关联漏洞
描述
pythonic pure python RCE exploit for CVE-2021-44228 log4shell
介绍
# log4py
pythonic pure python RCE exploit for CVE-2021-44228 log4shell
1. run a vulnerable service like https://github.com/zzzz0317/log4j2-vulnerable-spring-app
2. change settings in exploit.py
3. pwn
This is for educational use only (mostly for my own lol)<br>
This might only be useful after some alterations<br>
if you do illegal stuff - fuck you<br>
#TODO: <br>
- Add compilation capability through javac for more version flexibility<br>
- Add more Attack classes for other services<br>
- Add more of everything!<br>
- Actual tests (lol)<br>
- Get out of poc stage
文件快照
[4.0K] /data/pocs/0d2ab76b74a86c1d40977460819bae06edb3510c
├── [3.2K] attacks.py
├── [ 700] exploit.py
├── [3.1K] handlers.py
├── [5.7K] payloads.py
└── [ 572] README.md
0 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。