logging-log4j1
tsunami-security-scanner
logging-log4j1 | tsunami-security-scanner | |
---|---|---|
5 | 4 | |
872 | 8,121 | |
- | 0.5% | |
0.0 | 7.5 | |
over 1 year ago | 6 days ago | |
Java | Java | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
logging-log4j1
-
CrowdSec is now able to detect and mitigate log4j CVE-2021-44228
a check against all repos listed under https://github.com/apache/log4j/network/dependents is more effective in finding all effected.
-
Zero-Day RCE Vulnerability CVE-2021-44228 aka Log4Shell: What We Know So Far
why not try testing against all repos listed here: https://github.com/apache/log4j/network/dependents ?
- 2021-12-10 - Cool Query Friday - Hunting Apache Log4j CVE-2021-44228 (Log4Shell)
- Log4j RCE Found
tsunami-security-scanner
- Qualys Community Edition for vuln. scanning?... limitations?
-
Log4j RCE Found
https://github.com/google/tsunami-security-scanner (I bet it would be easy to write a plugin for https://github.com/projectdiscovery/nuclei as well.)
To see if there are injection points statically, I work on a tool (https://github.com/returntocorp/semgrep) that someone else already wrote a check with: https://twitter.com/lapt0r/status/1469096944047779845 or look for the mitigation with `semgrep -e '$LOGGER.formatMsgNoLookups(true)' --lang java`. For the mitigation, the string should be unique enough that just ripgrep works well too.
-
Security and self-hosting, bumping a 7 months old thread
Thanks to you I just reenabled Tsunami https://github.com/google/tsunami-security-scanner. Also had software called something like vuln (blue logo with a yellow eye in the middle) running. but the hard disk of the server died --sadly and I can't remember how it was called.-- https://vuls.io/
-
Awesome Penetration Testing
Tsunami - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
What are some alternatives?
Apache Log4j 2 - Apache Log4j 2 is a versatile, feature-rich, efficient logging API and backend for Java.
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
Logback - The reliable, generic, fast and flexible logging framework for Java.
docker-gvm - Docker container stack for GVM / OpenVAS
semgrep - Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
scapy - Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
GHSA-jfh8-c2jp-5v3q
go-cache - An in-memory key:value store/cache (similar to Memcached) library for Go, suitable for single-machine applications.
marshalsec
ZAP - The ZAP core project
log4j_CVE-2021-44228_tester - Multithreaded log4j vulnerability scanner using only bash! Tests all JNDI protocols, HTTP GET/POST, and 84 headers. [Moved to: https://github.com/ssstonebraker/log4j-scan-turbo]
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.