log4j-shell-poc
awesome-list-of-secrets-in-environment-variables
log4j-shell-poc | awesome-list-of-secrets-in-environment-variables | |
---|---|---|
2 | 8 | |
1,718 | 843 | |
- | - | |
0.0 | 0.0 | |
3 months ago | over 1 year ago | |
Python | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
log4j-shell-poc
-
log4j shell poc with User-Agent payload
https://github.com/kozmer/log4j-shell-poc/blob/main/vulnerable-application/src/main/java/com/example/log4shell/LoginServlet.java line 31
awesome-list-of-secrets-in-environment-variables
What are some alternatives?
L4sh - Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera - 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
log4jpwn - log4j rce test environment and poc
krnlcracked - A cracked keyless version of the krnl roblox exploit for roblox.
py4jshell - Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.
PACS-Recon-Flashcards - Physical Access Control Systems (PACS) Reconnaissance Flashcards
CVE-2021-44228-PoC-log4j-bypass-words - 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
log4j-finder - Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)