#Log4j
#CVE-2021
Public IoCs about log4j CVE-2021-44228
https://github.com/authomize/log4j-log4shell-affected
@BlueRedTeam
#CVE-2021
Public IoCs about log4j CVE-2021-44228
https://github.com/authomize/log4j-log4shell-affected
@BlueRedTeam
GitHub
GitHub - authomize/log4j-log4shell-affected: Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell…
Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vu...
#CVE-2021
An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228
https://github.com/Hydragyrum/evil-rmi-server
@BlueRedTeam
An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228
https://github.com/Hydragyrum/evil-rmi-server
@BlueRedTeam
GitHub
GitHub - Hydragyrum/evil-rmi-server: An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228
An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228 - GitHub - Hydragyrum/evil-rmi-server: An evil RMI server that can launch an arbitrary command. May be usef...
#CVE-2021
#Log4j
Spring Boot Log4j - CVE-2021-44228 Docker Lab
https://github.com/twseptian/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab
@BlueRedTeam
#Log4j
Spring Boot Log4j - CVE-2021-44228 Docker Lab
https://github.com/twseptian/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab
@BlueRedTeam
GitHub
GitHub - twseptian/spring-boot-log4j-cve-2021-44228-docker-lab: Spring Boot Log4j - CVE-2021-44228 Docker Lab
Spring Boot Log4j - CVE-2021-44228 Docker Lab . Contribute to twseptian/spring-boot-log4j-cve-2021-44228-docker-lab development by creating an account on GitHub.
#CVE-2021
#Log4j2
IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228
https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228
@BlueRedTeam
#Log4j2
IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228
https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228: IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228
IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 - GitHub - Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228: IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228
#Log4j
#CVE-2021
Check list of URLs against Log4j vulnerability CVE-2021-44228
https://github.com/OlafHaalstra/log4jcheck
@BlueRedTeam
#CVE-2021
Check list of URLs against Log4j vulnerability CVE-2021-44228
https://github.com/OlafHaalstra/log4jcheck
@BlueRedTeam
GitHub
GitHub - OlafHaalstra/log4jcheck: Check list of URLs against Log4j vulnerability CVE-2021-44228
Check list of URLs against Log4j vulnerability CVE-2021-44228 - GitHub - OlafHaalstra/log4jcheck: Check list of URLs against Log4j vulnerability CVE-2021-44228
#CVE-2021
#log4j
An agent to hotpatch the log4j RCE from CVE-2021-44228.
https://github.com/corretto/hotpatch-for-apache-log4j2
@BlueRedTeam
#log4j
An agent to hotpatch the log4j RCE from CVE-2021-44228.
https://github.com/corretto/hotpatch-for-apache-log4j2
@BlueRedTeam
GitHub
GitHub - corretto/hotpatch-for-apache-log4j2: An agent to hotpatch the log4j RCE from CVE-2021-44228.
An agent to hotpatch the log4j RCE from CVE-2021-44228. - corretto/hotpatch-for-apache-log4j2
#CVE-2021
#Log4J
Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)
https://github.com/corneacristian/Log4J-CVE-2021-44228-RCE
@BlueRedTeam
#Log4J
Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)
https://github.com/corneacristian/Log4J-CVE-2021-44228-RCE
@BlueRedTeam
GitHub
GitHub - corneacristian/Log4J-CVE-2021-44228-RCE: Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)
Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE) - GitHub - corneacristian/Log4J-CVE-2021-44228-RCE: Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)
#CVE-2021
#Nmap
#log4Shell
Nmap NSE noscripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)
https://github.com/Diverto/nse-log4shell
@BlueRedTeam
#Nmap
#log4Shell
Nmap NSE noscripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)
https://github.com/Diverto/nse-log4shell
@BlueRedTeam
GitHub
GitHub - Diverto/nse-log4shell: Nmap NSE noscripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)
Nmap NSE noscripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228) - Diverto/nse-log4shell
👍1
#CVE-2021
#log4Shell
pure pythonic python RCE for CVE-2021-44228 log4shell
https://github.com/dotPY-hax/log4py
@BlueRedTeam
#log4Shell
pure pythonic python RCE for CVE-2021-44228 log4shell
https://github.com/dotPY-hax/log4py
@BlueRedTeam
GitHub
GitHub - dotPY-hax/log4py: pythonic pure python RCE exploit for CVE-2021-44228 log4shell
pythonic pure python RCE exploit for CVE-2021-44228 log4shell - GitHub - dotPY-hax/log4py: pythonic pure python RCE exploit for CVE-2021-44228 log4shell
#CVE-2021
#log4j2
Test locally an exploit for Log4J2's CVE-2021-44228 (Log4Shell)
https://github.com/sunnyvale-it/CVE-2021-44228-PoC
@BlueRedTeam
#log4j2
Test locally an exploit for Log4J2's CVE-2021-44228 (Log4Shell)
https://github.com/sunnyvale-it/CVE-2021-44228-PoC
@BlueRedTeam
GitHub
GitHub - sunnyvale-it/CVE-2021-44228-PoC: CVE-2021-44228 (Log4Shell) Proof of Concept
CVE-2021-44228 (Log4Shell) Proof of Concept. Contribute to sunnyvale-it/CVE-2021-44228-PoC development by creating an account on GitHub.
