log4j-sniffer
A tool that scans archives to check for vulnerable log4j versions (by palantir)
log4shelldetect
Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files (by 1lann)
log4j-sniffer | log4shelldetect | |
---|---|---|
3 | 3 | |
193 | 44 | |
0.0% | - | |
8.1 | 0.0 | |
21 days ago | over 2 years ago | |
Go | Go | |
Apache License 2.0 | The Unlicense |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
log4j-sniffer
Posts with mentions or reviews of log4j-sniffer.
We have used some of these posts to build our list of alternatives
and similar projects.
log4shelldetect
Posts with mentions or reviews of log4shelldetect.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-12-11.
-
Today is a bad day to run a VMWare cluster with thousands of java apps.
I'm not sure what you mean. You can deploy a built binary over your network and run it on all your servers. For example: curl -sSL https://github.com/1lann/log4shelldetect/releases/download/v0.0.2/log4shelldetect_0.0.2_Linux_x86_64.tar.gz | tar -C /tmp/ -zxf - log4shelldetect && /tmp/log4shelldetect -mode list /path/to/scan 2>/dev/null would download and extract the prebuilt binary to /tmp, and run it scanning at /path/to/scan, only outputting paths to potentially vulnerable .jars and ignoring warnings. You can replace the URL with your own build or distribute your own build as you wish.
- Log4j 0day being exploited
What are some alternatives?
When comparing log4j-sniffer and log4shelldetect you can also consider the following projects:
tslint - :vertical_traffic_light: An extensible linter for the TypeScript language
CVE-2021-44228-Scanner - Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
stacktrace - Stack traces for Go errors
local-log4j-vuln-scanner - Simple local scanner for vulnerable log4j instances
go-baseapp - A lightweight starting point for Go web servers
log4shell_ioc_ips - log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)