Skip to content

VVzv/Log4jFuzz

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Log4jFuzz

log4j vuln fuzz/scan

USE

// it's use localhost udp server to check target vuln.
'''
该脚本会自动在本地开启一个12345至20100端口数的udp服务,并进行监听,如果该端口在内网中存在利用,可修改程序中如下代码的两个取值区间:
>>> self.port = random.randint(12345, 20100) 
'''
python3 log4jFuzz.py [option]
optional arguments:
  -u URL, --url URL     Target URL. (e.g. http://example.com )
  -f FILE, --file FILE  Select a target list file. (e.g. list.txt )
  -v, --verbosity       Show fuzz info.
  --bypass              Use bypass waf payload. (Default False)
// bypass waf payload
python3 log4jFuzz.py -u "http://192.168.0.150:16787/" --bypass

image

// read file to fuzzing
python3 log4jFuzz.py -f url.txt

image

免责声明

本工具主要用于企业自查内网log4j漏洞,未经授权允许,不得善自使用本工具进行任何攻击活动,由于传播、利用此工具所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,作者不为此承担任何责任。

About

log4j vuln fuzz/scan

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages