log4j vuln fuzz/scan
// it's use localhost udp server to check target vuln.
python3 log4jFuzz.py [option]
optional arguments:
-u URL, --url URL Target URL. (e.g. http://example.com )
-f FILE, --file FILE Select a target list file. (e.g. list.txt )
-v, --verbosity Show fuzz info.
--bypass Use bypass waf payload. (Default False)
// bypass waf payload
python3 log4jFuzz.py -u "http://192.168.0.150:16787/" --bypass
// read file to fuzzing
python3 log4jFuzz.py -f url.txt