Skip to content

aqiMMM/Log4jFuzz

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Log4jFuzz

log4j vuln fuzz/scan

USE

// it's use localhost udp server to check target vuln.
python3 log4jFuzz.py [option]
optional arguments:
  -u URL, --url URL     Target URL. (e.g. http://example.com )
  -f FILE, --file FILE  Select a target list file. (e.g. list.txt )
  -v, --verbosity       Show fuzz info.
  --bypass              Use bypass waf payload. (Default False)
// bypass waf payload
python3 log4jFuzz.py -u "http://192.168.0.150:16787/" --bypass

image

// read file to fuzzing
python3 log4jFuzz.py -f url.txt

image

About

log4j vuln fuzz/scan

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%