log4shell-tool
Log4Shell Enumeration, Mitigation and Attack Detection Tool (by datto)
Get-log4j-Windows.ps1
Identifying all log4j components across all windows servers, entire domain, can be multi domain. CVE-2021-44228 (by KeysAU)
log4shell-tool | Get-log4j-Windows.ps1 | |
---|---|---|
4 | 3 | |
15 | 7 | |
- | - | |
0.0 | 3.6 | |
10 months ago | over 2 years ago | |
PowerShell | ||
Apache License 2.0 | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
log4shell-tool
Posts with mentions or reviews of log4shell-tool.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-12-20.
- Lacerte Tax - Log4j
-
Evidence of a log4j attack found - Now what?
Start with confirming that an incident took place. My five-minute understanding of Datto's ComStore log4shell tool is that it does two things:
- Log4j PDQ scan profile
-
Automating with PowerShell: Detecting Log4j
For an in-depth explanation of what variables are required, please check the 'Usage' section of the readme viewable at https://github.com/datto/log4shell-tool. This explains the three variables that need to be set and what values to set them to.
Get-log4j-Windows.ps1
Posts with mentions or reviews of Get-log4j-Windows.ps1.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-12-16.
- Log4j windows remote and local scan scripts
-
Powershell Script to check for Log4j Vulnerability
Multi serverq, remote hosts https://github.com/KeysAU/Get-log4j-Windows.ps1
- Automating with PowerShell: Detecting Log4j
What are some alternatives?
When comparing log4shell-tool and Get-log4j-Windows.ps1 you can also consider the following projects:
CIPP - CIPP is a M365 multitenant management solution
CVE-2021-44228-Log4Shell-Hashes - Hashes for vulnerable LOG4J versions
incidentresponse
CVE-2021-44228_scanner - Scanners for Jar files that may be vulnerable to CVE-2021-44228
PowerShellSnippets
Log4Shell-Automated - This is an automated script to scan for Log4J vulnerabilities. This is based off of the Datto script.
signature-base - YARA signature and IOC database for my scanners and tools
Get-log4j-Windows-local - Identifying all log4j components across on local windows servers. CVE-2021-44228
log4shell-tool vs CIPP
Get-log4j-Windows.ps1 vs CVE-2021-44228-Log4Shell-Hashes
log4shell-tool vs incidentresponse
Get-log4j-Windows.ps1 vs CVE-2021-44228_scanner
log4shell-tool vs PowerShellSnippets
Get-log4j-Windows.ps1 vs Log4Shell-Automated
log4shell-tool vs signature-base
Get-log4j-Windows.ps1 vs Get-log4j-Windows-local
log4shell-tool vs CVE-2021-44228-Log4Shell-Hashes
Get-log4j-Windows.ps1 vs CIPP
log4shell-tool vs Log4Shell-Automated