exploitdb
WRITEUP
by Chan Nyein Wai · textremotejava
https://www.exploit-db.com/exploits/51183
This is a writeup describing the exploitation of CVE-2021-44228 (Log4j) in AD Manager Plus before version 7122. It details the process of achieving RCE via LDAP injection in the `methodToCall` parameter of the `ADSearch.cc` request.
Classification
Writeup 90%
Target:
AD Manager Plus before 7122
Auth required
Prerequisites:
Access to the target application · Proxy tool like Burp Suite for interception · LDAP server for callback
exploitdb
WORKING POC
by leonjza · pythonremotejava
https://www.exploit-db.com/exploits/50590
This exploit leverages CVE-2021-44228 (Log4Shell) to extract environment variables or other sensitive data from vulnerable Apache Log4j2 instances via JNDI LDAP injection. It sets up a malicious LDAP server to capture leaked data when the target processes the payload.
Classification
Working Poc 95%
Target:
Apache Log4j2 <= 2.14.1
No auth needed
Prerequisites:
Network access to the target · Target application must log the attacker-controlled input
exploitdb
WORKING POC
by kozmer · pythonremotejava
https://www.exploit-db.com/exploits/50592
This exploit leverages CVE-2021-44228 (Log4Shell) to achieve remote code execution by generating a malicious LDAP payload that triggers JNDI injection in vulnerable Log4j versions. It sets up an LDAP server and HTTP server to deliver a reverse shell payload.
Classification
Working Poc 95%
Target:
Apache Log4j 2 versions 2.0-beta-9 to 2.14.1
No auth needed
Prerequisites:
Java JDK 1.8 · marshalsec.jar · network access to target
nomisec
SCANNER
3,436 stars
by fullhunt · remote
https://github.com/fullhunt/log4j-scan
This repository contains a scanner for detecting CVE-2021-44228 (Log4j RCE) and related vulnerabilities (CVE-2021-45046, CVE-2022-42889). It supports DNS callback validation, WAF bypass payloads, and extensive fuzzing for HTTP headers, POST data, and JSON parameters.
Classification
Scanner 95%
Target:
Apache Log4j (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to target · DNS callback provider (e.g., interact.sh)
nomisec
WORKING POC
1,848 stars
by kozmer · remote
https://github.com/kozmer/log4j-shell-poc
This repository contains a functional Proof-of-Concept (PoC) for CVE-2021-44228 (Log4Shell), including a Python script to automate the exploit and a vulnerable Java web application for testing. The exploit leverages JNDI injection via LDAP to achieve remote code execution.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java JDK 1.8.0_20 · Python 3.x · Netcat for reverse shell · Vulnerable Log4j version in target application
nomisec
WORKING POC
1,139 stars
by christophetd · poc
https://github.com/christophetd/log4shell-vulnerable-app
This repository contains a Spring Boot application intentionally vulnerable to CVE-2021-44228 (Log4Shell). It demonstrates the exploitation of the Log4j JNDI injection vulnerability via a malicious LDAP server to achieve remote code execution.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1 (via Spring Boot 2.6.1)
No auth needed
Prerequisites:
Docker to run the vulnerable app · JNDIExploit tool to set up a malicious LDAP server · Network access to the target application
nomisec
WRITEUP
949 stars
by Puliczek · remote
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
This repository provides a detailed writeup on various bypass techniques for CVE-2021-44228 (Log4Shell), including environment variables, case manipulation, Unicode tricks, and other obfuscation methods to evade WAFs and patches. It does not contain executable exploit code but documents methods for crafting payloads.
Classification
Writeup 100%
Target:
Apache Log4j 2.0 to 2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j version · Ability to inject log messages
nomisec
SCANNER
862 stars
by logpresso · poc
https://github.com/logpresso/CVE-2021-44228-Scanner
This repository contains a scanner tool for detecting and mitigating multiple Log4j and Logback vulnerabilities, including CVE-2021-44228. It supports scanning nested JAR files and applying patches by removing vulnerable classes.
Classification
Scanner 100%
Target:
Log4j (1.x and 2.x), Logback
No auth needed
Prerequisites:
Access to target directory or system
nomisec
SCANNER
840 stars
by f0ng · remote
https://github.com/f0ng/log4j2burpscanner
This repository contains a Burp Suite extension for scanning and detecting CVE-2021-44228 (Log4j2 RCE). It includes various payloads and bypass techniques for testing vulnerabilities in HTTP requests.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Burp Suite · Network access to target · Vulnerable Log4j2 version
nomisec
SCANNER
640 stars
by mergebase · poc
https://github.com/mergebase/log4j-detector
This repository contains a Java-based scanner for detecting vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, CVE-2021-44832) by examining compiled class files for specific string literals. It is designed to identify vulnerable instances of Log4J across file systems, including nested archives.
Classification
Scanner 100%
Target:
Apache Log4j (versions 2.x and 1.x)
No auth needed
Prerequisites:
Java runtime environment · Access to the target file system
nomisec
WORKING POC
496 stars
by corretto · poc
https://github.com/corretto/hotpatch-for-apache-log4j2
This repository contains a Java agent-based hotpatch tool designed to mitigate CVE-2021-44228 (Log4Shell) and CVE-2021-45046 by dynamically patching the `JndiLookup.lookup()` method in running JVM processes without requiring a restart. The tool uses bytecode manipulation via ASM to override vulnerable methods.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (specifically versions affected by CVE-2021-44228 and CVE-2021-45046)
No auth needed
Prerequisites:
Access to the target JVM process ID · Compatible JDK version (8, 11, 15, or 17) · No `-XX:+DisableAttachMechanism` flag on the target JVM · Matching user permissions for the target process
nomisec
WORKING POC
469 stars
by jas502n · remote
https://github.com/jas502n/Log4j2-CVE-2021-44228
This repository provides a proof-of-concept for CVE-2021-44228, demonstrating remote code execution via Log4j2's JNDI lookup feature. It includes setup instructions, exploit examples via User-Agent injection, and references to JNDI exploitation tools.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (specifically 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j2 version (2.0-beta9 to 2.14.1) · Network access to the target · LDAP/HTTP server for payload delivery
nomisec
SCANNER
438 stars
by fox-it · poc
https://github.com/fox-it/log4j-finder
This repository contains a Python script (`log4j-finder.py`) designed to scan filesystems and Java Archive files (JAR, WAR, EAR) for Log4j2 libraries vulnerable to CVE-2021-44228 (Log4Shell) and related CVEs. It identifies vulnerable versions by comparing MD5 hashes of `JndiManager.class` against known good and bad hashes.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (specifically versions affected by CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)
No auth needed
Prerequisites:
Access to the target filesystem or Java Archive files
nomisec
SCANNER
397 stars
by 0xInfection · remote
https://github.com/0xInfection/LogMePwn
LogMePwn is a multi-protocol scanner for detecting CVE-2021-44228 (Log4j RCE) across HTTP, IMAP, SSH, and FTP. It supports Canary Tokens, custom payloads, and multi-threaded scanning.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to vulnerable Log4j instances · Ability to send crafted requests to trigger JNDI lookups
nomisec
SCANNER
352 stars
by Diverto · poc
https://github.com/Diverto/nse-log4shell
This repository provides Nmap NSE scripts to detect CVE-2021-44228 (Log4Shell) by sending crafted payloads to exposed services and checking DNS logs for callbacks. It includes various bypass techniques and supports custom DNS logging servers.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (up to 2.15.0)
No auth needed
Prerequisites:
Nmap with NSE support · Access to a DNS logging service (e.g., dnslog.cn, Burp Collaborator)
nomisec
SCANNER
350 stars
by CERTCC · poc
https://github.com/CERTCC/CVE-2021-44228_scanner
This repository contains a scanner for detecting the presence of JndiLookup.class in JAR, WAR, EAR, and ZIP files, which may indicate vulnerability to CVE-2021-44228 (Log4Shell). It includes scripts for PowerShell, Python, and Bash to search for vulnerable Log4j versions.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.15.0)
No auth needed
Prerequisites:
Access to the filesystem containing JAR/WAR/EAR/ZIP files
nomisec
SCANNER
293 stars
by back2root · poc
https://github.com/back2root/log4shell-rex
This repository contains a regex generator and scanner for detecting Log4Shell (CVE-2021-44228) exploitation attempts. It generates a comprehensive regex pattern to match various obfuscated payloads used in Log4Shell attacks.
Classification
Scanner 90%
Target:
Log4j versions affected by CVE-2021-44228
No auth needed
Prerequisites:
Access to logs or network traffic to scan for exploitation attempts
nomisec
SCANNER
248 stars
by rubo77 · poc
https://github.com/rubo77/log4j_checker_beta
This repository contains scripts to scan for Log4j (CVE-2021-44228) vulnerabilities by checking for JAR files containing 'JndiLookup.class' and analyzing system packages. It includes Linux/macOS (Bash) and Windows (PowerShell) scripts for detection.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
Access to target filesystem · Basic command execution privileges
nomisec
WORKING POC
210 stars
by NS-Sp4ce · remote
https://github.com/NS-Sp4ce/Vm4J
This repository contains a C# proof-of-concept exploit for CVE-2021-44228 (Log4Shell), targeting VMware products like vCenter, Horizon, and NSX. The exploit leverages HTTP headers to trigger JNDI-based remote code execution via the Log4j vulnerability.
Classification
Working Poc 90%
Target:
VMware vCenter, Horizon, NSX (affected by Log4j CVE-2021-44228)
No auth needed
Prerequisites:
Network access to vulnerable VMware service · Log4j 2.x with JNDI lookups enabled
nomisec
SCANNER
195 stars
by takito1812 · poc
https://github.com/takito1812/log4j-detect
This Python script detects CVE-2021-44228 (Log4j) by sending crafted DNS callback payloads via HTTP headers and parameters to a list of URLs. It uses multithreading for efficiency and relies on external DNS logging services (e.g., Burp Collaborator) for confirmation.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
List of target URLs · DNS callback server (e.g., Burp Collaborator, interactsh)
nomisec
WORKING POC
183 stars
by HyCraftHD · poc
https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j. It includes an LDAP server setup to deliver serialized payloads, with examples for both RCE and data exfiltration.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions before 2.15.0)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · JNDI LDAP lookup enabled
nomisec
WORKING POC
177 stars
by alexandre-lavoie · poc
https://github.com/alexandre-lavoie/python-log4rce
This repository contains a pure Python3 PoC for CVE-2021-44228 (Log4Shell), including an HTTP/LDAP server setup and customizable Java payloads for RCE. It supports automated HTTP requests and manual JNDI injection.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to vulnerable Log4j instance · Outbound LDAP/HTTP access from target
nomisec
WORKING POC
164 stars
by puzzlepeaches · remote
https://github.com/puzzlepeaches/Log4jUnifi
This repository contains a functional exploit for CVE-2021-44228 (Log4Shell) targeting the Unifi Network Application. It automates the exploitation process by leveraging a malicious LDAP server (RogueJNDI) to deliver a reverse shell payload.
Classification
Working Poc 95%
Target:
Unifi Network Application (affected by Log4Shell)
No auth needed
Prerequisites:
Java and Maven for compiling RogueJNDI · Python 3 with required dependencies · Network access to the target Unifi instance
nomisec
WRITEUP
156 stars
by mubix · poc
https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes
This repository provides hashes for vulnerable Log4j versions to aid in detection of CVE-2021-44228 (Log4Shell). It includes references to detection rules, vulnerable VMware products, and a PoC JNDI/LDAP server.
Classification
Writeup 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
none
nomisec
WORKING POC
151 stars
by BinaryDefense · poc
https://github.com/BinaryDefense/log4j-honeypot-flask
This repository contains a low-interaction honeypot designed to detect exploitation attempts targeting CVE-2021-44228 (Log4Shell). It monitors HTTP requests for suspicious patterns (e.g., '${') and alerts via webhooks (Slack/Teams/Mattermost).
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
Network access to the honeypot · Webhook URL configured for alerts
nomisec
SCANNER
126 stars
by NorthwaveSecurity · poc
https://github.com/NorthwaveSecurity/log4jcheck
This repository contains a Python-based scanner for detecting CVE-2021-44228 (Log4Shell) by injecting JNDI payloads into HTTP headers and GET requests, then checking for DNS callbacks. It is designed to identify vulnerable systems by leveraging DNS logging.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
DNS server with logging configured · Outbound DNS access from target system
nomisec
WORKING POC
126 stars
by boundaryx · poc
https://github.com/boundaryx/cloudrasp-log4j2
This repository contains a Runtime Application Self-Protection (RASP) module designed to mitigate CVE-2021-44228 (Log4j2 JNDI injection vulnerability). It uses Java instrumentation to inject hooks into the JVM, specifically targeting the `javax.naming.InitialContext` class to block malicious JNDI lookups.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
Java application using vulnerable Log4j2 version · Ability to modify JVM arguments or inject agent into running process
nomisec
WORKING POC
109 stars
by puzzlepeaches · poc
https://github.com/puzzlepeaches/Log4jCenter
This repository contains a functional exploit for CVE-2021-44228 (Log4Shell) targeting VMware vCenter. It automates the exploitation process to achieve remote code execution via JNDI injection, with modules for reverse shell and SAML database exfiltration.
Classification
Working Poc 95%
Target:
VMware vCenter (affected by Log4j vulnerability)
No auth needed
Prerequisites:
Java and Maven for compiling Rogue-JNDI · Python 3 with required dependencies · Network access to target vCenter · Callback server for payload delivery
nomisec
WORKING POC
108 stars
by simonis · poc
https://github.com/simonis/Log4jPatch
This is a Java agent-based hotpatch tool designed to mitigate CVE-2021-44228 (Log4Shell) by dynamically redefining the `JndiLookup` class in running JVM processes to disable the vulnerable `lookup` method. It uses ASM for bytecode manipulation and the Java Attach API to inject the agent into target processes.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (specifically targeting JndiLookup class)
No auth needed
Prerequisites:
Access to the target JVM process ID(s) · Sufficient permissions to attach to the target JVM process
nomisec
WORKING POC
105 stars
by Adikso · poc
https://github.com/Adikso/minecraft-log4j-honeypot
This repository is a honeypot designed to emulate a vulnerable Minecraft server (1.7.2 - 1.16.5) to capture and analyze Log4j exploitation attempts (CVE-2021-44228). It logs JNDI injection attempts and fetches payloads from LDAP servers for analysis.
Classification
Working Poc 95%
Target:
Minecraft Server (1.7.2 - 1.16.5) with Log4j 2.x
No auth needed
Prerequisites:
Exposed Minecraft server with vulnerable Log4j version · Network access to the target server
nomisec
SCANNER
102 stars
by 0xDexter0us · poc
https://github.com/0xDexter0us/Log4J-Scanner
This repository provides a Burp Suite extension for scanning the Log4Shell vulnerability (CVE-2021-44228). It allows users to inject custom payloads and uses Burp Collaborator for detection.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Burp Suite installed · Access to a Burp Collaborator server · Target application using vulnerable Log4j version
nomisec
WORKING POC
94 stars
by MalwareTech · poc
https://github.com/MalwareTech/Log4jTools
This repository contains tools for investigating CVE-2021-44228 (Log4Shell), including a script to fetch payloads from LDAP servers and a honeypot to detect exploitation attempts. The tools are designed to analyze and log malicious activity related to the Log4j vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to a vulnerable Log4j instance · Network access to the target LDAP server
nomisec
WORKING POC
93 stars
by thomaspatzke · poc
https://github.com/thomaspatzke/Log4Pot
Log4Pot is a honeypot designed to detect and analyze exploitation attempts targeting the Log4Shell vulnerability (CVE-2021-44228). It listens on various ports, logs exploitation attempts, and can download payloads for further analysis. The tool includes a log analyzer to extract and deobfuscate payloads from logs.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
Network access to a vulnerable Log4j instance · Ability to send crafted HTTP requests to the target
nomisec
WORKING POC
89 stars
by tangxiaofeng7 · remote
https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection in Apache Log4j. It includes an exploit class that triggers a calculator app, an LDAP server setup, and a log4j trigger to simulate the attack.
Classification
Working Poc 100%
Target:
Apache Log4j (versions >=2.0-beta9 and <=2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · Java environment for compilation
nomisec
WORKING POC
85 stars
by alexbakker · remote
https://github.com/alexbakker/log4shell-tools
This repository contains a Go-based tool for testing CVE-2021-44228 (Log4Shell) by simulating DNS and LDAP servers to detect vulnerable log4j instances. It generates unique test IDs and monitors for DNS/LDAP callbacks to confirm exploitation.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to target · Target application must log attacker-controlled input
nomisec
SCANNER
79 stars
by giterlizzi · poc
https://github.com/giterlizzi/nmap-log4shell
This repository contains an Nmap NSE script for detecting CVE-2021-44228 (Log4Shell) by injecting JNDI payloads via HTTP headers or TCP/UDP sockets. It relies on a callback server to confirm vulnerability.
Classification
Scanner 90%
Target:
Apache Log4j 2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Nmap with NSE support · Callback server (LDAP/RMI/DNS) · Network access to target
nomisec
WORKING POC
72 stars
by cyberxml · remote
https://github.com/cyberxml/log4j-poc
This repository contains a functional Proof-of-Concept (PoC) for CVE-2021-44228 (Log4Shell), demonstrating LDAP-based RCE, DNS exfiltration, and RMI exploitation against vulnerable Log4j2 configurations in Tomcat servers. It includes Dockerized environments for testing and a Python-based exploit script.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (CVE-2021-44228), Tomcat 8.5.3/9.0.55
No auth needed
Prerequisites:
Docker · Java 8u20 or vulnerable JNDI/LDAP configuration · Network access to target
nomisec
WORKING POC
72 stars
by nccgroup · poc
https://github.com/nccgroup/log4j-jndi-be-gone
This repository provides a Java agent-based mitigation for CVE-2021-44228 (Log4j JNDI vulnerability) by disabling JNDI lookups and logging attempts. It includes tests demonstrating the vulnerability and the fix.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Vulnerable Log4j 2.x version · Java environment
nomisec
WORKING POC
72 stars
by LiveOverflow · poc
https://github.com/LiveOverflow/log4shell
This repository contains a minimal Java-based PoC for CVE-2021-44228 (Log4Shell), demonstrating the JNDI injection vulnerability in Log4j. The code logs a malicious string that triggers the vulnerability, though it does not include a full exploit chain (e.g., LDAP server setup).
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version in the classpath · Network access to a malicious JNDI endpoint
nomisec
SCANNER
70 stars
by bigsizeme · poc
https://github.com/bigsizeme/Log4j-check
This repository describes a Burp Suite plugin for detecting CVE-2021-44228 (Log4Shell) vulnerabilities, supporting DNS callback checks via dnslog.cn or Burp's built-in DNS, with RC1 bypass and JSON data type support. It is a modified version of @pmiaowu's fastjson plugin, adapted for large-scale security assessments.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
Burp Suite · Access to target application · DNS callback service (dnslog.cn or Burp DNS)
nomisec
WORKING POC
66 stars
by future-client · poc
https://github.com/future-client/CVE-2021-44228
This is a functional PoC for CVE-2021-44228 (Log4Shell) that exploits the JNDI/LDAP injection vulnerability in Log4j to achieve RCE. It includes a payload that patches the vulnerability in the target Minecraft session and displays a warning message to the user.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (affecting Minecraft and other applications)
No auth needed
Prerequisites:
Vulnerable Log4j version (2.0 <= Log4j <= 2.14.1) · Network access to the target application · Ability to send crafted JNDI/LDAP payloads
nomisec
SCANNER
57 stars
by lucab85 · poc
https://github.com/lucab85/log4j-cve-2021-44228
This repository provides an Ansible playbook to scan Linux hosts for CVE-2021-44228 (Log4Shell) using Red Hat's official detector script. It automates the download, verification, and execution of the detector script to identify vulnerable Log4j installations.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Ansible 2.9+ · Access to target Linux hosts · Network connectivity to download Red Hat's detector script
nomisec
WRITEUP
53 stars
by authomize · poc
https://github.com/authomize/log4j-log4shell-affected
This repository is a curated list of affected components and applications by CVE-2021-44228 (Log4Shell). It provides resources for security responders to identify internal and external risks associated with the vulnerability.
Classification
Writeup 100%
Target:
Various applications and components using Log4j
No auth needed
Prerequisites:
Access to the repository
nomisec
WORKING POC
49 stars
by CreeperHost · poc
https://github.com/CreeperHost/Log4jPatcher
This repository contains a Java agent-based mitigation tool for CVE-2021-44228 (Log4Shell). It patches Log4j2 by disabling JNDI lookups and Lookup conversions via bytecode transformation.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Java environment with Log4j2 vulnerability · Ability to add JVM arguments
nomisec
SCANNER
48 stars
by CodeShield-Security · poc
https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector
This repository contains a scanner tool for detecting CVE-2021-44228 (Log4Shell) in JAR files by comparing class hashes against a pre-computed list of vulnerable hashes. It also checks for vulnerable dependencies in POM files.
Classification
Scanner 100%
Target:
Apache Log4j 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
JAR file or running Java process to scan
nomisec
WORKING POC
45 stars
by redhuntlabs · poc
https://github.com/redhuntlabs/Log4JHunt
Log4JHunt is an automated scanner for detecting the Log4Shell vulnerability (CVE-2021-44228). It sends crafted HTTP requests with JNDI payloads to target hosts and uses Canary Tokens or custom DNS callbacks to detect exploitation attempts.
Classification
Working Poc | Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to target host · Target application must be using vulnerable Log4j version · Target application must log attacker-controlled input
nomisec
SCANNER
45 stars
by dtact · poc
https://github.com/dtact/divd-2021-00038--log4j-scanner
This repository contains a scanner tool designed to detect vulnerable Log4j versions (CVE-2021-44228 and related CVEs) by recursively scanning files, archives, and Docker images for known vulnerable Log4j libraries and JndiLookup.class files. It also includes a patching feature to mitigate the vulnerability by removing the JndiLookup.class file.
Classification
Scanner 100%
Target:
Apache Log4j (versions affected by CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, CVE-2021-44832)
No auth needed
Prerequisites:
Access to the target system or files to scan
nomisec
WRITEUP
45 stars
by RedDrip7 · poc
https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs
This repository provides IOCs (Indicators of Compromise) related to attacks exploiting CVE-2021-44228 (Log4Shell), including malicious IPs, C2 servers, and detection rules for Snort/Suricata. It does not contain exploit code but serves as a reference for defenders.
Classification
Writeup 100%
Target:
Apache Log4j 2.x
No auth needed
nomisec
SCANNER
44 stars
by 1lann · poc
https://github.com/1lann/log4shelldetect
This repository contains a Go-based scanner tool designed to detect Java archives (JAR, WAR, EAR) potentially vulnerable to CVE-2021-44228 (Log4Shell) and related CVEs by inspecting class paths and embedded files. It supports recursive scanning and multithreading for efficiency.
Classification
Scanner 100%
Target:
Apache Log4j (v2.0.x - v2.16.x)
No auth needed
Prerequisites:
Access to the target file system or Java archives
nomisec
SCANNER
40 stars
by stripe · poc
https://github.com/stripe/log4j-remediation-tools
This repository contains tools for detecting CVE-2021-44228 (Log4j2) vulnerabilities in running JVM processes. It includes a heuristic scanner and a confirmation tool that injects JNDI lookups to verify exploitation.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
Running JVM processes with Log4j2 · JVM Attach API access for confirmation tool
nomisec
SCANNER
39 stars
by HynekPetrak · poc
https://github.com/HynekPetrak/log4shell-finder
This repository contains a Python-based file system scanner for detecting vulnerable log4j instances, including CVE-2017-5645. It identifies log4j (1.x), reload4j (1.2.18+), and log4j-core (2.x) versions vulnerable to multiple CVEs.
