pythonic pure python RCE exploit for CVE-2021-44228 log4shell# log4py
pythonic pure python RCE exploit for CVE-2021-44228 log4shell
1. run a vulnerable service like https://github.com/zzzz0317/log4j2-vulnerable-spring-app
2. change settings in exploit.py
3. pwn
This is for educational use only (mostly for my own lol)<br>
This might only be useful after some alterations<br>
if you do illegal stuff - fuck you<br>
#TODO: <br>
- Add compilation capability through javac for more version flexibility<br>
- Add more Attack classes for other services<br>
- Add more of everything!<br>
- Actual tests (lol)<br>
- Get out of poc stage
[4.0K] /data/pocs/0d2ab76b74a86c1d40977460819bae06edb3510c
├── [3.2K] attacks.py
├── [ 700] exploit.py
├── [3.1K] handlers.py
├── [5.7K] payloads.py
└── [ 572] README.md
0 directories, 5 files