#CVE-2021
#Red_Team
#Blue_Team
Some files for red team/blue team investigations into CVE-2021-44228
https://github.com/kimobu/cve-2021-44228
@BlueRedTeam
#Red_Team
#Blue_Team
Some files for red team/blue team investigations into CVE-2021-44228
https://github.com/kimobu/cve-2021-44228
@BlueRedTeam
GitHub
GitHub - kimobu/cve-2021-44228: Some files for red team/blue team investigations into CVE-2021-44228
Some files for red team/blue team investigations into CVE-2021-44228 - GitHub - kimobu/cve-2021-44228: Some files for red team/blue team investigations into CVE-2021-44228
#CVE-2021
Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers.
https://github.com/KainsRache/anti-jndi
@BlueRedTeam
Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers.
https://github.com/KainsRache/anti-jndi
@BlueRedTeam
GitHub
GitHub - KainsRache/anti-jndi: Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common…
Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers. - GitHub - KainsRache/anti-jndi: Fun things against the abuse of the recent CVE-2021-44...
#CVE-2021
#Log4j
fail2ban filter that catches attacks againts log4j CVE-2021-44228
https://github.com/atnetws/fail2ban-log4j
@BlueRedTeam
#Log4j
fail2ban filter that catches attacks againts log4j CVE-2021-44228
https://github.com/atnetws/fail2ban-log4j
@BlueRedTeam
GitHub
GitHub - atnetws/fail2ban-log4j: fail2ban filter that catches attacks againts log4j CVE-2021-44228
fail2ban filter that catches attacks againts log4j CVE-2021-44228 - atnetws/fail2ban-log4j
#CVE-2021
#Log4j
This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).
https://github.com/pedrohavay/exploit-CVE-2021-44228
@BlueRedTeam
#Log4j
This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).
https://github.com/pedrohavay/exploit-CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - pedrohavay/exploit-CVE-2021-44228: This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).
This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228). - pedrohavay/exploit-CVE-2021-44228
#CVE-2021
Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes
https://github.com/0xRyan/log4j-nullroute
@BlueRedTeam
Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes
https://github.com/0xRyan/log4j-nullroute
@BlueRedTeam
GitHub
GitHub - 0xRyan/log4j-nullroute: Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes
Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes - GitHub - 0xRyan/log4j-nullroute: Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes
LaserShark.pdf
1.5 MB
#Red_Team
"LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems", 2021.
// A novel approach to infiltrate data to air-gapped systems without any additional hardware on-site. By aiming lasers at already built-in LEDs and recording their response, we are the first to enable a long-distance (25 m), covert communication channel. The approach can be used against any office device that operates LEDs at the CPU’s GPIO interface...
@BlueRedTeam
"LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems", 2021.
// A novel approach to infiltrate data to air-gapped systems without any additional hardware on-site. By aiming lasers at already built-in LEDs and recording their response, we are the first to enable a long-distance (25 m), covert communication channel. The approach can be used against any office device that operates LEDs at the CPU’s GPIO interface...
@BlueRedTeam