in

POC for detecting the Log4Shell (Log4J RCE) vulnerability


POC for detecting the Log4Shell (Log4J RCE) vulnerability.

Run on a system with python3
python3 log4shell-poc.py <pathToTargetFile> <InteractionURL>

  • pathToTargetFile – containing a list of targets (targets are seperated by newlines)
  • InteractionURL – the endpoint used to monitor out of band data extraction or interactions, e.g: https://github.com/projectdiscovery/interactsh

Example Output

[1] Testing asset: http://<target_address1>

[2] Testing asset: http://<target_address2>

[3] Testing asset: http://<target_address3>

[4] Testing asset: http://<target_address4>

[5] Testing asset: http://<target_address5>

[6] Testing asset: http://<target_address6>

[7] Testing asset: http://<target_address7>

View Github


Potential (Beta) — Unlock your best life today

Congratulations are in order! These sites are leaving beta