leonjza / log4jpwnView external linksLinks
log4j rce test environment and poc
☆311Dec 15, 2021Updated 4 years ago
Alternatives and similar repositories for log4jpwn
Users that are interested in log4jpwn are comparing it to the libraries listed below
Sorting:
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,138Apr 26, 2024Updated last year
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,849Feb 12, 2024Updated 2 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,891Jun 15, 2022Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆177Dec 16, 2021Updated 4 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Dec 20, 2021Updated 4 years ago
- Simple local scanner for vulnerable log4j instances☆374Aug 1, 2022Updated 3 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆950Jan 15, 2022Updated 4 years ago
- ☆2,079Dec 13, 2021Updated 4 years ago
- An agent to hotpatch the log4j RCE from CVE-2021-44228.☆496Oct 24, 2022Updated 3 years ago
- A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-syst…☆640Mar 10, 2022Updated 3 years ago
- A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.☆126Dec 14, 2021Updated 4 years ago
- ☆366Feb 22, 2023Updated 2 years ago
- Burpsuite extension for log4j2rce☆28Dec 13, 2021Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,040Jul 10, 2022Updated 3 years ago
- Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information☆183Dec 16, 2021Updated 4 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆439Dec 27, 2022Updated 3 years ago
- ☆71Jan 23, 2026Updated 3 weeks ago
- ☆62Dec 10, 2021Updated 4 years ago
- A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell☆72Dec 21, 2022Updated 3 years ago
- Apache Log4j 远程代码执行☆89May 14, 2023Updated 2 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Dec 21, 2021Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Mar 2, 2022Updated 3 years ago
- ☆171Feb 14, 2025Updated last year
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆937Sep 2, 2025Updated 5 months ago
- ☆3,659Jan 9, 2025Updated last year
- Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.☆59Dec 11, 2021Updated 4 years ago
- Remote command execution vulnerability scanner for Log4j.☆251Aug 1, 2023Updated 2 years ago
- A community sourced list of log4j-affected software☆1,123Nov 9, 2022Updated 3 years ago
- nse script to inject jndi payloads☆46Dec 13, 2021Updated 4 years ago
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆53Dec 19, 2021Updated 4 years ago
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,087Jul 5, 2021Updated 4 years ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆827Aug 4, 2023Updated 2 years ago
- ☆86Mar 31, 2022Updated 3 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,962Jul 20, 2021Updated 4 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,281Dec 6, 2022Updated 3 years ago