Classification
Scanner 100%
Target:
log4j (1.x), reload4j (1.2.18+), log4j-core (2.x)
No auth needed
Prerequisites:
Access to the file system to scan
nomisec
WRITEUP
38 stars
by infiniroot · poc
https://github.com/infiniroot/nginx-mitigate-log4shell
This repository provides a mitigation strategy for CVE-2021-44228 (Log4Shell) using an Nginx LUA script. It describes how to configure Nginx to block exploitation attempts by including a provided configuration file in the server or http context.
Classification
Writeup 90%
Target:
Nginx with Lua module
No auth needed
Prerequisites:
Nginx with Lua module enabled
nomisec
WRITEUP
37 stars
by fireeye · poc
https://github.com/fireeye/CVE-2021-44228
This repository provides OpenIOC rules for detecting indicators of compromise related to CVE-2021-44228 (Log4j RCE). It includes hunting rules for execution and presence-based IOCs but does not contain exploit code.
Classification
Writeup 100%
Target:
Apache Log4j 2
No auth needed
Prerequisites:
Access to logs or system monitoring tools
nomisec
SCANNER
37 stars
by Y0-kan · poc
https://github.com/Y0-kan/Log4jShell-Scan
This repository contains a scanner for detecting CVE-2021-44228 (Log4jShell) vulnerabilities. It uses a combination of HTTP requests and LDAP callbacks to identify vulnerable systems, with options for bypassing WAFs and testing related vulnerabilities like CVE-2021-45046.
Classification
Scanner 95%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Access to the target network or system · LDAP server for callback verification
nomisec
SCANNER
36 stars
by hackinghippo · poc
https://github.com/hackinghippo/log4shell_ioc_ips
This repository aggregates and processes known malicious IPs associated with Log4Shell (CVE-2021-44228) exploits. It includes a script to fetch, filter, and compile IOCs from multiple sources into a consolidated list.
Classification
Scanner 95%
Target:
Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
Access to public IOC repositories · Bash environment
nomisec
SCANNER
35 stars
by darkarnium · poc
https://github.com/darkarnium/Log4j-CVE-Detect
This repository provides YARA rules and a STACS-based scanner to detect vulnerable versions of Log4j (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105) in binary artifacts such as Docker images, JARs, and other archives. It does not exploit the vulnerability but identifies potentially affected files for further review.
Classification
Scanner 100%
Target:
Log4j versions < 2.17.0
No auth needed
Prerequisites:
Docker (or STACS installed locally) · Binary artifacts to scan
nomisec
WORKING POC
35 stars
by greymd · remote
https://github.com/greymd/CVE-2021-44228
This repository contains a proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating the vulnerability by triggering a JNDI lookup to an LDAP server that returns a serialized payload. The payload is a harmless string displayed as ASCII art, confirming the vulnerability without executing arbitrary code.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · LDAP server to serve the payload
nomisec
SCANNER
34 stars
by sassoftware · poc
https://github.com/sassoftware/loguccino
This repository contains a scanner and patcher tool for CVE-2021-44228 (Log4Shell). It recursively scans directories and archives for vulnerable Log4j versions and can patch them by removing the vulnerable classes.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to the target filesystem · Ability to execute the scanner/patcher tool
nomisec
SCANNER
32 stars
by Jeromeyoung · poc
https://github.com/Jeromeyoung/log4j2burpscanner
This is a Burp Suite extension designed to scan for CVE-2021-44228 (Log4j2 RCE) by injecting JNDI payloads into various HTTP request fields (headers, parameters) and checking for DNS callbacks. It uses a custom DNS log service for verification.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Burp Suite · Network access to target · DNS resolution to attacker-controlled domain
nomisec
WORKING POC
28 stars
by twseptian · poc
https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab
This repository provides a Docker-based lab environment to demonstrate the Log4Shell vulnerability (CVE-2021-44228) in a Spring Boot application using Log4j 2.14.1. It includes step-by-step instructions for exploiting the vulnerability to achieve remote code execution via JNDI injection.
Classification
Working Poc 100%
Target:
Spring Boot with Log4j 2.14.1
No auth needed
Prerequisites:
Docker · Java · JNDIExploit tool · Network access to target
nomisec
WORKING POC
26 stars
by r3kind1e · poc
https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator
This repository contains a Python script designed to generate obfuscated payloads for CVE-2021-44228 (Log4Shell) and CVE-2021-45046. The tool allows users to create primary and secondary obfuscated payloads to evade WAF detection.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target
nomisec
WORKING POC
25 stars
by qingtengyun · poc
https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch
This repository provides a hot-patch for CVE-2021-44228 (Log4Shell) by exploiting the vulnerability itself to disable the JNDI lookup functionality in Log4j. It includes a custom LDAP server and a serialized payload generator.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · Ability to host LDAP server
nomisec
WORKING POC
23 stars
by mufeedvh · poc
https://github.com/mufeedvh/log4jail
This repository provides a Rust-based reverse proxy firewall designed to block Log4Shell (CVE-2021-44228) exploit attempts by scanning HTTP requests for malicious JNDI payloads. It includes a regex-based detection mechanism and acts as a protective layer for vulnerable applications.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
Vulnerable Log4j instance · Network access to the target
nomisec
SCANNER
23 stars
by toramanemre · poc
https://github.com/toramanemre/log4j-rce-detect-waf-bypass
This repository contains a Nuclei template for detecting CVE-2021-44228 (Log4Shell) with WAF bypass techniques. It sends multiple crafted requests to trigger DNS callbacks via JNDI lookups, but does not include exploit code for RCE.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version exposed to untrusted input · Outbound DNS access to interactsh server
nomisec
WORKING POC
20 stars
by pedrohavay · poc
https://github.com/pedrohavay/exploit-CVE-2021-44228
This repository contains a proof-of-concept exploit for CVE-2021-44228, the Log4j RCE vulnerability. It includes Python scripts to generate and serve malicious payloads that trigger the JNDI injection flaw in vulnerable Log4j versions.
Classification
Working Poc 95%
Target:
Apache Log4j versions < 2.15.0
No auth needed
Prerequisites:
Python 3 · Java (JDK) · Network access to target
nomisec
WORKING POC
19 stars
by corelight · poc
https://github.com/corelight/cve-2021-44228
This repository provides a Zeek package for detecting CVE-2021-44228 (Log4Shell) exploitation attempts by analyzing HTTP headers, LDAP traffic, and Java class downloads. It generates notices and logs for potential exploits.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Network traffic visibility · Zeek installation
nomisec
WORKING POC
19 stars
by Glease · poc
https://github.com/Glease/Healer
This repository contains a working proof-of-concept for mitigating CVE-2021-44228 (Log4Shell) by patching vulnerable Log4j lookups in Minecraft mod environments. The code dynamically modifies Log4j's Interpolator to prevent JNDI exploitation.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Apache Log4j 2.x (specifically in Minecraft Forge/FML environments)
No auth needed
Prerequisites:
Vulnerable Log4j version (2.0 <= Log4j < 2.15.0) · Minecraft Forge/FML modding environment
nomisec
WORKING POC
18 stars
by faisalfs10x · poc
https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell
This is a functional exploit for CVE-2021-44228 (Log4Shell) that generates a malicious Java class, compiles it, and uses JNDI injection via LDAP to trigger a reverse shell. It includes bypass techniques for header-based detection and verifies exploitation via network connection checks.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java compiler (javac) · Python3 · netcat (nc) · marshalsec JNDI LDAP server · network access to target
nomisec
WORKING POC
17 stars
by blake-fm · poc
https://github.com/blake-fm/vcenter-log4j
This repository provides a bash script to mitigate CVE-2021-44228 (Log4Shell) in VMware vCenter by applying workarounds such as removing JndiLookup.class and setting log4j2.formatMsgNoLookups=true. It supports vCenter versions 6.5, 6.7, and 7.0.
Classification
Working Poc 95%
Target:
VMware vCenter 6.5, 6.7, 7.0
Auth required
Prerequisites:
SSH access to vCenter · root or equivalent privileges
nomisec
WORKING POC
16 stars
by ab0x90 · remote
https://github.com/ab0x90/CVE-2021-44228_PoC
This repository contains a Python-based PoC for CVE-2021-44228 (Log4Shell), which exploits the Log4j vulnerability to achieve remote code execution (RCE) via JNDI injection. The script uses marshalsec for LDAP server setup and crafts a malicious payload to trigger a reverse shell.
Classification
Working Poc 95%
Target:
Apache Log4j (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 · marshalsec · Python 3 · Netcat listener · Python web server on port 8000
nomisec
WORKING POC
16 stars
by lhotari · poc
https://github.com/lhotari/log4shell-mitigation-tester
This repository provides a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating JNDI injection via Log4j 2.14.1. It includes mitigation testing and exploitation examples using Rogue JNDI for RCE and information leakage.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j version (2.14.1 or earlier) · Network access to target · LDAP/JNDI server for exploitation
nomisec
SCANNER
14 stars
by ossie-git · poc
https://github.com/ossie-git/log4shell_sentinel
Log4Shell Sentinel is a file-based scanner for detecting vulnerable log4j-core jars in various Java application formats (JAR, WAR, EAR). It includes features for container image mapping, MD5 hashing, and ignore list functionality to aid in vulnerability management.
Classification
Scanner 100%
Target:
Apache Log4j 2 (log4j-core)
No auth needed
Prerequisites:
Access to the target filesystem · Root privileges for full functionality
nomisec
SCANNER
13 stars
by snow0715 · poc
https://github.com/snow0715/log4j-Scan-Burpsuite
This repository contains a Burp Suite plugin designed to detect the Log4j vulnerability (CVE-2021-44228) by automatically injecting payloads into various parts of HTTP requests (headers, POST parameters, GET parameters, and cookies). It includes filtering and logging capabilities for passive and active scanning.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Burp Suite · Network access to the target application
nomisec
SCANNER
13 stars
by xsultan · poc
https://github.com/xsultan/log4jshield
This repository contains a bash script designed to scan for and patch JAR files affected by the Log4j vulnerability CVE-2021-44228. It identifies vulnerable JARs by checking for the presence of the JndiLookup.class file and can remove it to mitigate the vulnerability.
Classification
Scanner 100%
Target:
Apache Log4j versions < 2.15.0
No auth needed
Prerequisites:
Access to the filesystem containing JAR files
nomisec
SCANNER
13 stars
by mitiga · poc
https://github.com/mitiga/log4shell-cloud-scanner
This repository contains a scanner for detecting Log4Shell (CVE-2021-44228) vulnerabilities in AWS environments. It identifies exposed EC2 instances and load balancers, then crafts requests to test for the vulnerability.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
AWS credentials with permissions to describe EC2 instances and load balancers · Access to a vulnerable Log4j instance
nomisec
WORKING POC
13 stars
by zsolt-halo · remote
https://github.com/zsolt-halo/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service
This repository provides a Spring Boot test service with Log4j 2.13.0 to demonstrate CVE-2021-44228 (Log4Shell). It includes endpoints that log user-controlled input, allowing testing of JNDI injection payloads.
Classification
Working Poc 100%
Target:
Apache Log4j 2.13.0
No auth needed
Prerequisites:
Vulnerable Log4j version (2.13.0 or earlier) · Network access to the target service · Ability to send crafted HTTP requests
nomisec
SCANNER
12 stars
by Nanitor · poc
https://github.com/Nanitor/log4fix
This repository contains a Go-based tool to detect and mitigate CVE-2021-44228 (Log4Shell) by scanning and removing the JndiLookup class from JAR/WAR/EAR files. It is not an exploit but a remediation utility.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (up to 2.15.0)
No auth needed
Prerequisites:
Access to vulnerable JAR/WAR/EAR files
nomisec
WORKING POC
12 stars
by Hydragyrum · poc
https://github.com/Hydragyrum/evil-rmi-server
This is a functional PoC for CVE-2021-44228 (Log4Shell) that creates an evil RMI server to exploit unsafe reflection in BeanFactory, allowing arbitrary command execution. It binds a malicious ReferenceWrapper to the RMI registry, which can be used in local privilege escalation scenarios.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (affected versions)
No auth needed
Prerequisites:
Java runtime environment · Network access to target · Target application using vulnerable Log4j version
nomisec
SCANNER
11 stars
by claranet · poc
https://github.com/claranet/ansible-role-log4shell
This repository provides an Ansible role to scan systems for Log4Shell (CVE-2021-44228) by detecting vulnerable Log4j JAR/WAR files. It checks for the presence of JndiLookup.class and reports versions, but does not include exploit code.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (vulnerable versions)
No auth needed
Prerequisites:
Ansible >= 4 · Access to target filesystem
nomisec
SCANNER
11 stars
by thecyberneh · poc
https://github.com/thecyberneh/Log4j-RCE-Exploiter
This repository contains a scanner for CVE-2021-44228 (Log4j RCE). It automates the process of checking domains or lists of URLs for vulnerability by sending crafted HTTP requests with JNDI payloads to trigger the Log4j vulnerability.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Burp Collaborator or Interactsh domain for callback detection · Subfinder, Assetfinder, Amass, and Httpx tools for domain enumeration
nomisec
WORKING POC
11 stars
by rakutentech · poc
https://github.com/rakutentech/jndi-ldap-test-server
This repository provides a minimalistic LDAP server designed to test vulnerability to JNDI+LDAP injection attacks, specifically CVE-2021-44228 (Log4Shell). It allows users to simulate an exploit scenario by logging a crafted JNDI string and observing if the server receives a connection, indicating vulnerability.
Classification
Working Poc 95%
Target:
Applications using vulnerable versions of Log4j (e.g., Log4j 2.x <= 2.14.1)
No auth needed
Prerequisites:
Access to an application that logs untrusted input · Network connectivity to the LDAP test server
nomisec
WRITEUP
10 stars
by wortell · poc
https://github.com/wortell/log4j
This repository is a comprehensive writeup and resource collection for CVE-2021-44228 (Log4Shell), including scanning tools, indicators of compromise, vulnerable applications, and mitigation guidance. It does not contain exploit code but provides links to external tools and references.
Classification
Writeup 100%
Target:
Apache Log4j versions 2.0-beta9 to 2.17.0
No auth needed
nomisec
WORKING POC
10 stars
by roxas-tan · remote
https://github.com/roxas-tan/CVE-2021-44228
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Log4j. The exploit triggers a calculator app as a benign payload, leveraging LDAP and HTTP servers to deliver the malicious class file.
Classification
Working Poc 100%
Target:
Apache Log4j versions >=2.0-beta9 and <=2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · Java runtime environment · LDAP server for JNDI injection
nomisec
WORKING POC
9 stars
by Tai-e · poc
https://github.com/Tai-e/CVE-2021-44228
This repository demonstrates the use of Tai-e, a static analysis tool, to detect the Log4Shell vulnerability (CVE-2021-44228) in a sample Java application. It includes a vulnerable Log4j 2.14.0 server that logs a malicious JNDI lookup string, showcasing the taint flow analysis capabilities of Tai-e.
Classification
Working Poc 90%
Target:
Apache Log4j 2.14.0
No auth needed
Prerequisites:
Java 17+ · Tai-e static analysis tool · Log4j 2.14.0 or vulnerable version
nomisec
WORKING POC
9 stars
by immunityinc · poc
https://github.com/immunityinc/Log4j-JNDIServer
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), providing RMI, LDAP, and deserialization attack vectors to achieve remote code execution. It includes an HTTP server to dynamically compile and serve malicious payloads.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to target · Vulnerable Log4j version · Outbound JNDI access allowed
nomisec
WORKING POC
9 stars
by obscuritylabs · poc
https://github.com/obscuritylabs/log4shell-poc-lab
This repository contains a PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection. The attack script sends a malicious LDAP payload to a vulnerable Log4j server, triggering remote code execution.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · LDAP server for payload delivery
nomisec
WRITEUP
9 stars
by Sh0ckFR · poc
https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs
This repository is a curated list of IoCs (Indicators of Compromise) related to CVE-2021-44228 (Log4Shell), including IPs, domains, hashes, and YARA rules. It aggregates data from various sources and provides references to detection tools and payload lists.
Classification
Writeup 100%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Access to the repository or referenced IoC lists
nomisec
WRITEUP
9 stars
by kubearmor · poc
https://github.com/kubearmor/log4j-CVE-2021-44228
This repository provides a detailed writeup and guidance on reproducing and mitigating the Log4Shell vulnerability (CVE-2021-44228) in a Kubernetes environment. It includes steps to set up a vulnerable environment, exploit it using a malicious LDAP server, and apply security policies using KubeArmor and Cilium.
Classification
Writeup 100%
Target:
Apache Log4j <= 2.14.1
No auth needed
Prerequisites:
Kubernetes environment · Vulnerable Log4j application · Malicious LDAP server · Access to deploy resources in Kubernetes
nomisec
WORKING POC
9 stars
by qingtengyun · poc
https://github.com/qingtengyun/cve-2021-44228-qingteng-patch
This repository provides a hotpatch for CVE-2021-44228 (Log4Shell) using JVM Instrumentation API to modify the JndiLookup class at runtime without restarting the Java process. It supports JDK versions 6-11 and includes scripts for Linux and Windows to inject the patch into running JVMs.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Access to the target JVM process · JVM Attach API not disabled
nomisec
WRITEUP
8 stars
by 0xsyr0 · poc
https://github.com/0xsyr0/Log4Shell
This repository is a comprehensive research summary and resource collection for CVE-2021-44228 (Log4Shell), including threat intelligence, mitigations, malware reports, and exploitation techniques. It does not contain direct exploit code but serves as a curated reference for incident response and analysis.
Classification
Writeup 100%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to vulnerable Log4j instance
nomisec
WRITEUP
8 stars
by atnetws · poc
https://github.com/atnetws/fail2ban-log4j
This repository provides a fail2ban filter configuration to detect and block Log4j CVE-2021-44228 exploitation attempts by monitoring Apache access logs for JNDI LDAP injection patterns. It includes installation instructions and regex-based detection rules.
Classification
Writeup 100%
Target:
Apache Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
Apache access logs with Log4j exploitation attempts · fail2ban installed and configured
nomisec
WORKING POC
8 stars
by cybersecurityworks553 · remote
https://github.com/cybersecurityworks553/log4j-shell-csw
This is a functional Proof-of-Concept exploit for CVE-2021-44228 (Log4Shell), which leverages JNDI injection to achieve remote code execution. The script generates a malicious Java payload, sets up an LDAP server, and serves the payload via HTTP to trigger a reverse shell.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java Development Kit (JDK) installed · Python 3 · Network access to target · Target application using vulnerable Log4j version
nomisec
SCANNER
8 stars
by lfama · poc
https://github.com/lfama/log4j_checker
This Python script scans for CVE-2021-44228 (Log4Shell) by sending JNDI payloads in HTTP headers and form parameters, then listens for callbacks on a specified port to confirm vulnerability. It does not execute a reverse shell but checks for vulnerable Log4j instances.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to target · Target must have vulnerable Log4j version · Outbound LDAP/JNDI access from target
nomisec
WORKING POC
8 stars
by Labout · poc
https://github.com/Labout/log4shell-rmi-poc
This repository contains a functional Proof of Concept (PoC) for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection over RMI. The exploit triggers a calculator app on the target system by leveraging Log4j's vulnerable JNDI lookup feature.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (specifically tested with 2.5.7)
No auth needed
Prerequisites:
Java environment (JDK 8 or 11) · Network access to the target · Target application using vulnerable Log4j version
nomisec
SCANNER
8 stars
by DXC-StrikeForce · poc
https://github.com/DXC-StrikeForce/Burp-Log4j-HammerTime
This is a Burp Suite extension designed to actively scan for CVE-2021-44228 (Log4Shell) and CVE-2021-45046 by injecting JNDI payloads into various HTTP request parameters and headers. It uses Burp Collaborator to verify exploitation by detecting DNS callbacks.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1 for CVE-2021-44228, and 2.15.0 for CVE-2021-45046)
No auth needed
Prerequisites:
Burp Suite with Collaborator access · Network access to the target application · Target application using vulnerable Log4j version
nomisec
WORKING POC
8 stars
by sunnyvale-it · poc
https://github.com/sunnyvale-it/CVE-2021-44228-PoC
This repository contains a functional Proof of Concept for CVE-2021-44228 (Log4Shell), demonstrating arbitrary code execution via JNDI injection in Apache Log4j2. The exploit triggers a calculator app launch on Windows or macOS by leveraging a malicious LDAP server and HTTP server to serve the payload.
Classification
Working Poc 100%
Target:
Apache Log4j2 <= 2.14.1
No auth needed
Prerequisites:
JDK 11 · Maven · Python · Marshalsec LDAPRefServer · Vulnerable Log4j2 application
nomisec
WORKING POC
7 stars
by marcourbano · poc
https://github.com/marcourbano/CVE-2021-44228
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), including an LDAP server, a vulnerable application, and an exploit class that executes arbitrary commands upon class loading.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Maven · Java · Docker · Python · Network access to target
nomisec
WORKING POC
7 stars
by mschmnet · poc
https://github.com/mschmnet/Log4Shell-demo
This repository demonstrates CVE-2021-44228 (Log4Shell) by providing a vulnerable server and a malicious server that exploits the JNDI injection vulnerability in Log4j. The exploit triggers remote code execution via LDAP callback to a malicious server hosting a Java payload.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · Network access to vulnerable server · LDAP server hosting malicious payload
nomisec
SCANNER
7 stars
by TaroballzChen · poc
https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit
This repository contains a Metasploit auxiliary module for scanning and detecting the Log4j RCE vulnerability (CVE-2021-44228). It includes WAF bypass payloads and supports GET/POST requests with custom headers and DNS callbacks for vulnerability confirmation.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Metasploit Framework · Python dependencies (requests) · DNS callback server (optional)
nomisec
SCANNER
7 stars
by KeysAU · poc
https://github.com/KeysAU/Get-log4j-Windows.ps1
This PowerShell script scans Active Directory for Windows servers, copies tools, and checks for Log4j vulnerabilities (CVE-2021-44228) by extracting JAR files and verifying the presence of JNDI lookup classes. It does not include exploit payloads but automates detection across domains.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (CVE-2021-44228)
Auth required
Prerequisites:
Domain admin credentials · WinRM access · 7-Zip installed on control server · PowerShell 5.0+
nomisec
WRITEUP
7 stars
by Azeemering · remote
https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes
This repository is a DFIR (Digital Forensics and Incident Response) writeup documenting the analysis of CVE-2021-44228 (Log4Shell) exploitation attempts. It includes detection methods, YARA rules, Splunk queries, and analysis of a malicious payload delivering a crypto miner.
Classification
Writeup 100%
Target:
Apache Log4j 2 versions 2.0 to 2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j version exposed to untrusted input
nomisec
WORKING POC
7 stars
by momos1337 · poc
https://github.com/momos1337/Log4j-RCE
This repository contains a PHP-based PoC for CVE-2021-44228 (Log4j RCE), which exploits the JNDI injection vulnerability in Log4j. The script sends malicious payloads via HTTP headers and parameters to trigger remote code execution.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
PHP with cURL extension · Target application vulnerable to Log4j RCE · DNS logging service (e.g., Burp Collaborator, dnslog.cn)
nomisec
WORKING POC
7 stars
by OopsieWoopsie · poc
https://github.com/OopsieWoopsie/mc-log4j-patcher
This repository provides a Java-based tool to patch vulnerable Log4j2 versions (CVE-2021-44228) by replacing them with Log4j 2.15.0 and adding the 'nolookups' flag to log4j2.xml. It is designed for unsupported Minecraft server software like Spigot and PaperSpigot.
Classification
Working Poc 95%
Target:
Log4j2 (versions affected by CVE-2021-44228), specifically in Minecraft server software like Spigot and PaperSpigot
No auth needed
Prerequisites:
Access to the target server's JAR file · Java runtime environment
nomisec
SUSPICIOUS
6 stars
by demining · remote
https://github.com/demining/Log4j-Vulnerability
The repository appears to be a collection of JavaScript files, primarily jQuery-related, with no clear exploit code for CVE-2021-44228. The presence of cryptocurrency mining-related terms in the file paths suggests potential misuse or deception.
