count": 26
},
{
"id": 437142312,
"name": "CVE-2021-44228",
"full_name": "racoon-rac\/CVE-2021-44228",
"owner": {
"login": "racoon-rac",
"id": 64579294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4",
"html_url": "https:\/\/github.com\/racoon-rac",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-10T23:37:55Z",
"updated_at": "2021-12-11T01:11:19Z",
"pushed_at": "2023-08-29T19:02:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 437273514,
"name": "CVE-2021-44228-playground",
"full_name": "b-abderrahmane\/CVE-2021-44228-playground",
"owner": {
"login": "b-abderrahmane",
"id": 10504574,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10504574?v=4",
"html_url": "https:\/\/github.com\/b-abderrahmane",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/b-abderrahmane\/CVE-2021-44228-playground",
"description": null,
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2024-04-29T17:48:37Z",
"pushed_at": "2025-02-28T01:31:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 437848570,
"name": "Log4Shell",
"full_name": "0xsyr0\/Log4Shell",
"owner": {
"login": "0xsyr0",
"id": 67317571,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67317571?v=4",
"html_url": "https:\/\/github.com\/0xsyr0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xsyr0\/Log4Shell",
"description": "This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.",
"fork": false,
"created_at": "2021-12-13T11:34:54Z",
"updated_at": "2024-01-17T16:03:44Z",
"pushed_at": "2024-02-21T15:47:36Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-44228",
"log4j",
"log4shell"
],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 4
},
{
"id": 437963154,
"name": "cve-2021-44228",
"full_name": "corelight\/cve-2021-44228",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/corelight\/cve-2021-44228",
"description": "Log4j Exploit Detection Logic for Zeek",
"fork": false,
"created_at": "2021-12-13T17:25:52Z",
"updated_at": "2024-10-12T10:55:49Z",
"pushed_at": "2024-05-04T18:38:58Z",
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"zeek"
],
"visibility": "public",
"forks": 8,
"watchers": 19,
"score": 0,
"subscribers_count": 12
},
{
"id": 438034703,
"name": "log4shell-tools",
"full_name": "alexbakker\/log4shell-tools",
"owner": {
"login": "alexbakker",
"id": 2387841,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4",
"html_url": "https:\/\/github.com\/alexbakker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/alexbakker\/log4shell-tools",
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
"fork": false,
"created_at": "2021-12-13T21:47:41Z",
"updated_at": "2024-10-28T07:04:55Z",
"pushed_at": "2024-04-07T22:45:53Z",
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"cve-2021-45046",
"dns",
"jndi",
"ldap",
"log4j",
"log4shell"
],
"visibility": "public",
"forks": 17,
"watchers": 86,
"score": 0,
"subscribers_count": 4
},
{
"id": 438144746,
"name": "LogMePwn",
"full_name": "0xInfection\/LogMePwn",
"owner": {
"login": "0xInfection",
"id": 39941993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39941993?v=4",
"html_url": "https:\/\/github.com\/0xInfection",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xInfection\/LogMePwn",
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2025-02-17T03:30:20Z",
"pushed_at": "2024-12-11T23:04:50Z",
"stargazers_count": 398,
"watchers_count": 398,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"internet-scanning",
"log4j",
"rce-scanner",
"vulnerability-scanners"
],
"visibility": "public",
"forks": 55,
"watchers": 398,
"score": 0,
"subscribers_count": 12
},
{
"id": 438615335,
"name": "Log4JHunt",
"full_name": "redhuntlabs\/Log4JHunt",
"owner": {
"login": "redhuntlabs",
"id": 36505047,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36505047?v=4",
"html_url": "https:\/\/github.com\/redhuntlabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/redhuntlabs\/Log4JHunt",
"description": "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.",
"fork": false,
"created_at": "2021-12-15T12:07:05Z",
"updated_at": "2025-01-22T10:50:11Z",
"pushed_at": "2025-01-22T10:50:08Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 43,
"score": 0,
"subscribers_count": 3
},
{
"id": 438695688,
"name": "checkmk-log4j-scanner",
"full_name": "inettgmbh\/checkmk-log4j-scanner",
"owner": {
"login": "inettgmbh",
"id": 12827152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12827152?v=4",
"html_url": "https:\/\/github.com\/inettgmbh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/inettgmbh\/checkmk-log4j-scanner",
"description": "Scans for Log4j versions effected by CVE-2021-44228",
"fork": false,
"created_at": "2021-12-15T16:21:26Z",
"updated_at": "2024-05-13T12:42:03Z",
"pushed_at": "2024-05-13T12:44:51Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"checkmk",
"log4j"
