Share
## https://sploitus.com/exploit?id=1CCC4512-40AB-5F72-9913-3D894DB4676F
# CVE-2021-44228 (log4shell) POC
---------------------
<h1 align="center">
  <img src="https://www.breezyscroll.com/wp-content/uploads/2021/12/log4j-exploit.jpeg" alt="Log4j-RCE-Scanner" width="80%"></a>
  <br>
</h1>

## log4j Scanning tool
This tool will help you identify remote code execution vulnerability (log4j) on your systems.


## Requirements
You will need to install [httpx](https://github.com/projectdiscovery/httpx), [subfinder](https://github.com/projectdiscovery/subfinder), [assetfinder](https://github.com/tomnomnom/assetfinder), [curl](https://github.com/curl/curl) and [amass](https://github.com/OWASP/Amass) in order to run the bash script.

## Installation
1. Simply git clone the repo or download the bash script <code>git clone https://github.com/shamo0/CVE-2021-44228.git</code>
2. change file permissions <code>chmod +x log4j_scanner.sh</code>
3. Run the bash script <code>./log4j_scanner.sh</code>

## Usage: 

<code>./log4j_scanner.sh -l subdomains.txt -i c6wvp482vtc10xx5bhnggdqp5neyyyyyb.interact.sh</code><br/>
<code>./log4j_scanner.sh -d vulnsite.com -i c6wvp482vtc10xx5bhnggdqp5neyyyyyb.interact.sh</code><br/>

<code>-h, --help              Help menu</code><br/>
<code>-l, --url-list          List of domain/subdomain/ip to be used for scanning.</code><br/>
<code>-d, --domain            The domain name to which all subdomains and itself will be checked with Subfinder & Assetfinder.</code><br/>
<code>-i, --inteactshdomain      interactsh domain address.</code><br/>



## References & Acknowledgements
* https://log4shell.huntress.com/
* https://github.com/adilsoybali/Log4j-RCE-Scanner
* https://nvd.nist.gov/vuln/detail/CVE-2021-44228

But also please note that
<h1 align="center">
  <img src="https://pbs.twimg.com/media/FGUwLYCX0AUUKNT.jpg" alt="Log4j-RCE-Scanner" width="80%"></a>
  <br>
</h1>