Classification
Suspicious 80%
Target:
N/A
No auth needed
nomisec
WORKING POC
6 stars
by isuruwa · remote
https://github.com/isuruwa/Log4j
This repository contains a functional exploit for CVE-2021-44228 (Log4Shell), including a Python-based exploit script that generates a malicious LDAP payload and a Java-based reverse shell. It also includes a vulnerable application for testing purposes.
Classification
Working Poc 95%
Target:
Apache Log4j 2 versions 2.0-beta-9 to 2.14.1
No auth needed
Prerequisites:
Java JDK 1.8.0_20 · Python 3 · Netcat listener · LDAP server setup
nomisec
WORKING POC
6 stars
by DragonSurvivalEU · poc
https://github.com/DragonSurvivalEU/RCE
This PoC demonstrates a regex-based string replacement vulnerability in the DragonSurvival plugin for Bukkit, which can lead to arbitrary code execution via crafted chat messages or commands. The fix method recursively processes placeholders, allowing for unintended evaluation of nested expressions.
Classification
Working Poc 90%
Target:
DragonSurvival plugin for Bukkit (version not specified)
No auth needed
Prerequisites:
Access to a server running the vulnerable DragonSurvival plugin · Ability to send chat messages or commands
nomisec
WORKING POC
6 stars
by KosmX · remote
https://github.com/KosmX/CVE-2021-44228-example
This repository contains a proof-of-concept exploit for CVE-2021-44228, demonstrating how to trigger the Log4j2 JNDI lookup vulnerability to leak environment variables or achieve remote code execution. It includes a custom ObjectFactory (LoggerFactory) and an example (RCEExample) to log a malicious JNDI payload.
Classification
Working Poc 95%
Target:
Apache Log4j2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Target application using vulnerable Log4j2 version · Network access to the target · LDAP/HTTP server to host malicious payload
nomisec
WORKING POC
6 stars
by irgoncalves · poc
https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228
This script enforces F5 BIG-IP ASM/Adv.WAF attack signatures related to CVE-2021-44228 (Log4Shell) across all policies in blocking mode. It automates the process of applying specific signature IDs to mitigate the vulnerability.
Classification
Working Poc 95%
Target:
F5 BIG-IP ASM/Adv.WAF v13.x, v14.x, v15.x, v16.x
Auth required
Prerequisites:
Access to BIG-IP management interface · Valid credentials for authentication · Python 3.7+
nomisec
SCANNER
6 stars
by AlexandreHeroux · poc
https://github.com/AlexandreHeroux/Fix-CVE-2021-44228
This repository provides a utility to scan and remove the malicious JndiLookup.class from Java archives (JAR, WAR, EAR, ZIP) to mitigate CVE-2021-44228 (Log4Shell). It does not exploit the vulnerability but instead helps remediate it.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (affected versions)
No auth needed
Prerequisites:
Access to the file system containing vulnerable Log4j archives
nomisec
SCANNER
6 stars
by justakazh · poc
https://github.com/justakazh/Log4j-CVE-2021-44228
This repository contains a Python script designed to scan multiple targets for the Log4j vulnerability (CVE-2021-44228) by sending crafted HTTP requests with JNDI payloads and checking DNS logs for callbacks. It uses a public DNS logging service to detect vulnerable systems.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
List of target URLs · Internet access to DNS logging service
nomisec
SCANNER
6 stars
by ssl · poc
https://github.com/ssl/scan4log4j
This repository contains a Python script designed to scan multiple URLs for CVE-2021-44228 (Log4j) by sending crafted payloads via HTTP headers. It reads targets, payloads, and headers from text files and uses concurrent requests for efficiency.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
List of target URLs · Log4j payloads (e.g., JNDI lookups) · Optional custom headers
nomisec
WORKING POC
5 stars
by winnpixie · poc
https://github.com/winnpixie/log4noshell
This repository provides a Java Agent that mitigates CVE-2021-44228 (Log4Shell) by disabling the JNDI Lookup functionality in Apache Log4J. It uses bytecode manipulation to patch the vulnerable `JndiLookup.lookup` method at runtime.
Classification
Working Poc 100%
Target:
Apache Log4J versions affected by CVE-2021-44228
No auth needed
Prerequisites:
Java environment · Access to modify JVM arguments
nomisec
WORKING POC
5 stars
by many-fac3d-g0d · poc
https://github.com/many-fac3d-g0d/apache-tomcat-log4j
This repository contains a proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution (RCE) via JNDI injection in Apache Tomcat 10.0.14. The exploit uses an LDAP server to deliver a malicious payload, resulting in arbitrary code execution (e.g., launching Calculator).
Classification
Working Poc 95%
Target:
Apache Tomcat 10.0.14 (with vulnerable Log4j 2.x)
Auth required
Prerequisites:
Vulnerable Log4j 2.x library in the target environment · Network access to the target Tomcat server · Access to the Tomcat manager interface (requires authentication) · LDAP server to host the malicious payload
nomisec
WORKING POC
5 stars
by suuhm · poc
https://github.com/suuhm/log4shell4shell
This repository provides a multitool for testing and exploiting CVE-2021-44228 (Log4Shell). It includes system checks, fixes, and attack capabilities such as reverse shells and LDAP server setup.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · Java Runtime Environment · Bash · Curl · Python3
nomisec
SCANNER
5 stars
by r00thunter · poc
https://github.com/r00thunter/Log4Shell
This repository contains a Python-based scanner for detecting CVE-2021-44228 (Log4Shell) vulnerabilities. It supports various HTTP headers, POST data, and JSON parameter fuzzing, along with WAF bypass payloads and DNS callback validation.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to target · Target application using vulnerable Log4j version
nomisec
WORKING POC
5 stars
by manuel-alvarez-alvarez · poc
https://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via LDAP, RMI, and DNS lookups. It includes both a malicious server and a vulnerable application to test the exploit.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · Ability to send crafted JNDI strings
nomisec
WORKING POC
5 stars
by snapattack · poc
https://github.com/snapattack/damn-vulnerable-log4j-app
This repository contains a deliberately vulnerable Java application to demonstrate CVE-2021-44228 (Log4Shell). It includes a vulnerable servlet that logs user-controlled input via Log4j, along with attack artifacts and instructions for exploitation.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (affected versions)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · LDAP/JNDI callback server for payload delivery
nomisec
WORKING POC
5 stars
by OlafHaalstra · poc
https://github.com/OlafHaalstra/log4jcheck
This repository contains a multithreaded Python script to check for CVE-2021-44228 (Log4Shell) by sending crafted requests with JNDI payloads in headers and parameters. It supports multiple HTTP methods and headers, and logs results for correlation with DNS callbacks.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
List of target URLs with methods and parameters · DNS callback server or CanaryToken for detection
nomisec
WORKING POC
5 stars
by ankur-katiyar · poc
https://github.com/ankur-katiyar/log4j-docker
This repository provides a proof-of-concept for CVE-2021-44228 (Log4Shell) using Docker and Kubernetes YAMLs to demonstrate the vulnerability. It includes setup instructions for deploying a vulnerable web server, an attack server, and a marshalsec server to exploit the Log4j RCE vulnerability.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · Kubernetes cluster · Ingress controller (e.g., Nginx-Ingress)
nomisec
SCANNER
5 stars
by KeysAU · poc
https://github.com/KeysAU/Get-log4j-Windows-local
This PowerShell script scans a local Windows system for Log4j vulnerabilities (CVE-2021-44228) by identifying .jar files, extracting them, and checking for the presence of the JndiLookup.class file. It also attempts to exploit local listening ports by sending malicious HTTP headers.
Classification
Scanner 95%
Target:
Apache Log4j 2.x
Auth required
Prerequisites:
Local admin privileges · PowerShell 5.0+ · 7-Zip installed at C:\Support\Tools\7-Zip
nomisec
WRITEUP
5 stars
by jacobtread · poc
https://github.com/jacobtread/L4J-Vuln-Patch
This repository provides a patch for the Log4j vulnerability (CVE-2021-44228) in Minecraft clients and servers by modifying log file configurations to replace %msg with %msg{nolookups}. It is a mitigation tool rather than an exploit.
Classification
Writeup 90%
Attack Type
Deserialization
Target:
Minecraft Java Edition (all versions)
No auth needed
Prerequisites:
Vulnerable Minecraft client or server with Log4j 2.x
nomisec
WORKING POC
5 stars
by phoswald · poc
https://github.com/phoswald/sample-ldap-exploit
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via LDAP and HTTP servers. The exploit leverages JNDI injection to load a malicious payload from a remote server.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · Ability to host LDAP and HTTP servers
nomisec
WORKING POC
5 stars
by sud0x00 · remote
https://github.com/sud0x00/log4j-CVE-2021-44228
This repository provides a proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j. It includes curl commands and variations to bypass WAFs.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target server
nomisec
WORKING POC
5 stars
by mrlnstk · poc
https://github.com/mrlnstk/cve-2021-44228-minecraft-poc
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell) targeting Minecraft 1.17.1 with Java 16. It includes an LDAP server that serves serialized payloads to exploit the JNDI injection vulnerability in Log4j.
Classification
Working Poc 95%
Target:
Minecraft 1.17.1 with Log4j (Java 16)
No auth needed
Prerequisites:
Vulnerable Log4j version in the target environment · Network access to the target · LDAP server setup (included in PoC)
nomisec
WORKING POC
5 stars
by myyxl · poc
https://github.com/myyxl/cve-2021-44228-minecraft-poc
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell) targeting Minecraft 1.17.1 with Paper server build #397. It includes an LDAP server that serves serialized payloads to exploit the JNDI injection vulnerability in Log4j.
Classification
Working Poc 95%
Target:
Minecraft 1.17.1 with Paper server build #397 (Log4j 2.x)
No auth needed
Prerequisites:
Vulnerable Log4j version (2.0 <= Log4j < 2.15.0) · Network access to target Minecraft server · LDAP outbound connectivity from target
nomisec
WORKING POC
4 stars
by michaelsanford · poc
https://github.com/michaelsanford/Log4Shell-Honeypot
This repository contains a dockerized honeypot for detecting and logging exploitation attempts against CVE-2021-44228 (Log4Shell). It includes comprehensive pattern matching for various exploit vectors, rate limiting, and monitoring capabilities.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version exposed to untrusted input · Network access to the target system
nomisec
SCANNER
4 stars
by inettgmbh · poc
https://github.com/inettgmbh/checkmk-log4j-scanner
This repository provides a Checkmk extension to scan for Log4j vulnerabilities, specifically CVE-2021-44228 and related CVEs. It wraps around the logpresso/CVE-2021-44228-Scanner to detect vulnerable Log4j versions in JAR, WAR, EAR, and AAR files.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (versions affected by CVE-2021-44228 and related CVEs)
No auth needed
Prerequisites:
Access to the target system's file system to scan for vulnerable Log4j versions
nomisec
SCANNER
4 stars
by MrHarshvardhan · remote
https://github.com/MrHarshvardhan/PY-Log4j-RCE-Scanner
This repository contains a Python-based scanner for detecting CVE-2021-44228 (Log4j RCE) by sending crafted JNDI payloads via HTTP headers and parameters. It supports domain and URL list scanning, leveraging tools like curl, httpx, subfinder, assetfinder, and amass.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
curl · httpx · subfinder (for domain scan) · assetfinder (for domain scan) · amass (for domain scan)
nomisec
WORKING POC
4 stars
by Kr0ff · remote
https://github.com/Kr0ff/CVE-2021-44228
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), which leverages JNDI injection to achieve remote code execution. The exploit includes an LDAP server and HTTP server to deliver a Java-based reverse shell payload.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 JDK installed on the attacker's system · Network access to the target system · Target system must be vulnerable to Log4Shell
nomisec
WORKING POC
4 stars
by Koupah · poc
https://github.com/Koupah/MC-Log4j-Patcher
This repository provides a mitigation tool for CVE-2021-44228 (Log4Shell) in Minecraft servers, specifically targeting Bukkit/Spigot and BungeeCord platforms. It includes filters and patches to prevent Log4j format strings, including JNDI lookups, from being processed.
Classification
Working Poc 95%
Target:
Minecraft servers (Bukkit/Spigot, BungeeCord) with vulnerable Log4j versions
No auth needed
Prerequisites:
Vulnerable Log4j version (2.x <= 2.14.1) · Minecraft server running Bukkit/Spigot or BungeeCord
nomisec
SCANNER
4 stars
by lucab85 · poc
https://github.com/lucab85/ansible-role-log4shell
This repository provides an Ansible role to scan Linux hosts for Log4Shell (CVE-2021-44228) using Red Hat's official detector script. It automates the download and execution of the script to identify vulnerable Log4j instances.
Classification
Scanner 100%
Target:
Apache Log4j (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Ansible 2.9+ · Access to target Linux hosts · Internet access to download detector script
nomisec
SCANNER
4 stars
by dbzoo · poc
https://github.com/dbzoo/log4j_scanner
This repository contains a filesystem scanner for detecting vulnerable Log4j versions affected by CVE-2021-44228 (Log4Shell) and related CVEs. It checks file hashes against known vulnerable versions of Log4j classes.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (various versions)
No auth needed
Prerequisites:
Access to the target filesystem · Python 2.7 or later
nomisec
WORKING POC
4 stars
by yesspider-hacker · poc
https://github.com/yesspider-hacker/log4j-payload-generator
This repository contains a Python script that generates various payloads for exploiting CVE-2021-44228 (Log4Shell), a critical RCE vulnerability in Apache Log4j. The script provides multiple obfuscated JNDI lookup strings to bypass WAFs and other protections.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · Callback server (LDAP/RMI/DNS) to receive the exploit payload
nomisec
WORKING POC
4 stars
by TheInterception · remote
https://github.com/TheInterception/Log4J-Simulation-Tool
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), including a Java-based reverse shell exploit, automation scripts, and a vulnerable application for testing. It demonstrates JNDI injection to achieve remote code execution.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java JDK 8 · Python 3 · ncat · vulnerable Log4j instance
nomisec
SCANNER
4 stars
by Occamsec · poc
https://github.com/Occamsec/log4j-checker
This repository contains scripts to detect .jar files vulnerable to CVE-2021-44228 (Log4Shell) by checking SHA-256 hashes or the presence of the JndiLookup class. It does not exploit the vulnerability but aids in identification.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (vulnerable versions)
No auth needed
Prerequisites:
Access to the filesystem containing .jar files
nomisec
SCANNER
4 stars
by shamo0 · poc
https://github.com/shamo0/CVE-2021-44228
This repository contains a bash script for scanning targets for CVE-2021-44228 (Log4Shell) by sending crafted HTTP requests with JNDI payloads to detect vulnerable Log4j instances. It uses external tools like httpx, subfinder, and assetfinder for target enumeration.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
curl · httpx · subfinder · assetfinder · amass · interactsh domain for callback detection
nomisec
WORKING POC
4 stars
by 0xRyan · poc
https://github.com/0xRyan/log4j-nullroute
This repository contains a Python script that automates the retrieval of malicious IPs associated with CVE-2021-44228 (Log4j RCE) from Greynoise and configures null routes on Cisco IOS-XE and Arista EOS routers to block them. It includes functionality to exclude specific IPs via an exceptions file.
Classification
Working Poc 95%
Target:
Cisco IOS-XE, Arista EOS
Auth required
Prerequisites:
Greynoise API key · SSH access to edge routers · Python environment with netmiko and requests libraries
nomisec
SCANNER
4 stars
by toramanemre · poc
https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228
This YAML file is a Nuclei template designed to detect CVE-2021-44228 (Log4Shell) in Apache Solr by sending a crafted GET request with a JNDI LDAP payload and checking for DNS interaction via interactsh. It does not execute arbitrary code but confirms vulnerability via callback.
Classification
Scanner 90%
Target:
Apache Solr (with vulnerable Log4j versions)
No auth needed
Prerequisites:
Target must have Apache Solr exposed with a vulnerable Log4j version (2.x <= 2.14.1) · Network access to the target · Interactsh server for DNS callback detection
nomisec
WORKING POC
4 stars
by ycdxsb · remote
https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV
This repository provides a functional proof-of-concept for CVE-2021-44228 (Log4Shell), including Docker environments for both vulnerable and attacking machines. It demonstrates RCE via JNDI injection, using LDAP callbacks to execute a reverse shell payload.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · Java 1.8 · Python 3 · Metasploit (for msfvenom) · Network connectivity between attacker and victim
nomisec
SCANNER
4 stars
by sinakeshmiri · poc
https://github.com/sinakeshmiri/log4jScan
This repository contains a Python scanner for CVE-2021-44228 (Log4Shell) that sends JNDI payloads to target hosts via HTTP/HTTPS requests. It checks for vulnerable Log4j instances by injecting a malicious LDAP JNDI lookup string in headers and query parameters.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
List of target IPs/hosts (from masscan or similar) · JNDIExploit server running on attacker-controlled IP
nomisec
WORKING POC
4 stars
by zzzz0317 · poc
https://github.com/zzzz0317/log4j2-vulnerable-spring-app
This repository provides a vulnerable Spring Boot application for testing CVE-2021-44228 (Log4Shell). It includes endpoints that log user-controlled input, demonstrating the vulnerability via GET/POST requests and User-Agent headers.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1 (via spring-boot-starter-log4j2:2.6.1)
No auth needed
Prerequisites:
Network access to the target application · Ability to send crafted HTTP requests
nomisec
WORKING POC
4 stars
by corneacristian · poc
https://github.com/corneacristian/Log4J-CVE-2021-44228-RCE
This is a functional exploit for CVE-2021-44228 (Log4Shell), leveraging JNDI injection via LDAP to achieve remote command execution. It uses a Java-based JNDI server to deliver a base64-encoded payload to a vulnerable Log4j instance.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · Java runtime for JNDIExploit
nomisec
WORKING POC
4 stars
by M1ngGod · remote
https://github.com/M1ngGod/CVE-2021-44228-Log4j-lookup-Rce
This repository contains a working proof-of-concept for CVE-2021-44228, demonstrating JNDI injection in Apache Log4j 2.x <= 2.14.1 via LDAP. The PoC includes a Java snippet that triggers the vulnerability by logging a malicious payload.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x <= 2.14.1
No auth needed
Prerequisites:
A vulnerable version of Apache Log4j 2.x · Network access to an LDAP server controlled by the attacker
nomisec
WORKING POC
4 stars
by nkoneko · poc
https://github.com/nkoneko/VictimApp
This is a minimal Spring Boot application demonstrating CVE-2021-44228 (Log4Shell) by logging an attacker-controlled User-Agent header. The vulnerable Log4j 2.x dependency allows JNDI injection via the logged header.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j 2.x version in classpath · Network access to target application
nomisec
WORKING POC
4 stars
by zlepper · poc
https://github.com/zlepper/CVE-2021-44228-Test-Server
This repository provides a Go-based test server to verify if a Java application is vulnerable to CVE-2021-44228 (Log4Shell). It listens for LDAP callback connections triggered by vulnerable Log4j logging statements.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version in target application · Network access to target · Ability to inject JNDI lookup strings into logs
nomisec
WORKING POC
3 stars
by tadash10 · poc
https://github.com/tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment
This repository provides a proof-of-concept for exploiting CVE-2021-44228 (Log4Shell) in a simulated banking application environment. It includes a setup script to deploy a vulnerable application and a malicious Log4j configuration to achieve remote code execution via JNDI injection.
Classification
Working Poc 90%
Target:
Apache Log4j 2.15.0
No auth needed
Prerequisites:
Access to a vulnerable Log4j instance · Network connectivity to an attacker-controlled server · Ability to modify or inject Log4j configuration
nomisec
WRITEUP
3 stars
by KirkDJohnson · poc
https://github.com/KirkDJohnson/Wireshark
This repository is a writeup analyzing a Wireshark packet capture of a Log4j (CVE-2021-44228) exploit attempt. It details the forensic analysis of HTTP traffic containing JNDI injection, base64-encoded payloads, and outbound connection attempts, but does not include functional exploit code.
Classification
Writeup 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · HTTP traffic exposed
nomisec
WORKING POC
3 stars
by hotpotcookie · poc
https://github.com/hotpotcookie/CVE-2021-44228-white-box
This repository contains a white-box testing environment for CVE-2021-44228 (Log4Shell), including vulnerable Java applications and exploit scripts. It demonstrates the vulnerability in a controlled setting with GUI-based clients and LDAP interactions.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP server for payload delivery
nomisec
SCANNER
3 stars
by Joefreedy · poc
https://github.com/Joefreedy/Log4j-Windows-Scanner
This repository contains a C# scanner for detecting vulnerable Log4j JAR files (CVE-2021-44228) by checking for the presence of JndiLookup.class. It recursively scans directories, logs results to the desktop, and identifies outdated versions.
Classification
Scanner 95%
Target:
Apache Log4j < 2.15
No auth needed
Prerequisites:
Access to the target filesystem
nomisec
WORKING POC
3 stars
by irgoncalves · poc
https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228
This repository provides a Python script to mitigate CVE-2021-44228 (Log4Shell) on F5 BIG-IP devices by creating a custom signature set and applying it to all policies in blocking mode. It leverages the BIG-IP iControl REST API to automate the process.
Classification
Working Poc 95%
Target:
F5 BIG-IP ASM v15.x (likely compatible with v13.x/v14.x/v16.x)
Auth required
Prerequisites:
Access to BIG-IP management interface · Valid credentials for BIG-IP device · Python 3.7+ with required libraries
nomisec
WRITEUP
3 stars
by vorburger · poc
https://github.com/vorburger/Log4j_CVE-2021-44228
This repository provides mitigation strategies and background information for CVE-2021-44228 (Log4Shell), focusing on dependency management and logging back-end alternatives. It does not contain exploit code but references external resources for detection, scanning, and exploit details.
Classification
Writeup 100%
Target:
Apache Log4j 2.x
No auth needed
nomisec
WORKING POC
3 stars
by badb33f · poc
https://github.com/badb33f/Apache-Log4j-POC
This repository contains a proof-of-concept exploit for CVE-2021-44228, demonstrating the Log4j LDAP lookup vulnerability. The Java code triggers a JNDI lookup to an LDAP server, which can execute arbitrary code if configured maliciously.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP server hosting malicious payload
nomisec
WORKING POC
3 stars
by mss · poc
https://github.com/mss/log4shell-hotfix-side-effect
This repository contains a test case for verifying the effectiveness of the Log4Shell (CVE-2021-44228) hotfix. It checks for side effects like exceptions or delays when logging malicious strings, including payloads for CVE-2021-44228, CVE-2021-45046, and CVE-2021-45105.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (pre-2.16.0)
No auth needed
Prerequisites:
Vulnerable Log4j version (pre-2.16.0) · Network access to the target application
nomisec
WORKING POC
3 stars
by ubitech · poc
https://github.com/ubitech/cve-2021-44228-rce-poc
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI LDAP injection. It includes an attacker server with an LDAP proxy and payload server, along with a vulnerable application for testing.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · Ability to send crafted log messages
nomisec
SCANNER
3 stars
by pmontesd · poc
https://github.com/pmontesd/log4j-cve-2021-44228
This repository contains an Ansible playbook designed to scan a filesystem for JAR files vulnerable to Log4Shell (CVE-2021-44228). The results are saved in a CSV file for further analysis.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to the target filesystem · Ansible installed on the scanning system
nomisec
SCANNER
3 stars
by codiobert · poc
https://github.com/codiobert/log4j-scanner
This repository contains a bash script that scans for potential Log4j (CVE-2021-44228) vulnerabilities by searching for log4j-related files and packages using 'locate' and 'dpkg'. It is not a working exploit but a detection tool.