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 4
},
{
"id": 438773632,
"name": "Log4Shell-Honeypot",
"full_name": "michaelsanford\/Log4Shell-Honeypot",
"owner": {
"login": "michaelsanford",
"id": 1800499,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1800499?v=4",
"html_url": "https:\/\/github.com\/michaelsanford",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/michaelsanford\/Log4Shell-Honeypot",
"description": "Dockerized honeypot for CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-15T21:09:00Z",
"updated_at": "2023-06-22T04:46:02Z",
"pushed_at": "2025-02-12T07:52:25Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"docker",
"honeypot",
"python"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 3
},
{
"id": 438791130,
"name": "Log4Pot",
"full_name": "thomaspatzke\/Log4Pot",
"owner": {
"login": "thomaspatzke",
"id": 1845601,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1845601?v=4",
"html_url": "https:\/\/github.com\/thomaspatzke",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/thomaspatzke\/Log4Pot",
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-15T22:30:34Z",
"updated_at": "2025-02-28T22:00:46Z",
"pushed_at": "2024-11-29T22:56:57Z",
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": true,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 92,
"score": 0,
"subscribers_count": 7
},
{
"id": 440216413,
"name": "Log4j-Scanner-Exploit",
"full_name": "julian911015\/Log4j-Scanner-Exploit",
"owner": {
"login": "julian911015",
"id": 26369589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26369589?v=4",
"html_url": "https:\/\/github.com\/julian911015",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/julian911015\/Log4j-Scanner-Exploit",
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
"fork": false,
"created_at": "2021-12-20T15:22:50Z",
"updated_at": "2024-09-19T08:09:04Z",
"pushed_at": "2024-09-03T15:22:31Z",
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 29,
"score": 0,
"subscribers_count": 2
},
{
"id": 441470836,
"name": "Log4jUnifi",
"full_name": "puzzlepeaches\/Log4jUnifi",
"owner": {
"login": "puzzlepeaches",
"id": 8538866,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
"html_url": "https:\/\/github.com\/puzzlepeaches",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jUnifi",
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
"fork": false,
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2025-03-02T21:24:42Z",
"pushed_at": "2024-01-04T17:12:05Z",
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 147,
"score": 0,
"subscribers_count": 6
},
{
"id": 442217104,
"name": "l4s_poc",
"full_name": "s-retlaw\/l4s_poc",
"owner": {
"login": "s-retlaw",
"id": 73955369,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4",
"html_url": "https:\/\/github.com\/s-retlaw",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/s-retlaw\/l4s_poc",
"description": "Log4Shell (Cve-2021-44228) Proof Of Concept",
"fork": false,
"created_at": "2021-12-27T16:45:58Z",
"updated_at": "2022-01-04T14:50:09Z",
"pushed_at": "2023-07-25T20:05:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 776289709,
"name": "CVE-2021-44228-POC",
"full_name": "sec13b\/CVE-2021-44228-POC",
"owner": {
"login": "sec13b",
"id": 123419537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123419537?v=4",
"html_url": "https:\/\/github.com\/sec13b",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sec13b\/CVE-2021-44228-POC",
"description": "exploit CVE-2021-44228 ",
"fork": false,
"created_at": "2024-03-23T05:03:44Z",
"updated_at": "2024-11-06T18:16:06Z",
"pushed_at": "2024-11-06T18:16:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 855503144,
"name": "CVE-2021-44228-Log4Shell-",
"full_name": "OtisSymbos\/CVE-2021-44228-Log4Shell-",
"owner": {
"login": "OtisSymbos",
"id": 78093502,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78093502?v=4",
"html_url": "https:\/\/github.com\/OtisSymbos",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/OtisSymbos\/CVE-2021-44228-Log4Shell-",
"description": null,
"fork": false,
"created_at": "2024-09-11T01:13:35Z",
"updated_at": "2024-09-11T01:20:42Z",
"pushed_at": "2024-09-11T01:14:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 855573158,
"name": "log4j-shell-poc",
"full_name": "safeer-accuknox\/log4j-shell-poc",
"owner": {
"login": "safeer-accuknox",
"id": 180378107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4",
"html_url": "https:\/\/github.com\/safeer-accuknox",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/safeer-accuknox\/log4j-shell-poc",
"description": "Log4J exploit CVE-2021-44228",
"fork": false,
"created_at": "2024-09-11T05:06:50Z",
"updated_at": "2024-09-11T09:39:58Z",
"pushed_at": "2024-09-11T09:39:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 869690102,
"name": "TPASLog4ShellPoC",
