Log4J Network Scanning/Detection on a 100k+ Node Network

This page summarizes the projects mentioned and recommended in the original post on /r/networking

CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
  1. nuclei

    Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the internet. It helps you find vulnerabilities in your applications, APIs, networks, DNS, and cloud configurations.

    Check out Nuclei (https://github.com/projectdiscovery/nuclei)

  2. CodeRabbit

    CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.

    CodeRabbit logo
  3. CVE-2021-44228_scanner

    Discontinued Scanners for Jar files that may be vulnerable to CVE-2021-44228

    The last scanner type is looking for the classes. Carnegie Mellon’s CERTCC released one that is referenced by CISA: https://github.com/CERTCC/CVE-2021-44228_scanner that look for class names and some fingerprints. Then there is a scanner written in Go that checks for the vulnerable class files and their hashes (inside JARs, WARs,EARs, and zips). https://github.com/hillu/local-log4j-vuln-scanner

  4. local-log4j-vuln-scanner

    Simple local scanner for vulnerable log4j instances

    The last scanner type is looking for the classes. Carnegie Mellon’s CERTCC released one that is referenced by CISA: https://github.com/CERTCC/CVE-2021-44228_scanner that look for class names and some fingerprints. Then there is a scanner written in Go that checks for the vulnerable class files and their hashes (inside JARs, WARs,EARs, and zips). https://github.com/hillu/local-log4j-vuln-scanner

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Well it's Log4J Patch Day. Again. (2.17 now available to fix infinite recursion bug)

    2 projects | /r/sysadmin | 18 Dec 2021
  • So how exactly is Log4j supposed to be patched/mitigated on Windows?

    7 projects | /r/sysadmin | 18 Dec 2021
  • Scan for log4j/log4shell

    3 projects | /r/HomeNetworking | 15 Dec 2021
  • Cisco AMP/Endpoint is not a great product for Endpoint Security.

    2 projects | /r/Cisco | 15 Dec 2021
  • Can PDQ be used to scan for log4j usage?

    1 project | /r/pdq | 13 Dec 2021

Did you know that Go is
the 4th most popular programming language
based on number of references?