Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Narasimha1997/py4jshell
Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.
https://github.com/Narasimha1997/py4jshell
bug log4j python remote-code-execution security
Last synced: 22 days ago
JSON representation
Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.
- Host: GitHub
- URL: https://github.com/Narasimha1997/py4jshell
- Owner: Narasimha1997
- License: other
- Created: 2021-12-17T12:22:16.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2021-12-20T05:58:56.000Z (almost 3 years ago)
- Last Synced: 2024-11-15T00:05:48.288Z (28 days ago)
- Topics: bug, log4j, python, remote-code-execution, security
- Language: Python
- Homepage:
- Size: 16.6 KB
- Stars: 86
- Watchers: 5
- Forks: 8
- Open Issues: 0
Awesome Lists containing this project
- awesome-hacking-lists - Narasimha1997/py4jshell - Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit cod (Python)