Classification
Scanner 90%
Target:
Apache Log4j (versions affected by CVE-2021-44228)
No auth needed
Prerequisites:
access to a Linux system with 'locate' and 'dpkg' installed
nomisec
WRITEUP
3 stars
by threatmonit · poc
https://github.com/threatmonit/Log4j-IOCs
This repository contains a list of Indicators of Compromise (IOCs) related to CVE-2021-44228 (Log4Shell), specifically IP addresses associated with exploitation attempts. It does not include exploit code or a proof-of-concept.
Classification
Writeup 100%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Access to network logs or threat intelligence feeds
nomisec
WORKING POC
3 stars
by madCdan · poc
https://github.com/madCdan/JndiLookup
This repository contains a Java-based PoC for CVE-2021-44228 (Log4Shell), demonstrating the JNDI lookup vulnerability in Apache Log4j 2. It allows testing and analyzing the vulnerability by processing input strings or stdin with Log4j's lookup feature, optionally enabling real JNDI lookups for testing purposes.
Classification
Working Poc 95%
Target:
Apache Log4j 2 (versions 2.14.1 and 2.15.0)
No auth needed
Prerequisites:
Java runtime environment · Log4j 2.14.1 or 2.15.0 JAR files · Network access to a malicious LDAP/RMI server for exploitation
nomisec
WORKING POC
3 stars
by unlimitedsola · poc
https://github.com/unlimitedsola/log4j2-rce-poc
This repository contains a functional proof-of-concept for CVE-2021-44228, demonstrating Log4j2 JNDI injection leading to remote code execution. It includes a victim Spring Boot application and a payload server to exploit the vulnerability via a crafted JNDI lookup string.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
JDK 1.8 for payload server · Vulnerable Log4j2 version in victim app · Network access to victim
nomisec
WORKING POC
3 stars
by saharNooby · poc
https://github.com/saharNooby/log4j-vulnerability-patcher-agent
This repository contains a Java agent that patches the Log4j vulnerability (CVE-2021-44228) by modifying the JndiLookup class to disable JNDI functionality. It uses ASM to transform the bytecode of the vulnerable method, replacing it with a method that returns null.
Classification
Working Poc 100%
Target:
Log4j 2.x (prior to 2.15.0)
No auth needed
Prerequisites:
Java application using vulnerable Log4j version · Ability to add Java agent to the application startup command
nomisec
WORKING POC
3 stars
by alexandreroman · poc
https://github.com/alexandreroman/cve-2021-44228-workaround-buildpack
This repository provides a CNCF buildpack workaround for CVE-2021-44228 (Log4j RCE) by setting the JVM property `log4j2.formatMsgNoLookups` to `true`. It includes a simple Java app to demonstrate the mitigation.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions prior to 2.15.0)
No auth needed
Prerequisites:
Vulnerable Log4j version (pre-2.15.0) · Ability to set JVM system properties
nomisec
WORKING POC
2 stars
by b-abderrahmane · remote
https://github.com/b-abderrahmane/CVE-2021-44228-playground
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), simulating an exploitation lab with Docker containers to test vulnerability and mitigations. It includes a Java web app, LDAP server, and payload delivery mechanism to demonstrate RCE via JNDI injection.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (tested with versions 2.12.1 and others)
No auth needed
Prerequisites:
Docker · Docker Compose · Maven · Python · Java
nomisec
SCANNER
2 stars
by julian911015 · remote
https://github.com/julian911015/Log4j-Scanner-Exploit
This repository provides a bash script to scan for and exploit the Log4Shell vulnerability (CVE-2021-44228) using LDAP payloads and various HTTP headers. It includes setup instructions for an LDAP server and HTTP server to facilitate testing.
Classification
Scanner 90%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Java · Curl · LDAP server (marshalsec) · HTTP server
nomisec
WORKING POC
2 stars
by dcm2406 · poc
https://github.com/dcm2406/CVE-Lab
This repository contains a working proof-of-concept for CVE-2021-44228 (Log4Shell) and CVE-2023-46604 (Apache ActiveMQ RCE). It includes detailed setup instructions, exploit code, and steps to achieve remote code execution via LDAP/JNDI injection and reverse shell.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x, Apache ActiveMQ 5.18.2
No auth needed
Prerequisites:
Kali Linux 2023.4 · Ubuntu 22.04.3 LTS · OpenJDK 8/18 · Docker · Network access to target
nomisec
WORKING POC
2 stars
by korteke · poc
https://github.com/korteke/log4shell-demo
This repository contains a Spring Boot application intentionally configured to be vulnerable to CVE-2021-44228 (Log4Shell). It logs the User-Agent header using Log4j2, allowing for JNDI injection attacks.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (Spring Boot applications)
No auth needed
Prerequisites:
Network access to the target application · Log4j2 configured to log user-controlled input
nomisec
WORKING POC
2 stars
by avwolferen · poc
https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation
This repository contains PowerShell scripts to mitigate CVE-2021-44228 (Log4j vulnerability) in Sitecore Solr installations by updating Log4j libraries to a secure version. The scripts automate the process of downloading, verifying, and replacing vulnerable Log4j JAR files in Solr directories.
Classification
Working Poc 95%
Target:
Sitecore Solr with vulnerable Log4j versions
Auth required
Prerequisites:
Administrator privileges · Sitecore Solr installed with default paths · Network access to download Log4j updates
nomisec
WORKING POC
2 stars
by aws-samples · poc
https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent
This repository provides a Kubernetes DaemonSet to mitigate CVE-2021-44228 by hot-patching JVMs to disable JNDI lookups in Log4j2. It includes scripts and documentation for deployment but does not contain offensive exploit code.
Classification
Working Poc 90%
Target:
Apache Log4j2 < 2.15.0
No auth needed
Prerequisites:
Kubernetes cluster with vulnerable Log4j2 instances · Access to apply DaemonSet manifests
nomisec
WORKING POC
2 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/log4jshell_CVE-2021-44228
This repository provides a proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via LDAP JNDI injection. It includes a base64-encoded reverse shell payload and instructions for exploitation.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Publicly accessible vulnerable Log4j instance · LDAP server to host malicious payload · Network connectivity to target
nomisec
WORKING POC
2 stars
by BabooPan · poc
https://github.com/BabooPan/Log4Shell-CVE-2021-44228-Demo
This repository provides a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection using a vulnerable Log4j application and a malicious LDAP server. It includes detailed setup instructions and exploitation steps.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker for vulnerable app deployment · Java for JNDIExploit server · Network access to target
nomisec
WORKING POC
2 stars
by tasooshi · poc
https://github.com/tasooshi/horrors-log4shell
This repository contains a proof-of-concept exploit for CVE-2021-44228 (Log4Shell), including LDAP server implementation and payloads for reverse shells. The code demonstrates the exploitation of the Log4j vulnerability via JNDI injection.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · LDAP server for payload delivery
nomisec
WORKING POC
2 stars
by alpacamybags118 · poc
https://github.com/alpacamybags118/log4j-cve-2021-44228-sample
This repository demonstrates the Log4j CVE-2021-44228 vulnerability by setting up a vulnerable app and an LDAP server to showcase the JNDI lookup exploit. It includes a Dockerized environment to simulate the attack, where a crafted HTTP header triggers an LDAP callback.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · vulnerable Log4j application · network access to target
nomisec
SCANNER
2 stars
by anuvindhs · poc
https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228
This repository provides a simple bash script to scan for the presence of Log4j files, which may indicate vulnerability to CVE-2021-44228. It checks for installed packages and located files but does not perform active exploitation.
Classification
Scanner 90%
Target:
Apache Log4j (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to the target system to run the script
nomisec
WORKING POC
2 stars
by Fazmin · poc
https://github.com/Fazmin/vCenter-Server-Workaround-Script-CVE-2021-44228
This repository contains a Bash script to apply workarounds for CVE-2021-44228 (Log4j vulnerability) on VMware vCenter Server. The script automates the process of patching configuration files and restarting services to mitigate the vulnerability.
Classification
Working Poc 95%
Target:
VMware vCenter Server (6.5, 6.7, 7.0)
Auth required
Prerequisites:
SSH access to vCenter Server · Shell access on vCenter Server
nomisec
WRITEUP
2 stars
by thedevappsecguy · poc
https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
This repository provides a detailed writeup on mitigations for multiple Log4j vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, CVE-2021-44832), including background, JNDI architecture, and mitigation steps for different environments.
Classification
Writeup 100%
Target:
Apache Log4j versions 2.0-alpha1 through 2.17.0
No auth needed
Prerequisites:
Vulnerable Log4j version · Ability to send crafted log messages
nomisec
SCANNER
2 stars
by chandru-gunasekaran · poc
https://github.com/chandru-gunasekaran/log4j-fix-CVE-2021-44228
This repository provides a Windows Batch Script to scan local drives for JAR files impacted by CVE-2021-44228 (Log4Shell). It can either report impacted JARs or attempt to fix them by removing vulnerable classes.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
7-Zip installed on the system · Administrative privileges for scanning/fixing system-wide JARs
nomisec
WORKING POC
2 stars
by spasam · poc
https://github.com/spasam/log4j2-exploit
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j2. It includes a vulnerable Spring Boot application and an attacker-controlled LDAP/HTTP server to deliver payloads.
Classification
Working Poc 95%
Target:
Apache Log4j2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 or later · Network access to target · Vulnerable Log4j2 version
nomisec
SCANNER
2 stars
by alenazi90 · poc
https://github.com/alenazi90/log4j
This repository contains a Python-based scanner for detecting the Log4j RCE vulnerability (CVE-2021-44228) by sending crafted HTTP requests with JNDI payloads to target URLs and checking DNS logs for callbacks.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
List of target URLs · DNS callback domain (e.g., from dnslog.cn)
nomisec
WORKING POC
2 stars
by VinniMarcon · poc
https://github.com/VinniMarcon/Log4j-Updater
This repository provides a bash script to automate the detection and updating of Log4j packages to mitigate CVE-2021-44228. It supports APT and YUM package managers and attempts to install or update Log4j to a secure version.
Classification
Working Poc 90%
Target:
Log4j (versions < 2.15.0)
Auth required
Prerequisites:
Access to a Linux system with APT or YUM package manager · Sudo privileges
nomisec
SCANNER
2 stars
by perryflynn · poc
https://github.com/perryflynn/find-log4j
This repository contains scripts to scan for Log4j (CVE-2021-44228) in Debian, Docker, and Windows environments by searching for JAR files containing Log4j classes. It does not exploit the vulnerability but helps identify potentially vulnerable systems.
Classification
Scanner 100%
Target:
Log4j (versions affected by CVE-2021-44228)
No auth needed
Prerequisites:
Access to the target filesystem or Docker environment
nomisec
SCANNER
2 stars
by kek-Sec · poc
https://github.com/kek-Sec/log4j-scanner-CVE-2021-44228
This repository contains a C# tool designed to scan log files for patterns indicative of CVE-2021-44228 (Log4Shell) exploitation attempts. It uses regex patterns to detect JNDI injection strings and obfuscated variants in log files.
Classification
Scanner 100%
Target:
Log4j (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to log files for scanning
nomisec
WRITEUP
2 stars
by ph0lk3r · poc
https://github.com/ph0lk3r/anti-jndi
This repository provides a defensive mechanism to mitigate Log4Shell (CVE-2021-44228) exploitation by serving large gzipped files to requests containing JNDI lookup patterns. It includes configurations for Apache2 and references Nginx setups.
Classification
Writeup 100%
Target:
Apache2, Nginx, Lighttpd
No auth needed
Prerequisites:
Web server access · Ability to modify server configurations
nomisec
WORKING POC
2 stars
by jeffli1024 · poc
https://github.com/jeffli1024/log4j-rce-test
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Log4j. It includes a custom payload server and client-side trigger code.
Classification
Working Poc 95%
Target:
Apache Log4j (versions >=2.0-beta9 and <=2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP/RMI server for payload delivery
nomisec
WORKING POC
2 stars
by taurusxin · poc
https://github.com/taurusxin/CVE-2021-44228
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection in Log4j. It includes an RMI server hosting malicious code and a Log4j test case triggering the payload.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java runtime environment · Network access to the target · Log4j vulnerable version in use
nomisec
WORKING POC
2 stars
by dotPY-hax · poc
https://github.com/dotPY-hax/log4py
This repository contains a Python-based exploit for CVE-2021-44228 (Log4Shell), implementing LDAP and HTTP servers to deliver malicious Java payloads. It includes multiple attack methods, such as header injection and a shotgun approach targeting various HTTP parameters.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j instance · Network access to target · LDAP/HTTP egress from target
nomisec
WORKING POC
2 stars
by mzlogin · poc
https://github.com/mzlogin/CVE-2021-44228-Demo
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via RMI and LDAP JNDI injection. It includes server implementations and a vulnerable Log4j application to trigger the exploit.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java runtime environment · Python3 for auxiliary servers · Network access to target
nomisec
WORKING POC
2 stars
by jeffbryner · poc
https://github.com/jeffbryner/log4j-docker-vaccine
This repository provides a Dockerized version of the Log4j vaccine to mitigate CVE-2021-44228 (Log4Shell) by serving a benign payload via LDAP and HTTP. It uses marshalsec for LDAP and a Python HTTP server to deliver the Log4jRCE class.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · Access to a vulnerable Log4j instance · Network connectivity to the LDAP/HTTP servers
nomisec
WORKING POC
2 stars
by mkhazamipour · poc
https://github.com/mkhazamipour/log4j-vulnerable-app-cve-2021-44228-terraform
This repository provides a Terraform script to deploy a vulnerable Log4j application and a JNDIExploit server in AWS, enabling testing of CVE-2021-44228 (Log4Shell). The exploit leverages JNDI injection to achieve remote code execution (RCE) via an LDAP callback.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
AWS credentials · Terraform installed · SSH public key for instance access
nomisec
WORKING POC
2 stars
by byteboycn · poc
https://github.com/byteboycn/CVE-2021-44228-Apache-Log4j-Rce
This PoC demonstrates CVE-2021-44228 (Log4Shell) by exploiting JNDI injection in Log4j to trigger remote code execution via an RMI server. The exploit requires a vulnerable Log4j version and a misconfigured JDK to allow remote codebase loading.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · JDK with `com.sun.jndi.ldap.object.trustURLCodebase` set to `true` · Network access to the RMI server
nomisec
WORKING POC
2 stars
by binganao · poc
https://github.com/binganao/Log4j2-RCE
This repository contains a proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j2. It includes payloads for executing commands and launching a calculator, along with a main class to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j2 version · Network access to the target · LDAP/RMI server for payload delivery
nomisec
WORKING POC
2 stars
by 1in9e · poc
https://github.com/1in9e/Apache-Log4j2-RCE
This repository provides a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection in Log4j2. It includes a web servlet and a standalone test case to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j2 version · Network access to target · LDAP/JNDI server for payload delivery
nomisec
WRITEUP
1 stars
by lathika-3006 · poc
https://github.com/lathika-3006/Solar-exploiting-log-4j
This repository provides a detailed walkthrough for exploiting CVE-2021-44228 (Log4Shell) on a TryHackMe room, including reconnaissance, payload delivery via JNDI injection, and reverse shell setup. It does not contain functional exploit code but offers a step-by-step technical guide.
Classification
Writeup 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
network access to target · LDAP server setup · malicious Java class hosting
nomisec
WORKING POC
1 stars
by nu11secur1ty · poc
https://github.com/nu11secur1ty/CVE-2021-44228-VULN-APP
This repository provides a vulnerable Dockerized application demonstrating CVE-2021-44228 (Log4Shell). The LoginServlet logs user input via Log4j, making it susceptible to JNDI injection attacks.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (vulnerable versions)
No auth needed
Prerequisites:
Docker · Network access to the target application
nomisec
WORKING POC
1 stars
by qw3rtyou · poc
https://github.com/qw3rtyou/CVE-2021-44228_dockernize
This repository provides a dockerized environment to demonstrate CVE-2021-44228 (Log4Shell), including a vulnerable Java application and an attacker-controlled LDAP/HTTP server to deliver a malicious payload for RCE.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker environment · Network access to vulnerable Log4j application
nomisec
WORKING POC
1 stars
by sec13b · remote
https://github.com/sec13b/CVE-2021-44228-POC
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), leveraging LDAP and HTTP servers to exploit vulnerable Log4j instances. It includes scripts to trigger the vulnerability and exfiltrate data via JNDI lookups.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP/HTTP server setup
nomisec
WORKING POC
1 stars
by Carlos-Mesquita · poc
https://github.com/Carlos-Mesquita/TPASLog4ShellPoC
This repository contains a functional Proof of Concept (PoC) for CVE-2021-44228 (Log4Shell), featuring a Spring Boot backend with a vulnerable Log4j 2.14 configuration and a React frontend to simulate an e-commerce site. It includes a bash script to set up the attacker infrastructure and demonstrates exploitation via JNDI injection in query parameters or headers.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14
No auth needed
Prerequisites:
Docker for target setup · Java, Python, and Maven for attacker setup · Netcat for reverse shell · LDAP server for payload delivery
nomisec
WORKING POC
1 stars
by srcporter · poc
https://github.com/srcporter/CVE-2021-44228
This repository contains a Spring Boot application deliberately vulnerable to CVE-2021-44228 (Log4Shell). It includes build scripts for x86/amd64 and s390x architectures, demonstrating the RCE vulnerability in Log4j 2.
Classification
Working Poc 90%
Target:
Apache Log4j 2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to the vulnerable application · Log4j 2 vulnerable version in the classpath
nomisec
WORKING POC
1 stars
by Hoanle396 · remote
https://github.com/Hoanle396/CVE-2021-44228-demo
This repository contains a functional Proof-of-Concept (PoC) for CVE-2021-44228 (Log4Shell), including a vulnerable Java web application and a Python script to exploit the vulnerability via JNDI injection, leading to remote code execution (RCE). The exploit sets up an LDAP server and HTTP server to deliver a malicious payload, resulting in a reverse shell.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Python 3.x · Java JDK 1.8.0_20 · Netcat or similar listener · Network access to target
nomisec
WRITEUP
1 stars
by sourcegraph · poc
https://github.com/sourcegraph/log4j-cve-code-search-resources
This repository provides documentation and batch change specifications for mitigating CVE-2021-44228 and CVE-2021-45046 in Log4j. It includes detection and upgrade scripts for Gradle, Maven, and sbt projects.
Classification
Writeup 100%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Access to Sourcegraph Batch Changes · Gradle/Maven/sbt projects using vulnerable Log4j versions
nomisec
WORKING POC
1 stars
by demonrvm · poc
https://github.com/demonrvm/Log4ShellRemediation
This repository contains a Spring Boot application demonstrating CVE-2021-44228 (Log4Shell) by logging user-controlled input via Log4j2. The vulnerable endpoint is /greeting, which logs the 'name' parameter without sanitization.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j2 version in classpath · Network access to the target application
nomisec
WORKING POC
1 stars
by Sma-Das · remote
https://github.com/Sma-Das/Log4j-PoC
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating both RCE and information leakage via LDAP callbacks. It includes a malicious LDAP server that serves serialized payloads to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions before 2.15.0)
No auth needed
Prerequisites:
Network access to target · Target application logs attacker-controlled input
nomisec
WORKING POC
1 stars
by pierpaolosestito-dev · poc
https://github.com/pierpaolosestito-dev/Log4Shell-CVE-2021-44228-PoC
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Log4j2. It includes a vulnerable Spring Boot app, a malicious LDAP server setup, and an exploit payload that executes commands and establishes a reverse shell.
Classification
Working Poc 100%
Target:
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding 2.12.2, 2.12.3, and 2.3.1)
No auth needed
Prerequisites:
Vulnerable Log4j2 version · Network access to target · Ability to send crafted HTTP headers
nomisec
WORKING POC
1 stars
by Rainyseason-c · poc
https://github.com/Rainyseason-c/log4j2_CVE-2021-44228
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via a vulnerable Log4j2 instance. The `vul_log4j.java` file sets up an HTTP server that logs the User-Agent header, while `Exploit.java` executes `calc.exe` as a payload example.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j2 version · Network access to the target · Ability to send crafted User-Agent header
nomisec
WRITEUP
1 stars
by TPower2112 · poc
https://github.com/TPower2112/Writing-Sample-1
This repository contains a detailed writeup on CVE-2021-44228, a critical RCE vulnerability in Log4j. It includes mitigation strategies, identification methods, and resources for further reading.
Classification
Writeup 100%
Target:
Apache Log4j 2.0-beta7 through 2.17.0
No auth needed
Prerequisites:
Network access to vulnerable Log4j instance · Ability to send crafted log messages
nomisec
STUB
1 stars
by bcdunbar · poc
https://github.com/bcdunbar/CVE-2021-44228-poc
This repository contains only a minimal Spring Boot application skeleton with no actual exploit code for CVE-2021-44228 (Log4Shell). It lacks the necessary payload or logging configuration to demonstrate the vulnerability.
Target:
Apache Log4j 2 (theoretical)
No auth needed
Prerequisites:
Vulnerable Log4j 2 version (2.0-beta9 to 2.14.1)
nomisec
WORKING POC
1 stars
by jaehnri · poc
https://github.com/jaehnri/CVE-2021-44228
This repository contains a proof-of-concept for CVE-2021-44228 (Log4Shell), including a vulnerable Spring Boot application, a patched version, and a malicious LDAP server that serves a payload to exploit the vulnerability.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to the vulnerable application · Ability to send crafted HTTP requests with malicious headers
nomisec
WORKING POC
1 stars
by moshuum · poc
https://github.com/moshuum/tf-log4j-aws-poc
This repository contains a proof-of-concept exploit for CVE-2021-44228 (Log4j RCE). It automates the setup of a malicious LDAP server and listener to exploit vulnerable Log4j instances, leveraging a modified version of the kozmer/log4j-shell-poc.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Publicly accessible vulnerable Log4j instance · Network connectivity to target · Python 3 and pip · Java Development Kit (JDK)
nomisec
SCANNER
1 stars
by manishkanyal · poc
https://github.com/manishkanyal/log4j-scanner
This repository contains a scanner for detecting Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046) in web applications. It supports multiple URLs, WAF bypass payloads, and both GET and POST requests.
Classification
Scanner 95%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Python 3.x · requests library · termcolor library · interact.sh or similar DNS callback service
nomisec
SCANNER
1 stars
by andalik · poc
https://github.com/andalik/log4j-filescan
This repository contains a Python-based scanner for detecting vulnerable versions of Log4j (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, CVE-2021-44832) by recursively scanning filesystems and Java archives (JAR, WAR, EAR, ZIP). It checks file hashes against known vulnerable versions.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (versions affected by CVE-2021-44228 and related CVEs)
No auth needed
Prerequisites:
Access to the target filesystem or archives
nomisec
WORKING POC
1 stars
by Panyaprach · poc
https://github.com/Panyaprach/Prove-CVE-2021-44228
This PoC demonstrates CVE-2021-44228 (Log4Shell) by setting up an evil RMI server that exploits JNDI lookup vulnerabilities in Log4j. The Victim class triggers the exploit via malicious log entries, leading to remote code execution (RCE).
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to the target · Target application using vulnerable Log4j version · Target application logging attacker-controlled input
nomisec
WRITEUP
1 stars
by lhotari · poc
https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228
This repository provides a Dockerfile and instructions for patching Apache Pulsar Docker images to mitigate CVE-2021-44228 and related Log4j vulnerabilities by upgrading to Log4j 2.17.1. It includes build and verification steps but does not contain exploit code.
Classification
Writeup 100%
Target:
Apache Pulsar (Docker images)
No auth needed
Prerequisites:
Docker environment · Access to vulnerable Apache Pulsar Docker images
nomisec
SCANNER
1 stars
by VerveIndustrialProtection · poc
https://github.com/VerveIndustrialProtection/CVE-2021-44228-Log4j
This repository provides a PowerShell-based generator for creating detection scripts (Fixlets) to identify systems vulnerable to CVE-2021-44228 (Log4j). It includes templates and components for generating detection mechanisms across different operating systems.