"full_name": "Carlos-Mesquita\/TPASLog4ShellPoC",
"owner": {
"login": "Carlos-Mesquita",
"id": 75860783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75860783?v=4",
"html_url": "https:\/\/github.com\/Carlos-Mesquita",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Carlos-Mesquita\/TPASLog4ShellPoC",
"description": "Proof of Concept (PoC) for the Log4Shell vulnerability (CVE-2021-44228), developed as part of the coursework for the curricular unit TPAS in the Master's degree in Information Security at FCUP.",
"fork": false,
"created_at": "2024-10-08T18:07:21Z",
"updated_at": "2024-10-10T14:53:56Z",
"pushed_at": "2024-10-08T18:19:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 886209908,
"name": "-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-",
"full_name": "AhmedMansour93\/-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-",
"owner": {
"login": "AhmedMansour93",
"id": 179945455,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179945455?v=4",
"html_url": "https:\/\/github.com\/AhmedMansour93",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AhmedMansour93\/-Unveiling-the-Lessons-from-Log4Shell-A-Wake-Up-Call-for-Cybersecurity-",
"description": "In December 2021, the world of cybersecurity was shaken by the discovery of the Log4Shell vulnerability (CVE-2021-44228), embedded within the widely-used Apache Log4j library. With a CVSS score of 10",
"fork": false,
"created_at": "2024-11-10T13:45:59Z",
"updated_at": "2024-11-10T13:47:01Z",
"pushed_at": "2024-11-10T13:46:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 888768773,
"name": "cve-2021-44228",
"full_name": "Super-Binary\/cve-2021-44228",
"owner": {
"login": "Super-Binary",
"id": 188337454,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188337454?v=4",
"html_url": "https:\/\/github.com\/Super-Binary",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Super-Binary\/cve-2021-44228",
"description": "这是安徽大学 “漏洞分析实验”大三秋冬期中作业归档。完整文档位于https:\/\/testgames.me\/2024\/11\/10\/cve-2021-44228\/",
"fork": false,
"created_at": "2024-11-15T01:11:25Z",
"updated_at": "2024-11-23T13:31:31Z",
"pushed_at": "2024-11-23T13:31:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 919340293,
"name": "CVE-2021-44228",
"full_name": "ZacharyZcR\/CVE-2021-44228",
"owner": {
"login": "ZacharyZcR",
"id": 48591714,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48591714?v=4",
"html_url": "https:\/\/github.com\/ZacharyZcR",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZacharyZcR\/CVE-2021-44228",
"description": "调试环境",
"fork": false,
"created_at": "2025-01-20T08:04:01Z",
"updated_at": "2025-01-20T08:05:13Z",
"pushed_at": "2025-01-20T08:05:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 927043113,
"name": "CVE-2021-44228_dockernize",
"full_name": "qw3rtyou\/CVE-2021-44228_dockernize",
"owner": {
"login": "qw3rtyou",
"id": 103625068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103625068?v=4",
"html_url": "https:\/\/github.com\/qw3rtyou",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/qw3rtyou\/CVE-2021-44228_dockernize",
"description": null,
"fork": false,
"created_at": "2025-02-04T10:02:01Z",
"updated_at": "2025-02-04T10:08:45Z",
"pushed_at": "2025-02-04T10:08:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 934037658,
"name": "Log4Shell-vulnerability-CVE-2021-44228-",
"full_name": "yadavmukesh\/Log4Shell-vulnerability-CVE-2021-44228-",
"owner": {
"login": "yadavmukesh",
"id": 24803418,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24803418?v=4",
"html_url": "https:\/\/github.com\/yadavmukesh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yadavmukesh\/Log4Shell-vulnerability-CVE-2021-44228-",
"description": "This repository provides an in-depth analysis of the Log4Shell vulnerability (CVE-2021-44228) and implements a machine learning-based approach to detect exploitation attempts in log data.",
"fork": false,
"created_at": "2025-02-17T07:03:36Z",
"updated_at": "2025-02-17T08:14:51Z",
"pushed_at": "2025-02-17T08:14:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-44228",
"cyberattacks",
"machine",
"machine-learning"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 942606741,
"name": "log4shell-tools",
"full_name": "lustrouscave\/log4shell-tools",
"owner": {
"login": "lustrouscave",
"id": 199445215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/199445215?v=4",
"html_url": "https:\/\/github.com\/lustrouscave",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lustrouscave\/log4shell-tools",
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046 cve-2021-44228, cve-2021-45046, dns, jndi, ldap, log4j, log4shell",
"fork": false,
"created_at": "2025-03-04T11:23:43Z",
"updated_at": "2025-03-04T11:23:52Z",
"pushed_at": "2025-03-04T11:23:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]