ThreatMapper
apache-log4j-rce-poc | ThreatMapper | |
---|---|---|
1 | 32 | |
2 | 4,655 | |
- | 0.9% | |
0.0 | 9.9 | |
over 2 years ago | about 16 hours ago | |
Java | TypeScript | |
- | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
apache-log4j-rce-poc
-
RCE 0-day exploit found in log4j, a popular Java logging package
I published some code with detailed steps 写了下详细的复现步骤 https://github.com/udoless/apache-log4j-rce-poc
ThreatMapper
- ThreatMapper: Open-source cloud native security observability platform
-
OSS Security - Deepfence Threat Mapper
Though the Reddit-Mod war has delivered another excellent find. well several actually, but the one I'm posting now is called "Threat Mapper". Its a security scanner, will a fantastic UI, and works across most infrastructure... including VMs, Containers and the main Cloud Providers..
-
Detecting Threats on 100k Servers, 1000s of Cloud Accounts, 2500 K8s Clusters
https://github.com/deepfence/ThreatMapper
-
Vulnerability scanning tools for homelab?
If you like Wiz.io but don't have a million dollars or so lying around, I'm finding the community edition of Deepfence (https://deepfence.io/) pretty good.
-
CSPM opensource suggestions
Magpie https://github.com/openraven/magpie ThreatMapper https://github.com/deepfence/ThreatMapper Cloudquery https://github.com/cloudquery/cloudquery
- ThreatMapper – open-source cloud native security observability platform
-
Official /r/rust "Who's Hiring" thread for job-seekers and job-offerers [Rust 1.64]
Company: https://deepfence.io
-
Looking for infrastructure monitoring solutions.
And deepfence.imo for vurnalbility scans https://github.com/deepfence/ThreatMapper
-
Free vulnerability scanners
ThreatMapper is an option for your team member, particularly if you're looking to scan Kubernetes or Fargate environments as the installation is very easy. It's a little more complex for hosts (you need to install a docker runtime on each to run the sensor locally), but should be worth any additional trouble. The GUI gives you a map of workloads, traffic flows, vulnerabilities found on each workload and host, and which are highest risk.
-
Do you / how do you scan for vulnerabilities once your code is in production?
Full disclosure - I work for an open source project called ThreatMapper that performs run-time vulnerability scanning and anything you say might be used to make the project better - thank you!
What are some alternatives?
Log4jAttackSurface
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
active-scan-plus-plus - ActiveScan++ Burp Suite Plugin
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Log4JShell-Bytecode-Detector - Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)
kubesphere - The container platform tailored for Kubernetes multi-cloud, datacenter, and edge management ⎈ 🖥 ☁️
semgrep-rules - Semgrep rules registry
kubescape - Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
apache-log4j-rce-poc
devspace - DevSpace - The Fastest Developer Tool for Kubernetes ⚡ Automate your deployment workflow with DevSpace and develop software directly inside Kubernetes.
CVE-2021-44228-Log4Shell-Hashes - Hashes for vulnerable LOG4J versions
openscap - NIST Certified SCAP 1.2 toolkit