log4shell_ioc_ips
apache-log4j-poc
log4shell_ioc_ips | apache-log4j-poc | |
---|---|---|
3 | 3 | |
36 | 105 | |
- | - | |
0.0 | 3.8 | |
over 2 years ago | over 2 years ago | |
Shell | Java | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
log4shell_ioc_ips
- J4Shell / J4Log IoC IP List (massive)
-
IPs exploiting the log4j2 CVE-2021-44228 detected by the crowdsec community
found this in another thread. get it into crowdsec? https://github.com/hackinghippo/log4shell_ioc_ips
- Log4j 0day being exploited
apache-log4j-poc
-
2021-12-10 - Cool Query Friday - Hunting Apache Log4j CVE-2021-44228 (Log4Shell)
Proof of Concept
-
Log4j 0day being exploited
Exploit: https://github.com/tangxiaofeng7/apache-log4j-poc
-
Log4j RCE Found
Are there any mitigations in recent JVMs?
I tried reproducing this, and got the POC to hit the LDAP server, but it wouldn't load the test payload.
See also:
- https://github.com/tangxiaofeng7/apache-log4j-poc
What are some alternatives?
CVE-2021-44228-Scanner - Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
nuclei-templates - Community curated list of templates for the nuclei engine to find security vulnerabilities.
local-log4j-vuln-scanner - Simple local scanner for vulnerable log4j instances
rogue-jndi - A malicious LDAP server for JNDI injection attacks
get-log4j-exploit-payload
lunasec - LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
log4shelldetect - Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files
CVE-2021-44228 - OpenIOC rules to facilitate hunting for indicators of compromise
CVE-2021-44228-Log4Shell-Hashes - Hashes for vulnerable LOG4J versions
Log4j-CVE-Detect - Detections for CVE-2021-44228 inside of nested binaries
jdk8u - https://wiki.openjdk.org/display/jdk8u