py4jshell
Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code. (by Narasimha1997)
L4sh
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries. (by cyberstruggle)
py4jshell | L4sh | |
---|---|---|
3 | 1 | |
86 | 254 | |
- | 0.0% | |
2.6 | 0.0 | |
over 2 years ago | over 2 years ago | |
Python | Python | |
GNU General Public License v3.0 or later | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
py4jshell
Posts with mentions or reviews of py4jshell.
We have used some of these posts to build our list of alternatives
and similar projects.
- GitHub - Narasimha1997/py4jshell: Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.
-
py4jshell
Simulating Log4j Remote Code Execution (RCE) CVE-2021-44228 vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution on URLs. This repository is a POC of how Log4j remote code execution vulnerability works. Link to repository
L4sh
Posts with mentions or reviews of L4sh.
We have used some of these posts to build our list of alternatives
and similar projects.
What are some alternatives?
When comparing py4jshell and L4sh you can also consider the following projects:
log4j-shell-poc - A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
EJS-Exploit - Remote Code Execution EJS Web Applications using express-fileupload
log4jpwn - log4j rce test environment and poc
SQLMap - Automatic SQL injection and database takeover tool
log4j-scan-turbo - Multithreaded log4j vulnerability scanner using only bash! Tests all JNDI protocols, HTTP GET/POST, and 84 headers.
Log4Shell-IOCs - A collection of intelligence about Log4Shell and its exploitation activity.