log4j2-rce-poc
A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228/Log4Shell). (by unlimitedsola)
log4shell-detector
Detector for Log4Shell exploitation attempts (by Neo23x0)
log4j2-rce-poc | log4shell-detector | |
---|---|---|
1 | 3 | |
3 | 731 | |
- | - | |
4.1 | 0.0 | |
over 2 years ago | over 2 years ago | |
Kotlin | Python | |
- | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
log4j2-rce-poc
Posts with mentions or reviews of log4j2-rce-poc.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-12-17.
-
Log4J - Have your customer been breached? What have you seen if anything?
However, when using JNDI lookups, if you return properly formatted JNDI data (from a malicious server) then Java will execute that code. You can see this in PoC code: https://github.com/unlimitedsola/log4j2-rce-poc/blob/master/payload-server/src/main/kotlin/Main.kt
log4shell-detector
Posts with mentions or reviews of log4shell-detector.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-12-17.
-
Log4J - Have your customer been breached? What have you seen if anything?
If you're talking about Florian's exploit detection note that nearly every hit in practice is going to be a DNS probe, like the Huntress one.
- Is ombi vulnerable to log4j exploit?
-
Log4j-exploiting worms appear to be maturing rapidly, with multiple threat groups working on worms concurrently. The first may be released into the wild within 24-48h.
Found a git that helps detect if the service is being exploited.
What are some alternatives?
When comparing log4j2-rce-poc and log4shell-detector you can also consider the following projects:
Log4j-RCE-Scanner - Remote command execution vulnerability scanner for Log4j.
log4shell - Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
DogWalk-rce-poc - š¾Dogwalk PoC (using diagcab file to obtain RCE on windows)
CVE-2021-44228_scanner - Scanners for Jar files that may be vulnerable to CVE-2021-44228
fuelcms-rce - Fuel CMS 1.4 - Remote Code Execution