Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)
翻译 - 在磁盘和 Java 存档文件中查找易受攻击的 Log4j2 版本(Log4Shell CVE-2021-44228 和 CVE-2021-45046)
Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046
Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046
Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellen...
A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instan...
翻译 - 在任何应用程序的文件系统上检测易受攻击的 log4j 版本。它甚至能够找到隐藏在几层深处的实例。适用于 Linux、Windows 和 Mac,也适用于 Java 运行的其他任何地方!
Oh no another one
Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
翻译 - 有关 Log4j 日志库中漏洞的操作信息。
Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.
log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
翻译 - log4j-scanner 是 CISA 从开源社区的其他成员派生的一个项目,旨在帮助组织识别受 log4j 漏洞影响的潜在易受攻击的 Web 服务。
Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)
[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 ...
ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
翻译 - CVE-2021-1675/PrintNightmare 的 C# 和 Impacket 实现
Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)
CVE-2021-4034 1day
翻译 - CVE-2021-4034 1 天
Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
翻译 - CVE-2021-1675 的本地提权版
CVE-2021-40444 PoC
翻译 - CVE-2021-40444 PoC
CVE-2021-1732 Exploit
翻译 - CVE-2021-1732利用
NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
CVE-2021-41773 playground
翻译 - CVE-2021-41773 操场
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
翻译 - 利用 CVE-2021-42278 和 CVE-2021-42287 冒充标准域用户的 DA
CVE-2021-40444
翻译 - CVE-2021-40444
CVE 2021-21315 PoC
翻译 - CVE 2021-21315很少
CVE-2021-40444 Sample
翻译 - CVE-2021-40444 示例
CVE-2021-41773 CVE-2021-42013漏洞批量检测工具
CVE-2021-26855 exp
翻译 - CVE-2021-26855 EXP
cve-2021-21985 exploit
翻译 - cve-2021-21985 漏洞利用