Classification
Scanner 90%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
PowerShell execution environment · Access to target systems for scanning
nomisec
WRITEUP
1 stars
by helsecert · poc
https://github.com/helsecert/CVE-2021-44228
This repository provides a detailed writeup and mitigation guidance for CVE-2021-44228 (Log4Shell) and related Log4j vulnerabilities. It includes detection methods, mitigation strategies, and references to external resources.
Classification
Writeup 100%
Target:
Apache Log4j 2.x (versions prior to 2.17.0)
No auth needed
Prerequisites:
A vulnerable version of Log4j 2.x · An attack vector to inject malicious strings into logs
nomisec
WORKING POC
1 stars
by MarceloLeite2604 · remote
https://github.com/MarceloLeite2604/log4j-vulnerability
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via a vulnerable Log4j instance. It includes an exploiter tool, a vulnerable service, and detailed instructions for execution.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1 (via Spring Boot with log4j-core)
No auth needed
Prerequisites:
Oracle JDK 1.8.0_181 · Docker · Apache Maven · Netcat · Log4j 2.14.1 (vulnerable version)
nomisec
SCANNER
1 stars
by kal1gh0st · poc
https://github.com/kal1gh0st/MyLog4Shell
This repository contains multiple scripts (PowerShell, Python, Bash) designed to scan filesystems for JAR, WAR, and EAR files containing the `JndiLookup.class` file, which is indicative of potential vulnerability to CVE-2021-44228 (Log4Shell). The scripts also check for patched versions by examining byte patterns in the class files.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions prior to 2.16.0)
No auth needed
Prerequisites:
Access to the filesystem containing JAR/WAR/EAR files
nomisec
WORKING POC
1 stars
by mn-io · poc
https://github.com/mn-io/log4j-spring-vuln-poc
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in a Spring Boot application using a vulnerable Log4j2 version. The PoC includes endpoints that trigger the vulnerability when accessed with crafted input.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1 (via Spring Boot 2.6.1)
No auth needed
Prerequisites:
Network access to the target application · A listener (e.g., netcat) to receive the JNDI callback
nomisec
SCANNER
1 stars
by gyaansastra · poc
https://github.com/gyaansastra/CVE-2021-44228
This repository provides a scanner tool for detecting CVE-2021-44228 (Log4Shell) vulnerabilities. It supports DNS OOB callbacks, fuzzing for various HTTP headers and parameters, and includes WAF bypass payloads.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to target URLs · DNS callback provider (e.g., dnslog.cn, interact.sh)
nomisec
WORKING POC
1 stars
by dmitsuo · poc
https://github.com/dmitsuo/log4shell-war-fixer
This repository contains a Linux shell script that patches WAR files by removing the JndiLookup.class file from Log4j 2.x JARs to mitigate CVE-2021-44228 (Log4Shell). It automates the extraction, modification, and repackaging of the WAR file.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
WAR file containing vulnerable Log4j 2.x JAR · zip and unzip utilities installed
nomisec
SCANNER
1 stars
by Rk-000 · poc
https://github.com/Rk-000/Log4j_scan_Advance
This repository contains a scanner for detecting CVE-2021-44228 (Log4j RCE) and CVE-2021-45046. It supports DNS callback validation, WAF bypass payloads, and extensive fuzzing for HTTP headers, POST data, and JSON parameters.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to target systems · DNS callback provider (e.g., interact.sh)
nomisec
SCANNER
1 stars
by trickyearlobe · poc
https://github.com/trickyearlobe/inspec-log4j
This repository contains an InSpec profile for scanning systems for vulnerable versions of Log4j Core JAR files, including those embedded in WAR files. It checks for versions older than 2.16.0 and the presence of the JndiLookup.class file.
Classification
Scanner 100%
Target:
Apache Log4j Core versions < 2.16.0
Auth required
Prerequisites:
Access to the file system where Log4j JAR/WAR files are located · Privileged access for scanning system drives
nomisec
WRITEUP
1 stars
by Apipia · poc
https://github.com/Apipia/log4j-pcap-activity
This repository provides a PCAP file and a set of questions to analyze the Log4j exploit (CVE-2021-44228) in a packet capture. It is an educational activity to understand the exploit's network traffic and steps.
Classification
Writeup 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · Ability to send crafted HTTP requests
nomisec
WORKING POC
1 stars
by guerzon · poc
https://github.com/guerzon/log4shellpoc
This repository contains a Spring Boot application intentionally vulnerable to CVE-2021-44228 (Log4Shell). It logs the User-Agent header via Log4j 2, allowing remote code execution through JNDI injection.
Classification
Working Poc 100%
Target:
Apache Log4j 2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to the vulnerable application · Log4j 2 vulnerable version in use
nomisec
WRITEUP
1 stars
by Aschen · poc
https://github.com/Aschen/log4j-patched
This repository provides a mitigation for CVE-2021-44228 (Log4Shell) by removing the JndiLookup.class from Log4j JAR files. It includes scripts to patch the library locally or download pre-patched versions.
Classification
Writeup 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.16.0)
No auth needed
Prerequisites:
Access to download and modify JAR files on the target system
nomisec
SCANNER
1 stars
by dpomnean · poc
https://github.com/dpomnean/log4j_scanner_wrapper
This repository contains a wrapper script for scanning Linux directories for the Log4j vulnerability CVE-2021-44228. It uses the logpresso scanner to check common directories and excludes NFS mounts.
Classification
Scanner 95%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Java runtime environment · wget installed
nomisec
WORKING POC
1 stars
by chilliwebs · poc
https://github.com/chilliwebs/CVE-2021-44228_Example
This repository demonstrates CVE-2021-44228 (Log4Shell) by exploiting a vulnerable Log4j instance to trigger an LDAP JNDI lookup, loading a malicious Java class that prints 'PWND!' to confirm code execution. The setup includes a marshalsec LDAP server, an exploit web server, and a vulnerable Java application (guinea_pig).
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker environment · Vulnerable Log4j version · Network access to LDAP server
nomisec
WORKING POC
1 stars
by rgl · poc
https://github.com/rgl/log4j-log4shell-playground
This repository provides a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI lookups in vulnerable Log4j versions. It includes a Java-based HTTP server that logs user-supplied headers, triggering the vulnerability when malicious input is processed.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions < 2.16.0)
No auth needed
Prerequisites:
Vulnerable Log4j version in the target application · Ability to send crafted HTTP headers to the target
nomisec
SCANNER
1 stars
by Woahd · poc
https://github.com/Woahd/log4j-urlscanner
This Python script scans a list of URLs for the Log4j vulnerability (CVE-2021-44228) by sending crafted payloads in HTTP headers and parameters. It uses DNS callbacks to a Burp Collaborator or similar service to detect vulnerable hosts.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (CVE-2021-44228)
No auth needed
Prerequisites:
List of target URLs · Burp Collaborator or similar DNS callback service
nomisec
WORKING POC
1 stars
by kimobu · remote
https://github.com/kimobu/cve-2021-44228
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating JNDI injection to trigger various payloads via LDAP. The Java code sends multiple exploit attempts to a controlled LDAP server, including command execution, reverse shells, and DNS callbacks.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP server hosting malicious payloads
nomisec
SCANNER
1 stars
by gcmurphy · poc
https://github.com/gcmurphy/chk_log4j
This repository contains a Rust-based tool to scan JAR files for vulnerabilities related to CVE-2021-44228 (Log4j). It checks for known vulnerable SHA-256 hashes and the presence of the JndiLookup.class file.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to the target JAR files
nomisec
STUB
1 stars
by p3dr16k · poc
https://github.com/p3dr16k/log4j-1.2.15-mod
The repository contains modified Log4j 1.2.15 source files but lacks executable exploit code or a clear demonstration of CVE-2021-44228 exploitation. The files appear to be part of a larger project but do not include a functional PoC.
Target:
Apache Log4j 1.2.15
No auth needed
Prerequisites:
Log4j 1.2.15 with vulnerable configuration
nomisec
WORKING POC
1 stars
by kali-dass · poc
https://github.com/kali-dass/CVE-2021-44228-log4Shell
This repository contains a PoC for CVE-2021-44228 (Log4Shell), demonstrating command execution via JNDI injection. The ExploitTest.java file executes arbitrary commands (ping, calculator, curl) to showcase RCE capabilities, while RMIServer.java sets up an RMI server for payload delivery.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · JNDI/LDAP/RMI endpoint under attacker control
nomisec
WRITEUP
1 stars
by JiuBanSec · remote
https://github.com/JiuBanSec/Log4j-CVE-2021-44228
This repository contains a README file describing CVE-2021-44228, a remote code execution vulnerability in Apache Log4j 2.x versions prior to 2.15.0-rc2. The README includes a screenshot but no actual exploit code or technical details.
Classification
Writeup 90%
Target:
Apache Log4j 2.x < 2.15.0-rc2
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to a service using Log4j
nomisec
WORKING POC
1 stars
by halibobor · poc
https://github.com/halibobor/log4j2
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection in Log4j2. It includes an RMI server hosting a malicious object that triggers arbitrary command execution (e.g., launching a calculator or calendar app) when the vulnerable Log4j2 logging function processes the crafted JNDI string.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to the target system · Target application must use vulnerable Log4j2 version and log attacker-controlled input
nomisec
WORKING POC
1 stars
by DiCanio · poc
https://github.com/DiCanio/CVE-2021-44228-docker-example
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating data exfiltration via a vulnerable Log4j server, a malicious LDAP server, and a receiver service. The exploit triggers RCE by logging a crafted JNDI string, which fetches and executes a payload to exfiltrate data.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (specifically vulnerable in Java 8u111 with Spring Boot 2.6.1)
No auth needed
Prerequisites:
Docker environment · Network connectivity between components · Vulnerable Log4j version
nomisec
WORKING POC
1 stars
by pravin-pp · poc
https://github.com/pravin-pp/log4j2-CVE-2021-44228
This repository contains a functional Spring Boot application demonstrating CVE-2021-44228 (Log4Shell), which allows remote code execution via JNDI injection in Log4j 2.x. The PoC includes endpoints that log user-controlled input, triggering the vulnerability when crafted payloads are sent.
Classification
Working Poc 100%
Target:
Apache Log4j 2.0-beta9 to 2.14.1 (via Spring Boot)
No auth needed
Prerequisites:
Network access to the target application · LDAP server controlled by the attacker to serve malicious payloads
nomisec
WRITEUP
1 stars
by RrUZi · poc
https://github.com/RrUZi/Awesome-CVE-2021-44228
This repository is a curated list of links to other repositories related to CVE-2021-44228 (Log4Shell). It does not contain exploit code itself but references PoCs, detection tools, and vulnerable apps.
Classification
Writeup 100%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
none
nomisec
WRITEUP
1 stars
by cado-security · poc
https://github.com/cado-security/log4shell
This repository contains documentation and community resources related to the Log4j vulnerability Log4Shell (CVE-2021-44228). It does not include exploit code or a proof-of-concept.
Classification
Writeup 90%
Target:
Apache Log4j 2.x
No auth needed
nomisec
WORKING POC
1 stars
by uint0 · poc
https://github.com/uint0/cve-2021-44228--spring-hibernate
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in a Spring/Hibernate application. The exploit triggers deserialization through a vulnerable Log4j logger, executing arbitrary commands on the victim system.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (affecting Spring/Hibernate applications)
No auth needed
Prerequisites:
Victim application with vulnerable Log4j version · Network access to victim's exposed endpoint · RMI server for payload delivery
nomisec
WORKING POC
by pinaraltinok · poc
https://github.com/pinaraltinok/Log4Shell-Attack
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection. It includes a Dockerized attacker and victim setup, with an LDAP server serving a malicious Java class that writes a proof file on the victim system.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · Java 8 · Network connectivity between attacker and victim
nomisec
WRITEUP
by davindersingh74569-lang · poc
https://github.com/davindersingh74569-lang/HTB-Unified-Writeup
This repository contains a technical walkthrough of exploiting CVE-2021-44228 (Log4Shell) in a UniFi Network Application environment, including MongoDB manipulation and privilege escalation. It provides a detailed analysis of the vulnerability and its exploitation in a specific context.
Classification
Writeup 90%
Target:
UniFi Network Application (version not specified)
No auth needed
Prerequisites:
vulnerable UniFi Network Application instance · network access to the target
nomisec
WRITEUP
by jdormannn · poc
https://github.com/jdormannn/SecureOps-Lab
This repository contains a detailed technical writeup and custom scripts for detecting and analyzing Log4Shell (CVE-2021-44228) exploitation attempts, along with broader security audits. It includes evidence of active attacks, risk assessments, and remediation steps.
Classification
Writeup 95%
Target:
Log4j (CVE-2021-44228)
No auth needed
Prerequisites:
Access to system logs · Bash environment · Nmap and Lynis installed
nomisec
WORKING POC
by joaovicdev · poc
https://github.com/joaovicdev/EXPLOIT-CVE-2021-44228
This repository contains a fully functional exploit for CVE-2021-44228 (Log4Shell), including a vulnerable Java application, an attacker infrastructure with LDAP and HTTP servers, and a Node.js script to trigger the exploit. It demonstrates Remote Code Execution (RCE) via JNDI injection in Log4j.
Classification
Working Poc 100%
Target:
Apache Log4j 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
Docker and Docker Compose · Node.js
nomisec
WRITEUP
by Lavanya2085 · poc
https://github.com/Lavanya2085/solar-exploiting-log4j
This repository provides a detailed walkthrough for exploiting CVE-2021-44228 (Log4Shell) on a TryHackMe room, including steps for reconnaissance, vulnerability identification, and payload delivery. It outlines the use of JNDI injection via LDAP and HTTP servers to achieve remote code execution.
Classification
Writeup 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java-based web application with vulnerable Log4j version · LDAP server (e.g., marshalsec) · HTTP server for payload hosting · Netcat for reverse shell
nomisec
WRITEUP
by Saru1718 · poc
https://github.com/Saru1718/THM---Solar-exploiting-Log-4j
This repository provides a detailed technical walkthrough of exploiting CVE-2021-44228 (Log4Shell), including reconnaissance, payload injection, and mitigation techniques. It describes the vulnerability mechanics and step-by-step exploitation but does not contain functional exploit code.
Classification
Writeup 90%
Target:
Apache Log4j (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
vulnerable Log4j version · network access to target · ability to inject JNDI payloads
nomisec
SUSPICIOUS
by wmohamed2033 · poc
https://github.com/wmohamed2033/wmohamed2033.github.io
The repository contains only a README with a title mentioning CVE-2021-44228 (Log4Shell) but no technical details, exploit code, or analysis. It appears to be a placeholder or lure without substantive content.
Classification
Suspicious 90%
Target:
Apache Log4j (unspecified version)
No auth needed
nomisec
WORKING POC
by Codepumpking · poc
https://github.com/Codepumpking/log4shell-poc
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Log4j 2.14.1. It includes a vulnerable Spring Boot server, an exploit class, and detailed attack commands.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
OpenJDK 1.8.0_181 or lower · marshalsec LDAP server · Python HTTP server · netcat listener
nomisec
WORKING POC
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2021-44228
The repository contains a functional exploit for CVE-2021-44228 (Log4Shell), including a Python script that sends malicious JNDI payloads via various HTTP headers and parameters to trigger RCE in vulnerable Log4j instances. The Java file is a simple reverse shell payload that would be served via LDAP/RMI.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions >= 2.0-beta9 and < 2.15.0)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · Attacker-controlled LDAP/RMI server
nomisec
WORKING POC
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2021-44228
The repository contains a functional exploit for CVE-2021-44228 (Log4Shell), including a Python script that sends malicious JNDI payloads via HTTP headers and parameters to trigger RCE in vulnerable Log4j instances. The Java file demonstrates a reverse shell payload typical of Log4Shell exploitation.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions >= 2.0-beta9 and < 2.15.0)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP/RMI server to host payload
nomisec
WRITEUP
by zaryouhashraf · poc
https://github.com/zaryouhashraf/CVE-2021-44228
This repository provides a detailed technical analysis of CVE-2021-44228 (Log4Shell), including root cause, exploitation mechanics, affected versions, mitigation strategies, and real-world impact. It does not contain exploit code but offers in-depth vulnerability research.
Classification
Writeup 100%
Target:
Apache Log4j 2.x (versions >= 2.0-beta9 and < 2.15.0)
No auth needed
Prerequisites:
Vulnerable Log4j version · Ability to send crafted input to a service that logs it
gitlab
WORKING POC
by jekewa · poc
https://gitlab.com/jekewa/log4jexploit
This repository contains a functional exploit PoC for CVE-2021-44228 (Log4Shell), demonstrating JNDI injection via Log4j's lookup feature. It includes a simple servlet that logs user input, allowing testing of the vulnerability with crafted payloads.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions < 2.17.1)
No auth needed
Prerequisites:
A vulnerable Log4j version (2.x < 2.17.1) · Network access to the target application · A malicious LDAP/RMI server to deliver payloads
gitlab
WORKING POC
by aakash_mathur · poc
https://gitlab.com/aakash_mathur/log4shell
This repository contains a vulnerable Java Spring Boot application designed to test CVE-2021-44228 (Log4Shell). It includes a Dockerized environment and a Python script to detect and exploit the vulnerability via JNDI injection.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · Python 3 · Java Runtime Environment
gitlab
SCANNER
by aviralcsw · poc
https://gitlab.com/aviralcsw/log4j2-exploitation-detection
This repository contains a Python script designed to detect exploitation attempts of CVE-2021-44228 (Log4Shell) by scanning log files for known exploit strings and patterns. It does not exploit the vulnerability but passively scans for indicators of compromise.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
access to log files · Python 3
gitlab
SCANNER
by rpandey1 · poc
https://gitlab.com/rpandey1/log4j2-exploitation-detection
This repository contains a Python script designed to detect exploitation attempts of CVE-2021-44228 (Log4Shell) by scanning log files for known exploit strings. It supports both plaintext and gzipped logs and includes features for obfuscated payload detection.
Classification
Scanner 95%
Target:
Log4j 2.x (versions affected by CVE-2021-44228)
No auth needed
Prerequisites:
Access to log files (e.g., /var/log) · Python 3 environment
gitlab
WRITEUP
by helsecert · poc
https://gitlab.com/helsecert/CVE-2021-44228
This repository provides a detailed technical analysis of CVE-2021-44228 (Log4Shell) and related vulnerabilities, including mitigation strategies, detection methods, and patch recommendations. It includes flowcharts and scripts for identifying vulnerable Log4j instances but does not contain functional exploit code.
Classification
Writeup 100%
Target:
Apache Log4j 2.x (versions prior to 2.17.0)
No auth needed
Prerequisites:
Log4j 2.x with JNDI lookups enabled · ability to inject malicious strings into logs
gitlab
WORKING POC
by christophetd · poc
https://gitlab.com/christophetd/log4shell-vulnerable-app
This repository contains a Spring Boot application intentionally vulnerable to CVE-2021-44228 (Log4Shell). It includes a Dockerfile for deployment and a detailed README with exploitation steps using JNDIExploit to achieve remote code execution.
Classification
Working Poc 100%
Target:
Spring Boot with Log4j 2.14.1
No auth needed
Prerequisites:
Docker · JNDIExploit tool · network access to the vulnerable application
gitlab
WORKING POC
by sebast331-poc · poc
https://gitlab.com/sebast331-poc/cve-2021-44228
This repository provides a Dockerized environment for testing CVE-2021-44228 (Log4Shell) against Apache Solr 8.11.0. It includes a vulnerable Solr instance and instructions to trigger the JNDI lookup vulnerability via a crafted HTTP request.
Classification
Working Poc 90%
Target:
Apache Solr 8.11.0
No auth needed
Prerequisites:
Docker · Docker Compose · Netcat for testing
gitlab
WRITEUP
by trentonknight · poc
https://gitlab.com/trentonknight/log4j-in-docker
This repository provides a detailed tutorial on understanding CVE-2021-44228 (Log4Shell) and its impact on Apache Log4j. It includes step-by-step instructions for setting up Docker containers to demonstrate reverse shell techniques using netcat, but does not contain actual exploit code for the vulnerability.
Classification
Writeup 90%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Docker · GNU netcat · Arch Linux containers
gitlab
WORKING POC
by Kr0ff · poc
https://gitlab.com/Kr0ff/CVE-2021-44228
This repository contains a functional exploit for CVE-2021-44228 (Log4Shell), which leverages JNDI injection to achieve remote code execution. The exploit sets up an LDAP server and an HTTP server to deliver a reverse shell payload to a vulnerable Log4j instance.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 JDK installed on the attacker's system · Python 3 with required libraries (argparse, colored) · Network access to the target system
gitlab
SCANNER
by lifeafter619 · poc
https://gitlab.com/lifeafter619/log4j-scan
This repository contains a scanner for detecting CVE-2021-44228 (Log4j RCE) by fuzzing HTTP headers, POST data, and JSON parameters with DNS callback validation. It supports WAF bypass payloads and includes Docker support for easy deployment.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
DNS callback provider (e.g., interact.sh, dnslog.cn) or custom DNS callback host
gitlab
WORKING POC
by morgan.smith · poc
https://gitlab.com/morgan.smith/log4shell-vulnerable-app
This repository provides a functional Spring Boot application vulnerable to CVE-2021-44228 (Log4Shell) and includes detailed exploitation steps using JNDIExploit to achieve remote code execution.
Classification
Working Poc 100%
Target:
Spring Boot with Log4j 2.14.1
No auth needed
Prerequisites:
Docker · JNDIExploit tool · network access to the vulnerable application
gitlab
WORKING POC
by felipe8398 · poc
https://gitlab.com/felipe8398/ModSec-log4j2
This repository provides a functional PoC for CVE-2021-44228 (Log4Shell) by setting up a vulnerable application and a WAF (ModSecurity) using Docker. It includes steps to exploit the vulnerability via JNDI injection to achieve RCE.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (Log4Shell vulnerability)
No auth needed
Prerequisites:
Docker installed · Java installed · JNDIExploit tool
gitlab
WORKING POC
by mealtego · poc
https://gitlab.com/mealtego/log4shell-vulnerable-app
This repository provides a functional Spring Boot application vulnerable to CVE-2021-44228 (Log4Shell) and includes detailed exploitation steps using JNDIExploit to achieve remote code execution. The vulnerable app logs user-controlled input via Log4j, enabling JNDI injection attacks.
Classification
Working Poc 100%
Target:
Spring Boot with Log4j 2.14.1 (via spring-boot-starter-log4j2 2.6.1)
No auth needed
Prerequisites:
Docker · JNDIExploit tool · network access to target
gitlab
WORKING POC
by ksalman-Cx · poc
https://gitlab.com/ksalman-Cx/CVE-2021-44228-Apache-Log4j-Rce
This repository contains a functional exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Log4j. It includes an Exploit.java payload, an LDAP server setup, and a log4j.java trigger to simulate the attack.
Classification
Working Poc 100%
Target:
Apache Log4j (versions >=2.0-beta9 and <=2.14.1)
No auth needed
Prerequisites:
Java environment · LDAP server (marshalsec) · HTTP server to host the exploit class · Vulnerable Log4j version
gitlab
WORKING POC
by BasedLabs · poc
https://gitlab.com/BasedLabs/log4j-shell-poc-forked
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), including a vulnerable web application and an exploit script that automates the attack via LDAP and RMI. The exploit demonstrates remote code execution by leveraging the Log4j JNDI lookup vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 (jdk1.8.0_20) · Docker (for vulnerable app) · Python 3 (for exploit script) · Netcat (for reverse shell listener)
gitlab
WORKING POC
by timiurchenko · poc
https://gitlab.com/timiurchenko/log4shell-gradle-vulnerable-app
This repository provides a functional Spring Boot application vulnerable to CVE-2021-44228 (Log4Shell) and includes detailed exploitation steps using JNDIExploit to achieve remote code execution (RCE). The vulnerable endpoint logs user-controlled input via Log4j, enabling JNDI injection attacks.
