{"id":18896756,"url":"https://github.com/0xsyr0/log4shell","last_synced_at":"2026-01-26T18:03:06.487Z","repository":{"id":147024793,"uuid":"437848570","full_name":"0xsyr0/Log4Shell","owner":"0xsyr0","description":"This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.","archived":false,"fork":false,"pushed_at":"2025-03-20T14:38:14.000Z","size":575,"stargazers_count":8,"open_issues_count":0,"forks_count":2,"subscribers_count":4,"default_branch":"main","last_synced_at":"2025-05-24T07:39:23.305Z","etag":null,"topics":["cve","cve-2021-44228","log4j","log4shell"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/0xsyr0.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2021-12-13T11:34:54.000Z","updated_at":"2025-03-20T14:38:17.000Z","dependencies_parsed_at":"2024-11-08T08:37:09.296Z","dependency_job_id":"b078b6ad-9770-4cda-8aeb-c85a76f9eb80","html_url":"https://github.com/0xsyr0/Log4Shell","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/0xsyr0/Log4Shell","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xsyr0%2FLog4Shell","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xsyr0%2FLog4Shell/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xsyr0%2FLog4Shell/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xsyr0%2FLog4Shell/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/0xsyr0","download_url":"https://codeload.github.com/0xsyr0/Log4Shell/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xsyr0%2FLog4Shell/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28784093,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-26T13:55:28.044Z","status":"ssl_error","status_checked_at":"2026-01-26T13:55:26.068Z","response_time":59,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cve","cve-2021-44228","log4j","log4shell"],"created_at":"2024-11-08T08:35:19.914Z","updated_at":"2026-01-26T18:03:06.482Z","avatar_url":"https://github.com/0xsyr0.png","language":null,"readme":"## CVE-2021-44228: Log4j / Log4Shell Security Research Summary\n\n\u003cp align=\"center\"\u003e\n  \u003cimg width=\"300\" height=\"300\" src=\"images/log4shell_logo.png\"\u003e\n\u003c/p\u003e\n\nThis repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.\n\n- [Threat Intel](https://github.com/0xsyr0/Log4Shell/blob/main/Threat-Intel.md)\n- [Mitigations / Fixes](https://github.com/0xsyr0/Log4Shell/blob/main/Mitigations-Fixes.md)\n- [Malware Reports](https://github.com/0xsyr0/Log4Shell/blob/main/Malware-Reports.md)\n- [Advisory](https://github.com/0xsyr0/Log4Shell/blob/main/Advisory.md)\n- [IOCs / Callback Domains / IP Addresses](https://github.com/0xsyr0/Log4Shell/blob/main/IOCs-Callback-Domains-IP-Addresses.md)\n- [Honeypots](https://github.com/0xsyr0/Log4Shell/blob/main/Honeypots.md)\n- [Payloads / Obfuscation / WAF Bypass](https://github.com/0xsyr0/Log4Shell/blob/main/Payloads-Obfuscation-WAF-Bypass.md)\n- [Vulnerability Scanning](https://github.com/0xsyr0/Log4Shell/blob/main/Vulnerability-Scanning.md)\n- [Exploitation](https://github.com/0xsyr0/Log4Shell/blob/main/Exploitation.md)\n- [Trainings](https://github.com/0xsyr0/Log4Shell/blob/main/Trainings.md)\n\nThanks to Malware Unicorn for the logo!\n\nSource: https://malwareunicorn.org/log4shell_logo.png\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F0xsyr0%2Flog4shell","html_url":"https://awesome.ecosyste.ms/projects/github.com%2F0xsyr0%2Flog4shell","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F0xsyr0%2Flog4shell/lists"}