Log4Shell-IOCs
log4jpwn
Log4Shell-IOCs | log4jpwn | |
---|---|---|
1 | 1 | |
184 | 308 | |
0.0% | - | |
3.6 | 0.0 | |
about 2 years ago | over 2 years ago | |
Python | Python | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Log4Shell-IOCs
log4jpwn
What are some alternatives?
L4sh - Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
Log4j-RCE-Scanner - Remote command execution vulnerability scanner for Log4j.
Burp2Malleable - Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles
log4j-scan - A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
log4j-shell-poc - A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
log4j-finder - Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)
canarytokens - Canarytokens helps track activity and actions on your network.
log4shell-vulnerable-app - Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).