关联漏洞
描述
Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.
介绍
# Log4Shell-obfuscated-payloads-generator
Log4Shell-obfuscated-payloads-generator can generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.
[The design idea of Log4Shell-obfuscated-payloads-generator](https://r3kind1e.github.io/2022/05/26/Log4Shell-obfuscated-payloads-generator/)
## Installation
```
git clone https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator.git
```
Log4Shell-obfuscated-payloads-generator works out of the box with Python version 3.x on any platform.
## Usage
To get a list of basic options use:
```
python3 Log4Shell-obfuscated-payloads-generator.py -h
```
To get usage examples use:
```
python3 Log4Shell-obfuscated-payloads-generator.py -hh
```
## Screenshots
`-h`: get a list of basic options

`-hh`: get usage examples

With a single option to generate payloads, the `-s` option specifies the malicious server:
```
--generate-primary-obfuscated-cve-2021-44228-payload 8 -s ck0pf4l6fmq4w0v17o7t894txk3arz.oastify.com
```


```
--generate-primary-obfuscated-cve-2021-45046-payload 4 -s x53a0p6r07bphlgms9setupei5owcl.oastify.com
```

```
--generate-secondary-obfuscated-cve-2021-44228-payload 5 -s oia1rpap41mhxkp6rdbbywit1k7avz.oastify.com
```


```
--generate-secondary-obfuscated-cve-2021-45046-payload 5 -s 3vzg44n4hgzwaz2l4soqbbv8ezkq8f.oastify.com
```

With multiple options to generate payloads, the `-s` option specifies a malicious server:
```
--generate-primary-obfuscated-cve-2021-44228-payload 4 --generate-secondary-obfuscated-cve-2021-44228-payload 4 -s exfr6fpfjr17ca4w63q1dmxjgam2ar.oastify.com
```

Without specifying a malicious server with the `-s` option, the `{{callback_host}}` placeholder will be preserved in the generated payloads:
```
--generate-primary-obfuscated-cve-2021-44228-payload 3
```

```
--generate-primary-obfuscated-cve-2021-45046-payload 3 --generate-secondary-obfuscated-cve-2021-45046-payload 7
```

文件快照
[4.0K] /data/pocs/3445532377507d993acea96e60a6ee533a1d767c
├── [4.0K] img
│ ├── [169K] burp collaborator client1.png
│ ├── [169K] burp-collaborator-client1.png
│ ├── [200K] burp collaborator client2.png
│ ├── [200K] burp-collaborator-client2.png
│ ├── [186K] help.png
│ ├── [358K] primary44228.png
│ ├── [311K] primary44228secondary44228.png
│ ├── [158K] primary44228-without-server.png
│ ├── [284K] primary45046.png
│ ├── [314K] primary45046secondary45046.png
│ ├── [409K] secondary44228.png
│ ├── [325K] secondary45046.png
│ └── [175K] usage-examples.png
├── [1.0K] LICENSE
├── [ 27K] Log4Shell-obfuscated-payloads-generator.py
├── [4.0K] payloads_template
│ ├── [ 577] cve_2021_44228_payloads_template.txt
│ └── [ 347] cve_2021_45046_payloads_template.txt
├── [4.0K] primary_obfuscated_template
│ ├── [ 554] delimiter_obfuscated.txt
│ ├── [ 798] lower_case_obfuscated.txt
│ └── [ 798] upper_case_obfuscated.txt
├── [2.4K] README-CN.md
├── [2.5K] README.md
├── [ 16] requirements.txt
└── [4.0K] secondary_obfuscated_template
├── [1.3K] delimiter_obfuscated.txt
├── [ 278] lookup_prefix_char_obfuscated.txt
├── [1.5K] lower_case_obfuscated.txt
└── [1.5K] upper_case_obfuscated.txt
4 directories, 27 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。