Narasimha1997 / py4jshell

Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.

Date Created 2021-12-17 (3 years ago)
Commits 11 (last one 3 years ago)
Stargazers 87 (0 this week)
Watchers 5 (0 this week)
Forks 8
License other
Ranking

RepositoryStats indexes 597,394 repositories, of these Narasimha1997/py4jshell is ranked #323,831 (46th percentile) for total stargazers, and #336,083 for total watchers. Github reports the primary language for this repository as Python, for repositories using this language it is ranked #60,680/119,856.

Narasimha1997/py4jshell is also tagged with popular topics, for these it's ranked: python (#13,908/22362),  security (#2,861/4075)

Star History

Github stargazers over time

Watcher History

Github watchers over time, collection started in '23

Recent Commit History

0 commits on the default branch (main) since jan '22

Inactive

No recent commits to this repository

Yearly Commits

Commits to the default branch (main) per year

Issue History

No issues have been posted

Languages

The primary language is Python but there's also others...

updated: 2024-12-08 @ 04:44am, id: 439323434 / R_kgDOGi-LKg