CVE-2021-44228-PoC-log4j-bypass-words
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
CVE-2021-44228-PoC-log4j-bypass-words | CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera | |
---|---|---|
8 | 7 | |
924 | 321 | |
- | - | |
0.0 | 0.0 | |
over 2 years ago | over 1 year ago | |
Java | HTML | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CVE-2021-44228-PoC-log4j-bypass-words
-
Log4Shell Update: Severity Upgraded 3.7 -> 9.0 for Second log4j Vulnerability (CVE-2021-45046) | LunaSec - v2.15 of Log4j has an RCE
WAF is also playing whackamole given all the ways to bypass simple rules
-
A Blog about detection of Log4Shell
More specifically this section https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches
- JNDI Log4j exploit bypass word filters
- LOG4J bypass words
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
- CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- GitHub - Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- 🎩 🤟🏻 [P1-Reward:$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
What are some alternatives?
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
cve - Gather and update all available and newest CVEs with their PoC.
black-hat-rust - Applied offensive security with Rust - https://kerkour.com/black-hat-rust
log4j-log4shell-affected - Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
LAZYPARIAH - A tool for generating reverse shell payloads on the fly.
cervantes - Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive management tool, streamlining the organization of projects, clients, vulnerabilities, and reports in a single, centralized location.
log4j-shell-poc - A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
THC-Archive - All releases of the security research group (a.k.a. hackers) The Hacker's Choice
pocbrowser - Scrape websites to find PoCs for CVEs
awesome-list-of-secrets-in-environment-variables - 🦄🔒 Awesome list of secrets in environment variables 🖥️