Classification
Working Poc 95%
Target:
Spring Boot with Log4j 2.14.1 (via spring-boot-starter-log4j2 2.6.1)
No auth needed
Prerequisites:
Docker or Java 8+ environment · JNDIExploit tool for LDAP/HTTP payload delivery · Network access to the vulnerable application
gitlab
WORKING POC
by xantho09-cs5439 · poc
https://gitlab.com/xantho09-cs5439/first-log4j
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI lookup injection in Log4j 2. The Main.java file logs user input, which can be manipulated to trigger the vulnerability when paired with a malicious LDAP server.
Classification
Working Poc 90%
Target:
Apache Log4j 2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
A vulnerable Log4j 2 installation · An attacker-controlled LDAP server to serve malicious payloads
gitlab
WORKING POC
by conjuegosdeazar · poc
https://gitlab.com/conjuegosdeazar/log4shell-vulnerable-app
This repository provides a functional Spring Boot application vulnerable to CVE-2021-44228 (Log4Shell) and includes detailed exploitation steps. It demonstrates remote code execution via JNDI injection using a malicious LDAP server.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1 (via Spring Boot 2.6.1)
No auth needed
Prerequisites:
Docker · JNDIExploit tool · network access to the vulnerable application
gitlab
WRITEUP
by sastraadiwiguna-purpleeliteteaming · poc
https://gitlab.com/sastraadiwiguna-purpleeliteteaming/log4shell-operational-blueprint-cve-2021-44228
This repository provides a detailed technical analysis and operational blueprint for CVE-2021-44228 (Log4Shell), including exploitation mechanics, defensive strategies, and forensic insights. It does not contain functional exploit code but offers in-depth research and methodology.
Classification
Writeup 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · JNDI/LDAP server for payload delivery
nomisec
STUB
by agylabs · poc
https://github.com/agylabs/log4shell-remediation
This repository contains GitHub Actions workflows for a remediation tool related to CVE-2021-44228 (Log4Shell) but lacks actual exploit code or technical details. The workflows are designed for automation and triage rather than demonstrating the vulnerability.
Target:
Apache Log4j 2.x
No auth needed
nomisec
WORKING POC
by JoseMariaMicoli · local
https://github.com/JoseMariaMicoli/Log4Shell-PoC
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating JNDI injection via LDAP and remote code execution through a reverse shell. It includes a vulnerable Log4j application, an LDAP server for redirection, and an exploit payload.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
Docker environment · Java 8 · Network access to LDAP and HTTP servers
nomisec
WORKING POC
by cuijiung · poc
https://github.com/cuijiung/log4j-CVE-2021-44228
This is a minimal proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating the JNDI injection vulnerability in Log4j 2.x. It triggers an LDAP lookup to a local server, which can lead to remote code execution if an attacker controls the LDAP server.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version in the classpath · Network access to an attacker-controlled LDAP server
nomisec
WORKING POC
by dbwlsdnr95 · poc
https://github.com/dbwlsdnr95/CVE-2021-44228
This repository contains a functional Proof of Concept (PoC) for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Log4j 2. The PoC includes a Spring Boot application with a vulnerable endpoint that logs user-controlled input, enabling exploitation via LDAP/RMI.
Classification
Working Poc 100%
Target:
Apache Log4j 2 (versions up to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version (e.g., 2.14.1) · JNDI trust settings enabled (e.g., `com.sun.jndi.ldap.object.trustURLCodebase=true`) · Network access to an LDAP/RMI server controlled by the attacker
nomisec
WORKING POC
by yuuki1967 · remote
https://github.com/yuuki1967/CVE-2021-44228-Apache-Log4j-Rce
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Log4j. The exploit triggers a calculator app on the target system by leveraging LDAP and HTTP servers to deliver a malicious payload.
Classification
Working Poc 95%
Target:
Apache Log4j (versions >=2.0-beta9 and <=2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP and HTTP servers for payload delivery
nomisec
WRITEUP
by IAmNewbieZ · poc
https://github.com/IAmNewbieZ/CVE-2021-44228
This repository provides a writeup and Docker image for testing CVE-2021-44228 (Log4Shell), a critical RCE vulnerability in Log4j 2.14. It mentions vulnerable endpoints and headers but does not include exploit code.
Classification
Writeup 80%
Target:
Apache Log4j 2.14
No auth needed
Prerequisites:
Vulnerable Log4j version (2.14) · Network access to target
nomisec
WORKING POC
by Loliverte · poc
https://github.com/Loliverte/Log4j-Vulnerability
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating how an attacker can exploit Log4j's JNDI lookup feature to trigger remote code execution via a crafted HTTP request.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
A vulnerable Log4j version (2.14.1 or earlier) · Network access to the target server · A listener service (e.g., DNSLog) to confirm exploitation
nomisec
WORKING POC
by DrHaitham · poc
https://github.com/DrHaitham/Log4Shell-CVE-2021-44228
This repository provides a comprehensive guide and lab setup for exploiting CVE-2021-44228 (Log4Shell), including a Dockerized vulnerable Log4j2 application and a PoC exploit using JNDI injection to achieve remote code execution.
Classification
Working Poc 100%
Target:
Apache Log4j 2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · JDK 1.8.0_202 · Python 3 · Netcat · Burp Suite
nomisec
WRITEUP
by PCMKUIT · poc
https://github.com/PCMKUIT/CVE-2021-44228---Log4Shell-Analysis
This repository provides a comprehensive technical analysis of the Log4Shell vulnerability (CVE-2021-44228), including vulnerability mechanism, attack flow, and mitigation strategies. It does not contain exploit code but serves as an educational resource.
Classification
Writeup 100%
Target:
Apache Log4j 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target
nomisec
WORKING POC
by Mintimate · remote
https://github.com/Mintimate/log4j2-bugmaker
This repository is a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating JNDI injection via User-Agent headers and query parameters in a Spring Boot application using Log4j2 2.14.1.
Classification
Working Poc 100%
Target:
Apache Log4j2 2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j2 version (2.14.1 or earlier) · Network access to the target application · LDAP/RMI server for payload delivery
nomisec
SCANNER
by Contrast-Security-OSS · poc
https://github.com/Contrast-Security-OSS/CVE-2021-44228
This repository contains PowerShell and Python scripts designed to scan and identify Java applications affected by CVE-2021-44228 (Log4j RCE vulnerability) within Contrast TeamServer. The scripts query the TeamServer API to export library details and generate CSV reports for affected applications.
Classification
Scanner 90%
Target:
Contrast TeamServer (with Java applications using Log4j)
Auth required
Prerequisites:
Contrast TeamServer API access · Valid API key and authentication token · View access to applications
nomisec
WORKING POC
by d4ngkh04w · poc
https://github.com/d4ngkh04w/CVE-2021-44228-Apache-Log4j2
This repository contains a functional exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Log4j2. The exploit includes a Java payload (Exploit.java) that establishes a reverse shell, along with a Dockerfile for setting up a vulnerable environment and detailed instructions for execution.
Classification
Working Poc 95%
Target:
Apache Log4j2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
JDK 17 · Docker · marshalsec JNDI server · LDAP server · HTTP server for payload hosting
nomisec
WORKING POC
by Sorrence · infoleak
https://github.com/Sorrence/CVE-2021-44228
This is a functional PoC for CVE-2021-44228 (Log4Shell), which exploits the JNDI LDAP injection vulnerability in Apache Log4j2. It sends a crafted HTTP request with a malicious header to trigger a callback to a listener, confirming vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to the target · Target application using vulnerable Log4j2 version · Listener setup to receive callback
nomisec
WORKING POC
by arabindadora · remote
https://github.com/arabindadora/log4shell
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating unauthenticated remote code execution via JNDI injection in Apache Log4j. It includes an attacker-controlled LDAP server and a malicious Java payload that spawns a reverse shell.
Classification
Working Poc 100%
Target:
Apache Log4j <= 2.14.1
No auth needed
Prerequisites:
Docker · netcat · vulnerable Log4j version in target application
nomisec
WRITEUP
by KamalideenAK · poc
https://github.com/KamalideenAK/Microsoft-Defender-for-Endpoint-Deployment-on-Windows-10-11-device
This repository is a detailed guide for deploying Microsoft Defender for Endpoint on Windows 10/11 devices, including onboarding via local script and configuring detection for CVE-2021-44228 (Log4j2). It provides step-by-step instructions for setup, validation, and incident response workflows.
Classification
Writeup 100%
Target:
Microsoft Defender for Endpoint
Auth required
Prerequisites:
Windows 10/11 Pro/Enterprise · Microsoft 365 E3/E5 or Microsoft Defender for Endpoint Plan 1/2 license · Administrative privileges on target devices · Global Administrator or Security Administrator in Microsoft 365
nomisec
WORKING POC
by moften · remote
https://github.com/moften/Log4Shell
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), including a Java payload class and a Python script to trigger the vulnerability via JNDI injection. The exploit supports both detection and exploitation modes.
Classification
Working Poc 95%
Target:
Apache Log4j ≤ 2.14.1
No auth needed
Prerequisites:
Python 3.x · Java 8+ · marshalsec for LDAP server · Vulnerable Log4j instance
nomisec
WRITEUP
by Alan-coder-eng · poc
https://github.com/Alan-coder-eng/log4j-cve-2021-44228-
This repository provides a detailed setup guide for reproducing the Log4Shell vulnerability (CVE-2021-44228) using Vulhub and Apache Solr. It includes environment configuration steps but does not contain actual exploit code.
Classification
Writeup 90%
Target:
Apache Log4j 2.x (via Apache Solr)
No auth needed
Prerequisites:
Ubuntu 20.04 · Java 8 · Docker · Vulhub
nomisec
WORKING POC
by fabioeletto · remote
https://github.com/fabioeletto/hka-seminar-log4shell
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j. It includes a vulnerable Spring Boot app, an LDAP server, and a payload server to deliver malicious Java classes.
Classification
Working Poc 95%
Target:
Apache Log4j 2.0 to 2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP and HTTP servers under attacker control
nomisec
WORKING POC
by axisops · poc
https://github.com/axisops/CVE-2021-44228
This repository provides a Python-based mitigation script for CVE-2021-44228 (Log4Shell) that removes the vulnerable JndiLookup class from Log4j JAR files. It includes an Ansible role for automated deployment and manual execution options.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (affected versions)
No auth needed
Prerequisites:
Python 3.6+ · zip and zipinfo installed · PyYAML installed · access to target system
nomisec
WORKING POC
by x1ongsec · poc
https://github.com/x1ongsec/CVE-2021-44228-Log4j-JNDI
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating JNDI injection via Log4j. It includes a Spring Boot application with a vulnerable endpoint that logs user-controlled input, enabling remote code execution.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 (preferably JDK 8u92) · Vulnerable Log4j version · Network access to target
nomisec
WORKING POC
by SerpilRivas · remote
https://github.com/SerpilRivas/log4shell-homework9
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), including a vulnerable Java Spring Boot application and a simulated malicious LDAP server. It demonstrates JNDI injection via Log4j and includes mitigation steps.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j version (2.14.1 or earlier) · Network access to target application · LDAP server to serve malicious payload
nomisec
WORKING POC
by Fauzan-Aldi · poc
https://github.com/Fauzan-Aldi/Log4j-_Vulnerability
This repository contains a Java-based web application demonstrating the Log4j vulnerability (CVE-2021-44228). The `loginservlet.java` file logs user input directly using Log4j, making it vulnerable to JNDI injection attacks.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
A vulnerable Log4j version · Network access to the target application · A malicious LDAP/JNDI server to deliver payloads
nomisec
WORKING POC
by timothyjxhn · poc
https://github.com/timothyjxhn/DeliberatelyVulnerableWebApp
This repository contains a deliberately vulnerable Struts 2 web application designed to demonstrate CVE-2021-44228 (Log4Shell). The application includes vulnerable components that allow for remote code execution via Log4j logging.
Classification
Working Poc 90%
Target:
Apache Struts 2 (with vulnerable Log4j dependency)
No auth needed
Prerequisites:
Network access to the vulnerable application · Log4j 2.x vulnerable version
nomisec
WORKING POC
by khaidtraivch · remote
https://github.com/khaidtraivch/CVE-2021-44228-Log4Shell-
This repository provides a functional proof-of-concept for CVE-2021-44228 (Log4Shell), including scripts to set up a malicious LDAP server and send JNDI payloads to exploit vulnerable Log4j instances. It demonstrates remote code execution via LDAP and HTTP callbacks.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java runtime · Marshalsec tool · Python3 for HTTP server · Network access to target
nomisec
WRITEUP
by tpdlshdmlrkfmcla · poc
https://github.com/tpdlshdmlrkfmcla/Log4shell
This is a detailed analysis report on CVE-2021-44228 (Log4Shell), covering its principles, impact, exploitation examples, detection methods, and mitigation strategies. It includes no functional exploit code but provides comprehensive documentation and references.
Classification
Writeup 100%
Target:
Apache Log4j 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
Target system using vulnerable Log4j version · Ability to inject malicious JNDI lookup strings into logs
nomisec
WRITEUP
by yadavmukesh · poc
https://github.com/yadavmukesh/Log4Shell-vulnerability-CVE-2021-44228-
This repository provides a machine learning-based approach to detect Log4Shell (CVE-2021-44228) threats using feature extraction and a Random Forest classifier. It includes scripts for preprocessing, feature extraction, model training, and evaluation.
Classification
Writeup 100%
Target:
Apache Log4j 2
No auth needed
Prerequisites:
Dataset of logs containing Log4Shell exploit patterns
nomisec
WORKING POC
by ZacharyZcR · local
https://github.com/ZacharyZcR/CVE-2021-44228
This PoC demonstrates the Log4j JNDI injection vulnerability (CVE-2021-44228) by logging a crafted string that triggers a DNS lookup to a malicious domain. It is a minimal, functional example of the exploit.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · DNS or LDAP server controlled by attacker for payload delivery
nomisec
WORKING POC
by Super-Binary · poc
https://github.com/Super-Binary/cve-2021-44228
This repository contains a PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection in Log4j. The exploit triggers a malicious LDAP callback to execute arbitrary code, including a prank message and desktop shortcut creation.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP/RMI server hosting malicious payload
nomisec
WORKING POC
by NikitaPark · poc
https://github.com/NikitaPark/Log4Shell-PoC-Application
This repository contains a Spring Boot application designed to demonstrate the Log4Shell vulnerability (CVE-2021-44228). It includes a vulnerable endpoint that logs user-controlled input from the X-Api-Key header, enabling remote code execution via JNDI injection.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target application · LDAP/JNDI server for payload delivery
nomisec
WRITEUP
by safeer-accuknox · poc
https://github.com/safeer-accuknox/log4j-shell-poc
This repository contains README files referencing external PoC repositories for CVE-2021-44228 (Log4Shell). No actual exploit code is present, only documentation linking to other projects.
Classification
Writeup 90%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to vulnerable Log4j instance · JNDI lookup capability
nomisec
STUB
by OtisSymbos · poc
https://github.com/OtisSymbos/CVE-2021-44228-Log4Shell-
The repository contains only a README.md with minimal content, lacking any functional exploit code or technical details for CVE-2021-44228 (Log4Shell).
Target:
Apache Log4j 2.x
No auth needed
nomisec
WORKING POC
by asd58584388 · poc
https://github.com/asd58584388/CVE-2021-44228
This repository contains a working PoC for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection. It includes a Java exploit class and marshalsec tools for generating payloads.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java environment · LDAP/HTTP server setup · Vulnerable Log4j version
nomisec
WORKING POC
by ShlomiRex · remote
https://github.com/ShlomiRex/log4shell_lab
This repository provides a Docker-based lab environment to demonstrate the Log4Shell vulnerability (CVE-2021-44228). It includes a simple setup to exploit the vulnerability via a crafted HTTP header, triggering an LDAP JNDI lookup.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker and Docker Compose installed · Network access to the target application
nomisec
WORKING POC
by YangHyperData · remote
https://github.com/YangHyperData/LOGJ4_PocShell_CVE-2021-44228
This repository contains a functional Proof-of-Concept (PoC) for CVE-2021-44228 (Log4Shell), including a Python script to generate a malicious LDAP payload and a vulnerable Java web application for testing. The exploit leverages JNDI injection to achieve remote code execution (RCE) via Log4j.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java JDK 1.8.0_20 · Python 3.x · Netcat for reverse shell · Vulnerable Log4j version in target application
nomisec
WORKING POC
by LucasPDiniz · remote
https://github.com/LucasPDiniz/CVE-2021-44228
This repository provides a detailed proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Solr 8.11.0. It includes steps for reconnaissance, exploitation using LDAP callbacks, and payload delivery to achieve a reverse shell.
Classification
Working Poc 95%
Target:
Apache Solr 8.11.0 with Log4j 2.x
No auth needed
Prerequisites:
Vulnerable Log4j version (2.0 <= Log4j <= 2.14.1) · Network access to target · LDAP server for callback · Python HTTP server for payload hosting
nomisec
WORKING POC
by KtokKawu · infoleak
https://github.com/KtokKawu/l4s-vulnapp
This repository provides a vulnerable Java web application (l4s-vulnapp) with Log4j 2.14.1 to demonstrate CVE-2021-44228 (Log4Shell). It includes a PowerShell script (l4s-ls.ps1) to monitor RMI/LDAP outbound traffic for verification.
Classification
Working Poc 100%
Target:
Apache Log4j Core 2.14.1
No auth needed
Prerequisites:
Java 17 · Gradle 8.6 · Apache Tomcat 10.1.15 · Log4j 2.14.1 · PowerShell for monitoring script
nomisec
WORKING POC
by eurogig · poc
https://github.com/eurogig/jankybank
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via a vulnerable login servlet that logs user input using Log4j. The code is derived from existing Log4Shell PoCs and is designed for CTF use.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version in the target application · Network access to the target application · LDAP/JNDI server to deliver payload (for full RCE)
nomisec
WORKING POC
by digital-dev · poc
https://github.com/digital-dev/Log4j-CVE-2021-44228-Remediation
This repository contains a PowerShell script designed to remediate the Log4j CVE-2021-44228 vulnerability by removing the JNDI Lookup class from affected JAR files across multiple computers. The script uses 7-Zip to scan and modify JAR files remotely.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions affected by CVE-2021-44228)
Auth required
Prerequisites:
Administrative credentials for target machines · Network access to target machines · 7-Zip available on a network share or target machines
nomisec
WORKING POC
by scabench · poc
https://github.com/scabench/l4j-fp1
This repository demonstrates a sanitized version of the Log4Shell vulnerability (CVE-2021-44228) in a Java web application. It uses an Amazon-provided agent to disable the vulnerable JndiLookup class, preventing exploitation while still showcasing the vulnerability context.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
Java environment with JVM agent self-attachment enabled · Log4j 2.14.1 dependency · LDAP server for payload delivery
nomisec
WORKING POC
by mklinkj · poc
https://github.com/mklinkj/log4j2-test
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via LDAP JNDI injection in a Spring Boot environment with Log4j 2.14.1. It includes a target server and an LDAP server to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j version (2.14.1 or lower) · Network access to the target server · LDAP server setup to serve malicious payload
nomisec
WORKING POC
by scabench · poc
https://github.com/scabench/l4j-tp1
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection in Log4j 2.14.1. It includes a vulnerable web service, a test case, and scripts to verify the exploit using an LDAP server.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
Java runtime · Maven · LDAP server (provided in the PoC) · Network access to the target
nomisec
WORKING POC
by felixslama · remote
https://github.com/felixslama/log4shell-minecraft-demo
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via LDAP/JNDI injection in a Minecraft 1.8.8 server. It includes an attacker script that sets up an LDAP server and HTTP server to deliver a reverse shell payload.
Classification
Working Poc 100%
Target:
Apache Log4j 2 (via Minecraft 1.8.8 server)
No auth needed
Prerequisites:
Vulnerable Log4j version (e.g., 2.0 <= Log4j < 2.15.0) · Network access to target · Java JDK 1.8.0_20 for payload compilation · Docker for victim setup
nomisec
WORKING POC
by roshanshibu · poc
https://github.com/roshanshibu/Odysseus
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection. It includes a vulnerable web server and a malicious LDAP server to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 · Network access to the target · Target application using vulnerable Log4j version
nomisec
WORKING POC
by racoon-rac · poc
https://github.com/racoon-rac/CVE-2021-44228
This repository provides a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j. It includes setup instructions, a vulnerable Java application, and an exploit payload to trigger arbitrary command execution.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
JDK 8u20 or earlier · Vulnerable Log4j version (2.14.1) · LDAP server (marshalsec) · HTTP server to host exploit class
nomisec
WORKING POC
by s-retlaw · poc
https://github.com/s-retlaw/l4s_poc
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), including an LDAP server and HTTP server to exploit vulnerable Log4j instances. It supports custom command execution and Meterpreter payload delivery for both Windows and Linux systems.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 · Python3 · Maven · Metasploit (for Meterpreter payloads) · Network access to target
nomisec
WORKING POC
by Muhammad-Ali007 · poc
https://github.com/Muhammad-Ali007/Log4j_CVE-2021-44228
This repository contains a proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in vulnerable Log4j versions. The exploit uses a crafted payload to trigger a reverse shell connection to an attacker-controlled server.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions before 2.16.0)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · Attacker-controlled LDAP/HTTP server
nomisec
WORKING POC
by funcid · dos
https://github.com/funcid/log4j-exploit-fork-bomb
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via LDAP JNDI injection to trigger a fork bomb payload. The exploit includes an LDAP server, payload delivery mechanism, and a victim application to simulate the attack.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP server setup · JNDI injection vector
nomisec
WORKING POC
by Sumitpathania03 · remote
https://github.com/Sumitpathania03/LOG4J-CVE-2021-44228
This repository contains a proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection. The exploit uses an LDAP server to deliver a malicious payload, which executes a reverse shell command.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · LDAP server for payload delivery
nomisec
WORKING POC
by 53buahapel · poc
https://github.com/53buahapel/log4shell-vulnweb
This repository contains a vulnerable Java web application designed to demonstrate CVE-2021-44228 (Log4Shell). The `loginservlet.java` file logs user input via Log4j, making it susceptible to JNDI injection attacks.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version in the classpath · Network access to the target application · LDAP/RMI server for payload delivery
nomisec
STUB
by rejupillai · poc
https://github.com/rejupillai/log4j2-hack-springboot
The repository contains only a README.md file with minimal content, lacking any exploit code or technical details for CVE-2021-44228. It appears to be a placeholder or incomplete project.
