A simple simulation of the infamous CVE-2021-44228 issue.
-
Updated
Dec 18, 2021 - Java
A simple simulation of the infamous CVE-2021-44228 issue.
This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 and CVE-2021-45046 (mirror from GitLab.com)
Log4j Vulnerability RCE - CVE-2021-44228
Dockerized honeypot for CVE-2021-44228.
Script for downloading newest log4j jar files and upgrades it on a Linux-system.
Shell script to remove JndiLookup class from Log4J 2 jar file, inside WAR file, in order to mitigate CVE-2021-44228, a.k.a., #Log4Shell
Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.
Script to combine all host specific json outputs from log4j-detector into one single csv file. Requires only standard python installation, no further dependencies.
Simple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228)
Небольшой мод направленный на устранение уязвимости CVE-2021-44228
Minecraft 1.12.2 Forge mod to ensure your log4j version is safe upon server connection
log4j PowerShell Checker - looking for CVE 2021 44228 log4j LDAP JNDI exploit
If you are sad and blue scan for Log4J in Sytem32...
Add a description, image, and links to the cve-2021-44228 topic page so that developers can more easily learn about it.
To associate your repository with the cve-2021-44228 topic, visit your repo's landing page and select "manage topics."