关联漏洞
描述
Scanner for Log4j RCE CVE-2021-44228
介绍
# Log4j-RCE-Exploiter
Scanner for Log4j RCE CVE-2021-44228

# Installation
For installation, Run the Following command with SUPERUSER (ROOT)
```
▶ cd Log4j-RCE-Exploiter
▶ chmod 777 installer.sh
▶ ./installer.sh
```
# Usage
```
▶ log4jExploiter -d tesla.com -b 6nuulng8dd2sivtd3kht31s9e0kq8f.burpcollaborator.net
-h, --help Display help
-l, --url-list List of domain/subdomain/ip to be used for scanning.
-d, --domain The domain name to which all subdomains and itself will be checked.
-b, --burpcollabid Burp collabrator client id address or interactsh domain address.
```
文件快照
[4.0K] /data/pocs/dfae565ad05c026c3cf8008c6ddbab4442ec48b8
├── [ 122] installer.sh
├── [ 43K] log4j.png
├── [1.1K] README.md
└── [ 184] test.json
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。