Target:
Apache Log4j 2
No auth needed
nomisec
WORKING POC
by aajuvonen · poc
https://github.com/aajuvonen/log4stdin
This repository contains a Java application intentionally vulnerable to CVE-2021-44228 (log4shell). It reads input from stdin and logs it using a vulnerable log4j instance, allowing for JNDI injection attacks.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
Java runtime environment · Network access to a malicious LDAP/RMI server
nomisec
WORKING POC
by bhprin · poc
https://github.com/bhprin/log4j-vul
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating JNDI injection via Log4j2 lookups. It includes examples of both local environment variable injection and remote LDAP-based exploitation.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 through 2.15.0)
No auth needed
Prerequisites:
Vulnerable Log4j2 version · Network access to target · LDAP server for remote exploitation
nomisec
WORKING POC
by bsigouin · poc
https://github.com/bsigouin/log4shell-vulnerable-app
This repository provides a Spring Boot application vulnerable to CVE-2021-44228 (Log4Shell) for testing purposes. It includes a Dockerized environment and step-by-step exploitation instructions using JNDIExploit to achieve remote code execution.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1 (via Spring Boot 2.6.1)
No auth needed
Prerequisites:
Docker · Java 8 · Network access to the vulnerable application · JNDIExploit tool
nomisec
WORKING POC
by s-retlaw · poc
https://github.com/s-retlaw/l4srs
This repository contains a Rust-based exploit for CVE-2021-44228 (Log4Shell), featuring dynamic class generation, LDAP/HTTP server functionality, and a mini meterpreter for post-exploitation. It supports multi-port operations and in-memory class caching.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to vulnerable Log4j instance · Outbound LDAP/HTTP connectivity from target
nomisec
WORKING POC
by TotallyNotAHaxxer · poc
https://github.com/TotallyNotAHaxxer/f-for-java
This repository contains a Go-based exploit for CVE-2021-44228 (Log4Shell), leveraging LDAP and HTTP servers to deliver a malicious payload. It includes a Java-based LDAP server (marshalsec) and a Go script to automate the exploitation process.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · Ability to host an LDAP/HTTP server
nomisec
STUB
by MeterianHQ · poc
https://github.com/MeterianHQ/log4j-vuln-coverage-check
This repository contains only a README file with no actual exploit code or PoC. It is a placeholder for checking coverage of CVE-2021-44228 (Log4j).
Target:
Apache Log4j 2.x
No auth needed
nomisec
WORKING POC
by ocastel · remote
https://github.com/ocastel/log4j-shell-poc
This repository contains a functional Proof-of-Concept (PoC) for CVE-2021-44228 (Log4Shell), including a Python script that automates the exploitation process by setting up an LDAP server and HTTP server to deliver a reverse shell payload. It also includes a vulnerable Java web application for testing purposes.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java JDK 1.8.0_20 · Python 3.x · Netcat for reverse shell listener · Vulnerable Log4j version in target application
nomisec
WORKING POC
by mazhar-hassan · poc
https://github.com/mazhar-hassan/log4j-vulnerability
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in a Spring Boot application using Log4j. The exploit leverages LDAP callbacks to trigger malicious payloads when logging user-controlled input.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP/JNDI server for payload delivery
nomisec
WRITEUP
by tharindudh · poc
https://github.com/tharindudh/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228
This repository contains a README file describing the Log4j vulnerability (CVE-2021-44228) in the Ghidra tool, but no actual exploit code or proof-of-concept is provided. It appears to be a placeholder or informational writeup.
Classification
Writeup 90%
Target:
Ghidra (version not specified)
No auth needed
Prerequisites:
Log4j vulnerability presence in Ghidra
nomisec
WRITEUP
by vino-theva · poc
https://github.com/vino-theva/CVE-2021-44228
This repository contains a README file describing the Log4j vulnerability (CVE-2021-44228) but does not include any exploit code or proof-of-concept. It references a PDF for further details.
Classification
Writeup 90%
Target:
Apache Log4j (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target
nomisec
SCANNER
by alexpena5635 · poc
https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-
This repository contains a PowerShell script (`checkjndi.ps1`) designed to scan filesystems for `.jar`, `.war`, `.ear`, and `.zip` files containing the `JndiLookup.class` file, which is indicative of potential vulnerability to CVE-2021-44228 (Log4Shell). The script is a modified version of the original CERTCC scanner and includes functionality to log warnings and errors.
Classification
Scanner 100%
Target:
Systems with Log4j versions vulnerable to CVE-2021-44228
No auth needed
Prerequisites:
Access to the filesystem to scan
nomisec
SCANNER
by intel-xeon · poc
https://github.com/intel-xeon/CVE-2021-44228---detection-with-PowerShell
This PowerShell script scans files for indicators of CVE-2021-44228 (Log4Shell) by detecting JNDI injection patterns in various file types. It outputs results to a CSV file for further analysis.
Classification
Scanner 100%
Target:
Files containing Log4Shell indicators
No auth needed
Prerequisites:
Access to the target directory · PowerShell execution privileges
nomisec
WORKING POC
by ra890927 · poc
https://github.com/ra890927/Log4Shell-CVE-2021-44228-Demo
This repository provides a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j. It includes a Python script to automate the exploitation process and detailed lab tasks for educational purposes.
Classification
Working Poc 95%
Target:
Apache Log4j (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target server · LDAP server for JNDI exploitation
nomisec
WORKING POC
by Willian-2-0-0-1 · poc
https://github.com/Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228
This repository provides a Python-based PoC for CVE-2021-44228 (Log4Shell), which exploits the JNDI injection vulnerability in Log4j to achieve remote code execution via LDAP. It includes a pre-packaged Java exploit and sets up a fake LDAP server to deliver payloads.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Python 3.x · Network access to target · LDAP port (1389) accessible
nomisec
WORKING POC
by Phineas09 · poc
https://github.com/Phineas09/CVE-2021-44228
This repository contains a functional Proof-of-Concept for CVE-2021-44228 (Log4Shell), including an exploit generator that creates a reverse shell payload, an LDAP server for JNDI lookups, and a vulnerable Java web application for testing. The exploit leverages Log4j's JNDI lookup feature to execute arbitrary code.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 · Network access to target · Target application using vulnerable Log4j version
nomisec
WORKING POC
by romanutti · poc
https://github.com/romanutti/log4shell-vulnerable-app
This repository provides a vulnerable Spring Boot application for CVE-2021-44228 (Log4Shell) and includes a step-by-step exploit playbook using JNDIExploit to achieve remote code execution (RCE). The PoC demonstrates the vulnerability by executing a command to create a file on the target system.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1 (via Spring Boot)
No auth needed
Prerequisites:
Docker · JNDIExploit tool · Network access to the vulnerable application
nomisec
SCANNER
by mebibite · poc
https://github.com/mebibite/log4jhound
This repository contains a Bash script designed to detect Log4j occurrences in projects and systems by searching for 'log4j' strings in files and analyzing JAR manifests. It does not exploit CVE-2021-44228 but helps identify potentially vulnerable components.
Classification
Scanner 100%
Target:
Systems and projects using Log4j
No auth needed
Prerequisites:
Access to the target directory or system
nomisec
SCANNER
by DANSI · poc
https://github.com/DANSI/PowerShell-Log4J-Scanner
This repository contains a PowerShell script designed to scan for Log4j JAR files, identify vulnerable versions (CVE-2021-44228, CVE-2021-45046), and optionally apply a workaround by removing the JndiLookup class. It uses file hashes to detect versions and requires 7-Zip for patching.
Classification
Scanner 95%
Target:
Apache Log4j (versions affected by CVE-2021-44228, CVE-2021-45046)
No auth needed
Prerequisites:
PowerShell execution policy allowing script execution · 7-Zip installed for patching functionality
nomisec
WORKING POC
by felipe8398 · remote
https://github.com/felipe8398/ModSec-log4j2
This repository provides a proof-of-concept for CVE-2021-44228 (Log4Shell) using Docker to deploy a vulnerable application and a WAF (ModSecurity) for testing. It includes steps to exploit the vulnerability via JNDI injection to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (Log4Shell vulnerability)
No auth needed
Prerequisites:
Docker installed · Java installed · JNDIExploit tool · Network access to the target
nomisec
WORKING POC
by LutziGoz · poc
https://github.com/LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228
This repository provides a step-by-step guide for exploiting CVE-2021-44228 (Log4Shell), a critical RCE vulnerability in Log4j. It includes instructions for setting up a vulnerable Docker environment, using JNDIExploit for LDAP callback exploitation, and triggering the payload via a crafted HTTP header.
Classification
Working Poc 90%
Target:
Apache Log4j 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
Docker · Java · JNDIExploit tool · Network access to target
nomisec
SCANNER
by tobiasoed · poc
https://github.com/tobiasoed/log4j-CVE-2021-44228
This repository contains a script to fetch and track IPs associated with CVE-2021-44228 (Log4j RCE) from a public gist. It automates updating a local file and committing changes to a Git repository.
Classification
Scanner 90%
Target:
N/A (script for tracking IPs related to Log4j vulnerability)
No auth needed
Prerequisites:
Access to the internet to fetch the gist · Git repository configured for updates
nomisec
WORKING POC
by LemonCraftRu · poc
https://github.com/LemonCraftRu/JndiRemover
This repository contains a Minecraft mod designed to mitigate CVE-2021-44228 (Log4Shell) by removing JNDI lookups from Log4j and filtering malicious strings in network traffic. It uses Mixin-based bytecode manipulation to intercept and sanitize strings containing JNDI patterns.
Classification
Working Poc 95%
Target:
Minecraft (Forge 1.7.10, 1.12.2) with vulnerable Log4j versions
No auth needed
Prerequisites:
Vulnerable Log4j version in Minecraft server/client · Ability to install Minecraft mods
nomisec
WORKING POC
by otaviokr · poc
https://github.com/otaviokr/log4j-2021-vulnerability-study
This repository demonstrates the Log4j vulnerability (CVE-2021-44228) by setting up an LDAP server and showing how JNDI lookups can be exploited. It includes harmless examples and a commented-out malicious payload for educational purposes.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · Ability to set up an LDAP server
nomisec
WRITEUP
by dbgee · poc
https://github.com/dbgee/CVE-2021-44228
This repository contains a README referencing CVE-2021-44228 (Log4Shell) with links to a separate GitHub repository for vulnerability reproduction. No exploit code is present in the provided files.
Classification
Writeup 90%
Target:
Apache Log4j 2 < 2.15.0-rc2
No auth needed
Prerequisites:
Network access to a vulnerable Log4j 2 instance · Ability to send crafted JNDI strings
nomisec
WRITEUP
by guardicode · poc
https://github.com/guardicode/CVE-2021-44228_IoCs
This repository contains a README file listing IoCs (Indicators of Compromise) related to CVE-2021-44228 (Log4Shell). It does not include exploit code but provides references for detection and analysis.
Classification
Writeup 100%
Target:
Apache Log4j 2.x
No auth needed
nomisec
SCANNER
by Gyrfalc0n · poc
https://github.com/Gyrfalc0n/scanlist-log4j
This repository contains a bash script that automates the scanning of multiple URLs for the Log4j vulnerability (CVE-2021-44228) using the Fullhunt log4j-scan tool. It includes scripts for checking domain availability and parallel scanning of URLs, with results logged to a file.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
List of target URLs · Python 3 with dependencies from Fullhunt log4j-scan
nomisec
WORKING POC
by Grupo-Kapa-7 · poc
https://github.com/Grupo-Kapa-7/CVE-2021-44228-Log4j-PoC-RCE
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection in Apache Log4j. It includes a custom LDAP server setup and a payload class to trigger remote code execution.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP server setup
nomisec
WORKING POC
by datadavev · poc
https://github.com/datadavev/test-44228
This repository contains a working proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating the JNDI injection vulnerability in Log4j 2.x. It includes a Java application that triggers the vulnerability by logging a malicious string, causing an outbound LDAP connection attempt.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
A vulnerable version of Log4j 2.x · Network access to the target application · Ability to send crafted input to be logged
nomisec
WORKING POC
by PoneyClairDeLune · poc
https://github.com/PoneyClairDeLune/LogJackFix
This repository provides a Spigot plugin to mitigate CVE-2021-44228 (Log4j RCE) by sanitizing player chat messages containing '${' patterns. It replaces such patterns to prevent Log4j lookup exploitation in Minecraft servers.
Classification
Working Poc 90%
Target:
Minecraft servers using Spigot with vulnerable Log4j versions (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version in use by the Minecraft server · Spigot plugin environment
nomisec
WORKING POC
by ToxicEnvelope · poc
https://github.com/ToxicEnvelope/XSYS-Log4J2Shell-Ex
This repository contains a Python-based PoC for CVE-2021-44228 (Log4Shell), demonstrating JNDI-based information leakage via LDAP callbacks. It includes a custom LDAP server to exfiltrate environment variables or arbitrary data from vulnerable Log4j instances.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to vulnerable Log4j application · Outbound LDAP/JNDI access from target
nomisec
SCANNER
by LinkMJB · poc
https://github.com/LinkMJB/log4shell_scanner
This repository contains a bash script that scans a given subnet for the Log4Shell (CVE-2021-44228) vulnerability by sending crafted HTTP requests with a JNDI payload to common ports. It leverages the Huntress LDAP endpoint for detection and can generate a report of vulnerable hosts.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to the target subnet · Huntress LDAP endpoint or a self-hosted alternative · nmap, curl, and wget installed on the scanning system
nomisec
WORKING POC
by Ravid-CheckMarx · poc
https://github.com/Ravid-CheckMarx/CVE-2021-44228-Apache-Log4j-Rce-main
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection in Apache Log4j. It includes an exploit payload (Exploit.java) that triggers a calculator app, an LDAP server setup, and a test case (log4j.java) to simulate the attack.
Classification
Working Poc 95%
Target:
Apache Log4j (versions >=2.0-beta9 and <=2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP server to host malicious payload · Java runtime environment
nomisec
WRITEUP
by c3-h2 · poc
https://github.com/c3-h2/Log4j_Attacker_IPList
This repository provides a list of attacker IPs associated with CVE-2021-44228 (Log4j RCE) in an Excel file. It does not contain exploit code but serves as a reference for tracking malicious activity.
Classification
Writeup 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to the provided Excel file for IP analysis
nomisec
WORKING POC
by kossatzd · poc
https://github.com/kossatzd/log4j-CVE-2021-44228-test
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating both LDAP and RMI attack vectors. The exploit triggers a harmless calculator launch via a malicious JNDI lookup, showcasing the vulnerability in a controlled environment.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 8 · Maven · Spring Boot · Network access to the vulnerable server
nomisec
WORKING POC
by grimch · poc
https://github.com/grimch/log4j-CVE-2021-44228-workaround
This repository provides a workaround for CVE-2021-44228 (Log4Shell) by replacing the JndiLookup class with an empty implementation to disable JNDI lookups. It includes a proof-of-concept to demonstrate the workaround's effectiveness in both command-line and servlet environments.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions affected by CVE-2021-44228)
No auth needed
Prerequisites:
Java environment with vulnerable Log4j 2.x · Ability to modify JVM startup parameters
nomisec
WORKING POC
by axelcurmi · poc
https://github.com/axelcurmi/log4shell-docker-lab
This repository provides a Docker-based lab for demonstrating CVE-2021-44228 (Log4Shell), including a vulnerable Spring Boot application, an HTTP server hosting malicious .class files, and an LDAP referral server. The PoC demonstrates remote code execution via JNDI injection in Log4j.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions < 2.17.0)
No auth needed
Prerequisites:
Docker environment · Java application with vulnerable Log4j version · Network access to LDAP and HTTP servers
nomisec
SCANNER
by Toolsec · poc
https://github.com/Toolsec/log4j-scan
This repository contains a Python-based scanner for detecting CVE-2021-44228 (Log4j RCE) by sending crafted payloads via HTTP headers and checking for DNS callbacks using dnslog.cn. It employs 8 payloads and 18 headers for comprehensive testing.
Classification
Scanner 95%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Network access to target · DNS resolution for dnslog.cn
nomisec
WORKING POC
by wajda · poc
https://github.com/wajda/log4shell-test-exploit
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j2. It includes a victim application, a malicious LDAP server setup, and a Trojan payload that creates a marker file and logs a message upon successful exploitation.
Classification
Working Poc 100%
Target:
Apache Log4j2 versions 2.0-beta9 through 2.14.1
No auth needed
Prerequisites:
Victim application with vulnerable Log4j2 version · JVM option `-Dcom.sun.jndi.ldap.object.trustURLCodebase=true` enabled · Network access to the victim's LDAP port (1389 by default)
nomisec
WORKING POC
by sysadmin0815 · poc
https://github.com/sysadmin0815/Fix-Log4j-PowershellScript
This PowerShell script is designed to mitigate CVE-2021-44228 (Log4j JNDI vulnerability) by searching for and removing the JNDI class from log4j JAR files on a system. It uses 7-Zip for archive manipulation and includes options for backup, validation, and process termination.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x
Auth required
Prerequisites:
Administrator privileges · 7-Zip binary
nomisec
WORKING POC
by rodfer0x80 · poc
https://github.com/rodfer0x80/log4j2-prosecutor
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via LDAP and HTTP servers. It includes Java payloads, server scripts, and a client for testing the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java environment with vulnerable Log4j version · Network access to target · LDAP and HTTP servers for payload delivery
nomisec
WORKING POC
by bumheehan · poc
https://github.com/bumheehan/cve-2021-44228-log4j-test
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection. It includes an LDAP server setup, a malicious Java payload, and a vulnerable Spring Boot application for testing.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker for LDAP/NGINX setup · Java 8u191 or earlier for payload execution · Vulnerable Log4j version in target application
nomisec
SCANNER
by ssl-user-en · poc
https://github.com/ssl-user-en/Log4j-Scanner-Exploit
This repository provides a bash script to scan for and exploit CVE-2021-44228 (Log4Shell) using LDAP payloads and various HTTP headers. It includes instructions for setting up an LDAP/HTTP server and running the scanner against target URLs.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java runtime · curl · LDAP/HTTP server setup · target URLs
nomisec
SCANNER
by metodidavidovic · poc
https://github.com/metodidavidovic/log4j-quick-scan
This repository contains a Python script designed to scan networks for hosts potentially vulnerable to CVE-2021-44228 (Log4Shell). It sends HTTP/HTTPS requests with JNDI strings in headers and monitors for LDAP callback traffic to identify vulnerable systems.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to target hosts · A reachable listener host to monitor LDAP callbacks
nomisec
WRITEUP
by zaneef · poc
https://github.com/zaneef/CVE-2021-44228
This repository provides a detailed writeup on CVE-2021-44228 (Log4Shell), including an explanation of the vulnerability, its CVSSv3 score, and a step-by-step guide on how an attacker could exploit it to achieve remote code execution (RCE) via a reverse shell. It includes instructions for setting up an LDAP server, generating a payload, and executing the exploit.
Classification
Writeup 100%
Target:
Apache Log4j versions 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
A vulnerable Log4j version · Network access to the target · Ability to send crafted HTTP requests to the target
nomisec
SCANNER
by r00thunter · poc
https://github.com/r00thunter/Log4Shell-Scanner
This is a Python-based scanner for detecting CVE-2021-44228 (Log4Shell) by sending crafted JNDI payloads to target URLs and checking for vulnerability via DNS callbacks. It supports multi-threading and proxy configurations for testing.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Target URL(s) or a file containing URLs · A callback server (e.g., Burp Collaborator, interactsh) to detect DNS lookups
nomisec
SCANNER
by rv4l3r3 · poc
https://github.com/rv4l3r3/log4v-vuln-check
This repository contains a bash script designed to scan systems for potential vulnerabilities related to CVE-2021-44228 (Log4j). The script checks for the presence of Log4j files, Java installations, and related packages, and analyzes JAR/WAR/EAR files for vulnerable components.
Classification
Scanner 95%
Target:
Log4j (versions affected by CVE-2021-44228)
Auth required
Prerequisites:
Access to the target system with sufficient privileges to run the script · Presence of Log4j or related components on the system
nomisec
WORKING POC
by b1tm0n3r · poc
https://github.com/b1tm0n3r/CVE-2021-44228
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in vulnerable Log4j versions. It includes a malicious LDAP server, a vulnerable web application, and a code provider for dynamic payload generation.
Classification
Working Poc 95%
Target:
Apache Log4j 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
Java OpenJDK 11 · Maven for building · Network access to target
nomisec
SCANNER
by m0rath · poc
https://github.com/m0rath/detect-log4j-exploitable
This repository provides a bash script to detect systems vulnerable to CVE-2021-44228 (Log4Shell) by identifying Java processes using the log4j-core component. It does not exploit the vulnerability but scans for potential exposure.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to the target system · Bash environment · zip/unzip packages installed
nomisec
WORKING POC
by maxant · poc
https://github.com/maxant/log4j2-CVE-2021-44228
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating JNDI injection via RMI, DNS, and LDAP. The client triggers the vulnerability by logging a malicious string, while the server hosts a malicious class for remote execution.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · RMI/DNS/LDAP server setup for payload delivery
nomisec
WORKING POC
by 34zY · poc
https://github.com/34zY/JNDI-Exploit-1.2-log4shell
This repository provides a JNDI exploit tool for CVE-2021-44228 (Log4Shell), allowing remote code execution via LDAP and HTTP callbacks. It includes various payloads and WAF bypass techniques.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Attacker-controlled server to host LDAP/HTTP callbacks · Vulnerable Log4j version in target application
nomisec
WRITEUP
by kkyehit · poc
https://github.com/kkyehit/log4j_CVE-2021-44228
This repository contains only a README.md file with no exploit code or technical details. It appears to be a placeholder or documentation for CVE-2021-44228 (Log4Shell).
Classification
Writeup 90%
Target:
Apache Log4j 2.x
No auth needed
nomisec
SCANNER
by BJLIYANLIANG · poc
https://github.com/BJLIYANLIANG/log4j-scanner
This repository contains a Go-based scanner for detecting CVE-2021-44228 (Log4j RCE) by searching for the vulnerable 'JndiLookup.class' file within 'log4j-core' JAR archives on Windows systems. It scans all mounted drives and reports paths to vulnerable JAR files.
Classification
Scanner 100%
Target:
Apache Log4j 2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to the target Windows system · Presence of Log4j JAR files on the system
nomisec
SCANNER
by suniastar · poc
https://github.com/suniastar/scan-log4shell
This repository contains a scanning tool designed to detect servers vulnerable to CVE-2021-44228 (Log4Shell). It appears to be a suite for identifying affected systems rather than an exploit itself.
Classification
Scanner 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to target systems · Log4j vulnerable endpoint
nomisec
WORKING POC
by shivakumarjayaraman · poc
https://github.com/shivakumarjayaraman/log4jvulnerability-CVE-2021-44228
This repository contains a test case demonstrating the Log4j JNDI injection vulnerability (CVE-2021-44228). The test logs a malicious string that triggers an LDAP lookup, confirming the vulnerability.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · LDAP server to deliver payload
nomisec
WORKING POC
by j3kz · poc
https://github.com/j3kz/CVE-2021-44228-PoC
This is a self-contained lab environment demonstrating CVE-2021-44228 (Log4Shell) with a reverse shell payload. It includes a vulnerable Spring Boot application, an LDAP server, an RCE server, and a reverse shell server to exploit the vulnerability.
Classification
Working Poc 100%
Target:
Apache Log4j <=2.0–2.14.1
No auth needed
Prerequisites:
Docker and Docker Compose · Network connectivity between containers
nomisec
WORKING POC
by nikolas-charalambidis · poc
https://github.com/nikolas-charalambidis/cve-2021-44228
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating JNDI injection via environment variables in vulnerable Log4j versions (2.14.1) and mitigation in 2.16.0. The CI workflow automates exploitation and mitigation testing.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
Java 11 · Maven · vulnerable Log4j version (2.14.1)
nomisec
WORKING POC
by Nikolas-Charalambidis · poc
https://github.com/Nikolas-Charalambidis/cve-2021-44228
This repository contains a simplified simulation of CVE-2021-44228, demonstrating the Log4j JNDI injection vulnerability. It includes examples for both vulnerable (2.14.1) and patched (2.16.0) versions, using environment variables to simulate the exploit.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1
No auth needed
Prerequisites:
Java 11 · Maven · Environment variable (e.g., JAVA_HOME)
nomisec
WRITEUP
by WatchGuard-Threat-Lab · poc
https://github.com/WatchGuard-Threat-Lab/log4shell-iocs
This repository contains IOC feeds curated by WatchGuard Threat Lab for detecting attempts to exploit CVE-2021-44228 (Log4Shell). It provides indicators for threat hunting and watchlisting, not actual exploit code.
Classification
Writeup 100%
Target:
Log4j2 (versions affected by CVE-2021-44228)
No auth needed
Prerequisites:
Access to network logs or monitoring tools
nomisec
WORKING POC
by TheArqsz · poc
https://github.com/TheArqsz/CVE-2021-44228-PoC
This repository contains a functional Proof-of-Concept (PoC) for CVE-2021-44228 (Log4Shell), demonstrating various exploit types including reverse shell, bind shell, RCE, OS detection, and time-based vulnerability detection. It includes scripts to build a vulnerable application and an exploit server with LDAP and HTTP components.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker · Java · Vulnerable Log4j version
nomisec
SCANNER
by scheibling · poc
https://github.com/scheibling/py-log4shellscanner
This repository contains a Python-based scanner for CVE-2021-44228 (Log4Shell), designed to detect vulnerable systems by sending crafted payloads to target URLs and checking for DNS callbacks. It includes multithreading, WAF bypass techniques, and customizable headers.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
DNS callback server · list of target URLs
nomisec
WORKING POC
by RenYuH · poc
https://github.com/RenYuH/log4j-lookups-vulnerability
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI lookups in Log4j2. It includes an RMI server setup and a test case triggering the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java environment · Network access to target · Log4j2 vulnerable version
nomisec
WORKING POC
by kannthu · poc
https://github.com/kannthu/CVE-2021-44228-Apache-Log4j-Rce
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection in Apache Log4j. It includes an exploit class that executes arbitrary commands (e.g., launching a calculator) and a log4j class to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j (versions >=2.0-beta9 and <=2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · LDAP/RMI server for payload delivery
nomisec
SCANNER
by hozyx · poc
https://github.com/hozyx/log4shell
This repository contains a Python script designed to scan file systems for vulnerable Log4j JAR files (versions 2.* to 2.15) affected by CVE-2021-44228 and CVE-2021-45046. It recursively searches directories and archives (zip, ear, war) for the presence of the JndiLookup.class file.
Classification
Scanner 100%
Target:
Apache Log4j 2.* to 2.15
No auth needed
Prerequisites:
Access to the target file system
nomisec
STUB
by Vulnmachines · poc
https://github.com/Vulnmachines/log4j-cve-2021-44228
The repository contains only a README.md file with minimal content, providing no functional exploit code or technical details for CVE-2021-44228.
Target:
Apache Log4j (unspecified version)
No auth needed
nomisec
SCANNER
by andypitcher · poc
https://github.com/andypitcher/Log4J_checker
This repository contains a bash script designed to detect the presence of vulnerable Log4j libraries (CVE-2021-44228) and signs of exploitation attempts. It scans for JndiLookup.class, suspicious log entries, and post-exploit files.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions affected by CVE-2021-44228)
No auth needed
Prerequisites:
Access to the target system's filesystem and logs
nomisec
WORKING POC
by recanavar · poc
https://github.com/recanavar/vuln_spring_log4j2
This repository contains a vulnerable Spring Boot application designed to demonstrate CVE-2021-44228 (Log4Shell). It includes endpoints that log user-controlled input, making it susceptible to remote code execution via JNDI injection.
Classification
Working Poc 95%
Target:
Spring Boot with Log4j 2.13.3
No auth needed
Prerequisites:
Network access to the vulnerable application · Ability to send crafted HTTP requests
nomisec
WORKING POC
by lonecloud · poc
https://github.com/lonecloud/CVE-2021-44228-Apache-Log4j
This repository contains a functional proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Apache Log4j. The exploit triggers the execution of a malicious class file hosted on an attacker-controlled server, resulting in the launch of a calculator application.
Classification
Working Poc 95%
Target:
Apache Log4j (versions 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · LDAP server to host malicious payload · HTTP server to serve the malicious class file
nomisec
SCANNER
by jeremyrsellars · poc
https://github.com/jeremyrsellars/CVE-2021-44228_scanner
This repository contains a scanner tool designed to detect the presence of JndiLookup.class files, which are indicative of vulnerability to CVE-2021-44228 (Log4Shell). The tool scans directories and nested archives (zip, jar, ear, war) for the vulnerable class file.
Classification
Scanner 100%
Target:
Log4j versions 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
Access to the file system or archives to scan
nomisec
STUB
by sebiboga · poc
https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows
The repository contains only a README file with minimal information about fixing CVE-2021-44228 for Windows, but no actual exploit code or technical details are provided.
Target:
Apache JMeter (unspecified version)
No auth needed
nomisec
WORKING POC
by Camphul · poc
https://github.com/Camphul/log4shell-spring-framework-research
This repository contains a Spring Boot test application demonstrating CVE-2021-44228 (Log4Shell) vulnerability. It includes a vulnerable Spring application with endpoints to test exploitation scenarios.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (Spring Framework applications)
No auth needed
Prerequisites:
Vulnerable Log4j version (2.0-beta9 to 2.14.1) · Network access to the target application
nomisec
WORKING POC
by roticagas · poc
https://github.com/roticagas/CVE-2021-44228-Demo
This repository demonstrates CVE-2021-44228 (Log4Shell) by exposing a vulnerable Spring Boot application that logs user-controlled input via Log4j 2, allowing remote code execution through JNDI injection.
Classification
Working Poc 90%
Target:
Apache Log4j 2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j 2 version in the target application · Network access to the target's logging endpoint
nomisec
SCANNER
by 0xThiebaut · poc
https://github.com/0xThiebaut/CVE-2021-44228
This repository contains modified Python scripts for detecting Log4j2 files vulnerable to CVE-2021-44228 (Log4Shell). The scripts scan filesystems and JAR files for vulnerable versions of Log4j2 by checking MD5 hashes of specific class files.
Classification
Scanner 100%
Target:
Apache Log4j 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
Access to the target filesystem or JAR files
nomisec
WORKING POC
by ShaneKingBlog · poc
https://github.com/ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228
This repository contains a Spring Boot application demonstrating CVE-2021-44228 (Log4Shell) vulnerability. The controller exposes an endpoint that logs user input, allowing for JNDI injection attacks.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target application · LDAP/RMI server for payload delivery
nomisec
SCANNER
by municipalparkingservices · poc
https://github.com/municipalparkingservices/CVE-2021-44228-Scanner
This repository contains a scanner tool for detecting and mitigating CVE-2021-44228 (Log4Shell) vulnerabilities in JAR, WAR, and EAR files. It identifies vulnerable Log4j versions and optionally removes the JndiLookup.class to mitigate the issue.
Classification
Scanner 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to the target system's file system · Presence of vulnerable Log4j JAR files
nomisec
WORKING POC
by ZiedJabnoune · poc
https://github.com/ZiedJabnoune/log4shell-vulnerable-app
This repository contains a Spring Boot application intentionally vulnerable to CVE-2021-44228 (Log4Shell). It demonstrates the exploitation of the Log4j JNDI injection vulnerability via a malicious LDAP server and a crafted HTTP header.
Classification
Working Poc 100%
Target:
Apache Log4j 2.14.1 (via Spring Boot 2.6.1)
No auth needed
Prerequisites:
Docker · Java 8 · JNDIExploit tool · Network access to the vulnerable application
nomisec
WRITEUP
by didoatanasov · poc
https://github.com/didoatanasov/cve-2021-44228
This repository provides an Ansible playbook to mitigate CVE-2021-44228 (Log4Shell) by setting the JAVA_TOOL_OPTIONS environment variable globally. It does not contain exploit code but offers a remediation method.
Classification
Writeup 90%
Target:
Apache Log4j 2.x
Auth required
Prerequisites:
Access to execute Ansible playbooks on target systems
nomisec
WORKING POC
by cbuschka · poc
https://github.com/cbuschka/log4j2-rce-recap
This repository contains a functional proof-of-concept for CVE-2021-44228, demonstrating the Log4j2 JNDI injection vulnerability. It includes tests to verify exploitability and mitigation effectiveness using a mock LDAP server.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java >= 8 · Maven >= 3 · No running LDAP service on 127.0.0.1:1389
nomisec
SCANNER
by dark-ninja10 · poc
https://github.com/dark-ninja10/Log4j-CVE-2021-44228
This repository contains a Python-based scanner for detecting CVE-2021-44228 (Log4j RCE). It uses DNS callbacks and WAF bypass techniques to identify vulnerable systems.
Classification
Scanner 95%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
Network access to target · DNS callback provider (e.g., interact.sh)
nomisec
WORKING POC
by andrii-kovalenko-celonis · poc
https://github.com/andrii-kovalenko-celonis/log4j-vulnerability-demo
This repository demonstrates the Log4j vulnerability (CVE-2021-44228) by exposing an endpoint that logs user-controlled input, which can trigger JNDI lookups. It is a minimal Spring Boot application designed to showcase the vulnerability.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version in the classpath · Network access to a malicious LDAP/RMI server
nomisec
WORKING POC
by chilit-nl · poc
https://github.com/chilit-nl/log4shell-example
This repository demonstrates the Log4Shell (CVE-2021-44228) vulnerability in a Spring Boot setup, including unpatched and patched examples. It includes a test suite to verify vulnerability status by attempting LDAP/JNDI lookups.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version in classpath · Network access to attacker-controlled LDAP/JNDI server
nomisec
WORKING POC
by sandarenu · poc
https://github.com/sandarenu/log4j2-issue-check
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j2. The test endpoint logs user input, triggering the vulnerability when a malicious JNDI lookup string is provided.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j2 version in the classpath · Network access to the target application · LDAP/RMI server to deliver payload (for full exploitation)
nomisec
STUB
by snatalius · poc
https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local
The repository contains only a README file with a brief description of CVE-2021-44228 (Log4Shell) but no actual exploit code or proof-of-concept implementation. It appears to be a placeholder or incomplete project.
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
nomisec
WRITEUP
by ben-smash · poc
https://github.com/ben-smash/l4j-info
This repository is a curated collection of links and resources related to CVE-2021-44228 (Log4Shell), including advisories, mitigation strategies, and detection tools. It does not contain exploit code but serves as an informational hub for understanding and addressing the vulnerability.
Classification
Writeup 100%
Target:
Apache Log4j 2.x
No auth needed
nomisec
WORKING POC
by strawhatasif · poc
https://github.com/strawhatasif/log4j-test
This repository demonstrates CVE-2021-44228 (Log4Shell) by exposing a vulnerable Spring Boot application using Log4j2. The endpoint `/somebody` logs the `User-Agent` header, triggering JNDI lookup and potential RCE if a malicious LDAP/RMI server is referenced.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to target · Ability to send crafted HTTP headers
nomisec
WORKING POC
by yanghaoi · poc
https://github.com/yanghaoi/CVE-2021-44228_Log4Shell
This repository contains a proof-of-concept exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j. The PoC uses a vulnerable JDK version and a JNDI exploit server to trigger arbitrary command execution (e.g., 'calc').
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
JDK8 < 8u191 · Log4j vulnerable version · JNDI-Injection-Exploit server
nomisec
WORKING POC
by VNYui · poc
https://github.com/VNYui/CVE-2021-44228
This repository contains a Python-based PoC for CVE-2021-44228 (Log4Shell), including a scanner and exploit script. The exploit generates a reverse shell payload via JNDI injection, while the scanner checks for vulnerable Log4j instances using various WAF bypass techniques.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Network access to vulnerable Log4j instance · Outbound connectivity for reverse shell/callback
nomisec
WORKING POC
by 1hakusai1 · poc
https://github.com/1hakusai1/log4j-rce-CVE-2021-44228
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j2. It includes a vulnerable web application, an LDAP server, and a malicious payload server to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Docker environment · Network access to the vulnerable Log4j application · LDAP server to host malicious payload
nomisec
WORKING POC
by lov3r · poc
https://github.com/lov3r/cve-2021-44228-log4j-exploits
This repository contains a proof-of-concept exploit for CVE-2021-44228, demonstrating the Log4j2 RCE vulnerability via JNDI injection. The exploit triggers a malicious LDAP lookup to execute arbitrary code.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j2 version · Network access to target · LDAP server hosting malicious payload
nomisec
WORKING POC
by tuyenee · poc
https://github.com/tuyenee/Log4shell
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via a vulnerable Log4j 2.6.1 instance in a Spring Boot application. The exploit triggers by sending a malicious payload through a POST request to the login endpoint.
Classification
Working Poc 95%
Target:
Apache Log4j 2.6.1
No auth needed
Prerequisites:
Vulnerable Log4j version (2.6.1 or earlier) · Network access to the target application
nomisec
WRITEUP
by markuman · poc
https://github.com/markuman/aws-log4j-mitigations
This repository provides AWS WAFv2 mitigations using Ansible to prevent exploitation of CVE-2021-44228 (Log4j). It is a defensive guide rather than an exploit PoC.
Classification
Writeup 100%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
AWS environment · WAFv2 · Ansible
nomisec
WORKING POC
by gauthamg · poc
https://github.com/gauthamg/log4j2021_vul_test
This repository contains a Spring Boot application demonstrating CVE-2021-44228 (Log4Shell) by logging user input via a vulnerable Log4j2 version. The `/search` endpoint logs the `query` parameter, allowing JNDI injection attacks.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j2 version in the classpath · Network access to a malicious LDAP/RMI server
nomisec
WORKING POC
by fireflyingup · poc
https://github.com/fireflyingup/log4j-poc
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j. The exploit triggers an LDAP lookup to a malicious server, which can return a payload for execution.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · LDAP server hosting the exploit payload
nomisec
WORKING POC
by uint0 · poc
https://github.com/uint0/cve-2021-44228-helpers
This repository contains proof-of-concept exploits and vulnerable applications for CVE-2021-44228 (Log4Shell). It includes examples for class inclusion and RMI deserialization attacks, along with helper tools like an LDAP listener for exfiltration.
Classification
Working Poc 100%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target · Ability to send crafted JNDI lookup strings
nomisec
WORKING POC
by lohanichaten · poc
https://github.com/lohanichaten/log4j-cve-2021-44228
This repository contains a Spring Boot application demonstrating CVE-2021-44228 (Log4Shell) vulnerability. It includes endpoints that log user-controlled input via Log4j, enabling remote code execution through JNDI lookups.
Classification
Working Poc 90%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version in the target application · Network access to the target application
nomisec
WORKING POC
by urholaukkarinen · poc
https://github.com/urholaukkarinen/docker-log4shell
This repository provides a Go-based Dockerized LDAP and HTTP server to exploit CVE-2021-44228 (Log4Shell). It serves malicious LDAP responses pointing to a hosted .class file, enabling remote code execution on vulnerable Log4j instances.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Vulnerable Log4j version with JNDI lookups enabled · Network access to the target · Ability to host malicious .class files
nomisec
WORKING POC
by Crane-Mocker · poc
https://github.com/Crane-Mocker/log4j-poc
This repository contains a PoC for CVE-2021-44228 (Log4Shell), which exploits a remote code execution vulnerability in Apache Log4j 2. The script sends a malicious User-Agent header with a JNDI LDAP payload to a target URL and checks for DNS callbacks to confirm exploitation.
Classification
Working Poc 95%
Target:
Apache Log4j 2 (versions 2.0 to 2.14.1)
No auth needed
Prerequisites:
Target URL with vulnerable Log4j version · Network access to the target · DNS callback service (e.g., dnslog.cn)
nomisec
WRITEUP
by leetxyz · poc
https://github.com/leetxyz/CVE-2021-44228-Advisories
This repository is a curated list of vendor advisories and responses to CVE-2021-44228 (Log4Shell). It does not contain exploit code but provides links to official statements and guidance from various companies affected by the vulnerability.
Classification
Writeup 100%
Target:
Log4j 2 (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Access to the repository or linked advisories
nomisec
WORKING POC
by zhangxvx · poc
https://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in Log4j2. It includes a malicious payload (Log4jRCE.java) that spawns calc.exe, an LDAP server setup, and a test case (Hack.java) to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java runtime · Network access to target · LDAP server (marshalsec) · HTTP server to host payload
nomisec
WRITEUP
by izzyacademy · poc
https://github.com/izzyacademy/log4shell-mitigation
This repository provides a detailed writeup on CVE-2021-44228 (Log4Shell), including mitigation strategies, affected versions, and references. It does not contain exploit code but offers educational content on the vulnerability.
Classification
Writeup 100%
Target:
Apache Log4j 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
Vulnerable Log4j version · User-controlled input logged by the application
nomisec
WORKING POC
by WYSIIWYG · poc
https://github.com/WYSIIWYG/Log4J_0day_RCE
This repository provides a proof-of-concept exploit for CVE-2021-44228, a critical remote code execution vulnerability in Apache Log4j. It includes instructions for setting up an LDAP server and crafting malicious payloads to trigger the vulnerability.
Classification
Working Poc 90%
Target:
Apache Log4j < 2.15.0
No auth needed
Prerequisites:
Java development environment · Access to a vulnerable Log4j instance · Network access to the target
nomisec
WORKING POC
by Kadantte · poc
https://github.com/Kadantte/CVE-2021-44228-poc
This repository contains a functional proof-of-concept for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection in a vulnerable Spring Boot application using Log4j 2.6.1.
Classification
Working Poc 100%
Target:
Apache Log4j 2.6.1
No auth needed
Prerequisites:
Docker · Java 1.8.0_181 · rogue-jndi tool
vulncheck_xdb
WRITEUP
remote
https://github.com/user20252228/Log4shell
This repository contains a detailed technical analysis of CVE-2021-44228 (Log4Shell), including the vulnerability's root cause, attack flow, exploitation examples, and mitigation strategies. It provides in-depth explanations of JNDI lookup abuse and real-world attack scenarios.
Classification
Writeup 95%
Target:
Apache Log4j 2.0-beta9 to 2.14.1
No auth needed
Prerequisites:
Log4j vulnerable version (2.0-beta9 to 2.14.1) · Network access to target system · LDAP/RMI server for payload delivery
vulncheck_xdb
WRITEUP
remote
https://github.com/GabrYLive/Minecraft-RCE
This repository provides a detailed technical analysis of the Log4Shell vulnerability (CVE-2021-44228) in Minecraft servers, explaining the attack chain involving JNDI injection, LDAP, and RCE via reverse shell. It includes step-by-step instructions for setting up the exploit environment but does not contain functional exploit code.
Classification
Writeup 95%
Target:
Minecraft Java Edition Server (1.7 to 1.18)
No auth needed
Prerequisites:
LDAP server · HTTP server · Netcat · Java JDK 1.8.0_181 · Maven · Python
vulncheck_xdb
WORKING POC
remote
https://github.com/Jun-5heng/CVE-2021-44228
This repository contains a functional exploit for CVE-2021-44228 (Log4Shell), demonstrating remote code execution via JNDI injection. The script automates the exploitation process by launching a JNDI server and sending crafted payloads to vulnerable targets.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java 1.8 · JNDIExploit-1.3-SNAPSHOT.jar · vulnerable parameter in target application
vulncheck_xdb
SCANNER
infoleak
https://github.com/Ananya-0306/Log-4j-scanner
This repository contains a scanner for detecting CVE-2021-44228 (Log4j RCE) by fuzzing HTTP headers, POST data, and JSON parameters with DNS callback validation. It supports WAF bypass payloads and can test for CVE-2021-45046.
Classification
Scanner 95%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
DNS callback provider (e.g., interact.sh, dnslog.cn)
vulncheck_xdb
SCANNER
remote
https://github.com/y-security/yLog4j
This repository contains a Burp Suite plugin for detecting CVE-2021-44228 (Log4j) by injecting JNDI payloads into various HTTP headers and parameters. It uses Burp Collaborator for callback detection and is designed for mass-scanning.
Classification
Scanner 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Burp Suite Professional · Jython 2.x · Burp Collaborator enabled
vulncheck_xdb
WORKING POC
remote
https://github.com/ColdFusionX/CVE-2021-44228-Log4Shell-POC
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection. It includes an Exploit.java payload that executes arbitrary commands (e.g., launching gnome-calculator) and a log4j.java trigger to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java JDK · IntelliJ IDEA · marshalsec LDAP server · Python/HTTP server to host payload
vulncheck_xdb
SUSPICIOUS
infoleak
https://github.com/mr-vill4in/log4j-fuzzer
The repository lacks actual exploit code and only provides vague instructions for using a binary named 'log4j' without technical details about CVE-2021-44228. It directs users to external tools like interactsh or DNSLOG.CN for payload delivery, which is typical of social engineering lures.
Classification
Suspicious 90%
Target:
Apache Log4j 2.x
No auth needed
Prerequisites:
binary named 'log4j' (not provided) · remote server for callback (e.g., interactsh, DNSLOG.CN)
vulncheck_xdb
WORKING POC
remote
https://github.com/Panyaprach/Proof-CVE-2021-44228
This repository contains a functional PoC for CVE-2021-44228 (Log4Shell), demonstrating RCE via JNDI injection. It includes an evil RMI server and a victim simulation that triggers the vulnerability through Log4j lookup.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x (versions 2.0-beta9 to 2.14.1)
No auth needed
Prerequisites:
Java runtime environment · Network access to the target · Log4j vulnerable version in use
vulncheck_xdb
WORKING POC
remote
https://github.com/twseptian/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab
This repository provides a functional Docker-based lab for CVE-2021-44228 (Log4Shell), including a vulnerable Spring Boot application and step-by-step instructions for exploiting the JNDI injection flaw to achieve remote code execution (RCE). It demonstrates the vulnerability using a malicious LDAP server and payload delivery via HTTP.
Classification
Working Poc 95%
Target:
Apache Log4j 2.14.1 (via Spring Boot 2.6.1)
No auth needed
Prerequisites:
Docker · Java · JNDIExploit tool · network connectivity between attacker and target
metasploit
WORKING POC
EXCELLENT
by Michael Schierl, juan vazquez, sinn3r, Spencer McIntyre · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/log4shell_header_injection.rb
This Metasploit module exploits CVE-2021-44228 (Log4Shell) by injecting a malicious JNDI string into HTTP headers, triggering an LDAP connection to deliver a payload. It supports multiple targets (Automatic, Windows, Linux) and leverages Java deserialization for RCE.
Classification
Working Poc 100%
Target:
Apache Log4j2 (versions affected by CVE-2021-44228)
No auth needed
Prerequisites:
Vulnerable Log4j2 version · Network access to target HTTP endpoint · LDAP/HTTP callback connectivity
metasploit
WORKING POC
EXCELLENT
by Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/vmware_vcenter_log4shell.rb
This Metasploit module exploits CVE-2021-44228 (Log4Shell) in VMware vCenter Server by sending a malicious JNDI string via the X-Forwarded-For header, triggering an LDAP callback to deserialize a payload for remote code execution (RCE) as root (Linux) or SYSTEM (Windows).
Classification
Working Poc 95%
Target:
VMware vCenter Server (versions affected by Log4Shell)
No auth needed
Prerequisites:
Network access to the target's HTTP/HTTPS service · LDAP egress connectivity from the target
metasploit
WORKING POC
EXCELLENT
by Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/ubiquiti_unifi_log4shell.rb
This Metasploit module exploits CVE-2021-44228 (Log4Shell) in Ubiquiti UniFi Network Application versions 5.13.29 through 6.5.53 via JNDI injection in the 'remember' field of a POST request to the /api/login endpoint, leading to unauthenticated remote code execution.
Classification
Working Poc 100%
Target:
Ubiquiti UniFi Network Application 5.13.29 to 6.5.53
No auth needed
Prerequisites:
Network access to the target's API endpoint (port 8443) · LDAP server to host malicious payload
metasploit
WORKING POC
EXCELLENT
by Spencer McIntyre · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/mobileiron_core_log4shell.rb
This Metasploit module exploits CVE-2021-44228 (Log4Shell) in MobileIron Core by sending a malicious JNDI string via HTTP POST to trigger an LDAP callback, resulting in remote code execution as the tomcat user.
Classification
Working Poc 100%
Target:
MobileIron Core (versions affected by Log4Shell)
No auth needed
Prerequisites:
Network access to the target · LDAP server reachable by the target