All Projects → Koupah → MC-Log4J-Exploit-Checker

Koupah / MC-Log4J-Exploit-Checker

Licence: other
Checks Minecraft, MultiMC, Lunar and Badlion logs folder to see if you've been affected by the exploit!

Programming Languages

java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to MC-Log4J-Exploit-Checker

log4j-log4shell-affected
Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability
Stars: ✭ 49 (+157.89%)
Mutual labels:  log4j, log4j-rce
liquibase-slf4j
Liquibase SLF4J Logger.
Stars: ✭ 42 (+121.05%)
Mutual labels:  log4j
slf4j-timber
SLF4J binding for Jake Wharton's Timber Android logging library
Stars: ✭ 44 (+131.58%)
Mutual labels:  log4j
hqc mp
微信小程序+微信管理后台+微信用户前台
Stars: ✭ 69 (+263.16%)
Mutual labels:  log4j
fix4log4j
No description or website provided.
Stars: ✭ 21 (+10.53%)
Mutual labels:  log4j
log4jpwn
log4j rce test environment and poc
Stars: ✭ 306 (+1510.53%)
Mutual labels:  log4j
log4j-shell-poc
A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
Stars: ✭ 1,536 (+7984.21%)
Mutual labels:  log4j
py4jshell
Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.
Stars: ✭ 86 (+352.63%)
Mutual labels:  log4j
cloudrasp-log4j2
一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Stars: ✭ 105 (+452.63%)
Mutual labels:  log4j
Student-Information-Administration-System
大学生信息管理系统——初学路上自己摸索实践的项目
Stars: ✭ 91 (+378.95%)
Mutual labels:  log4j
safelog4j
Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning or upgrading
Stars: ✭ 38 (+100%)
Mutual labels:  log4j
minecraft-log4j-honeypot
Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam
Stars: ✭ 89 (+368.42%)
Mutual labels:  log4j
nmap-log4shell
Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)
Stars: ✭ 54 (+184.21%)
Mutual labels:  log4j
python-log4rce
An All-In-One Pure Python PoC for CVE-2021-44228
Stars: ✭ 179 (+842.11%)
Mutual labels:  log4j
telegram-log
Send a Telegram message when your scripts fire an exception or when they finish their execution.
Stars: ✭ 16 (-15.79%)
Mutual labels:  log4j
logging-log4j1
Apache log4j1
Stars: ✭ 875 (+4505.26%)
Mutual labels:  log4j
herald
Log annotation for logging frameworks
Stars: ✭ 71 (+273.68%)
Mutual labels:  log4j
digital-copyright
Stamp your code with a trackable digital copyright
Stars: ✭ 17 (-10.53%)
Mutual labels:  log4j
Log4jPatcher
A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)
Stars: ✭ 43 (+126.32%)
Mutual labels:  log4j
owasp-security-logging
OWASP Security Logging library for Java
Stars: ✭ 106 (+457.89%)
Mutual labels:  log4j

MC-Log4J-Exploit-Checker

Checks your Minecraft logs folder (including zipped logs) to potentially see if you've been a victim of the recent Log4J exploit!
You can now also check your MultiMC logs on all platforms alongside Badlion & Lunar client logs on Windows!

See how to use this, capabilities and more in this README.

Please also read the disclaimer at the bottom of this README file.

LogChecker Interface

Capabilities

What can this do?

This tool it capable of detecting if someone has attempted to use this exploit on you.
This tool can go through your logs, and it does unzip any zipped (.gz) logs automatically in order to check them aswell.
This tool is also able to tell you what files the exploit was detected in and tells you the lines that it detected the exploit on.

What can't this do?

This tool can not determine for certain that you were not a victim of the exploit.
This tool also can not determine, if any, what code was run by the exploit nor the severity of it.

So what is the purpose of this tool?

Just because this tool can not certainly tell you if you were affected, it can tell you if any attempts were made whether or not they were successful.
This tool allows you to take action now instead of waiting for something bad to potentially happen.

Usage

Compiled Jar and other files can be downloaded from Releases

Windows

If on Windows you can run this two separate ways:
Method 1: Downloading LogChecker.exe from Releases and run it

OR if you don't trust random .exe files, and you shouldn't, you can use Method 2.

Method 2: Download LogChecker.jar and start.bat from Releases, make sure they're both in the same folder, then run start.bat

Mac/Linux

Simply download LogChecker.jar and run it in a terminal/console/whatever you guys call it!
I haven't tested this on either platform but, I added premade selections for both platforms as follows.
~/Library/Application Support/minecraft Mac Default
~/.minecraft Linux Default

Notes

  1. I put this together fairly quickly, if you have any suggestions or issues then please open an Issue on GitHub or contact me via Discord (Koupah#5129)
  2. The LogChecker.exe is just a wrapped Jar file, you still need Java to run it
  3. You do not have to run my compiled jar file. I encourage you to look through the source and compile it yourself. It's all here.
  4. You may also run LogChecker.jar with an additional argument to specify your .minecraft folder location

Disclaimer

If there are no results it doesn't guarantee you were not affected as some attackers could have modified your logs.
You have to remember that this is Minecraft, most attackers are more than likely script kiddies copy and pasting an exploit someone else has provided them. In a lot of cases they won't clear/modify your logs.

If attempts at the exploit are found, it is your duty to investigate them and determine if they were successful, malicious, etc.

I am not responsible for any actions you may or may not take after using my tool.
It is not my responsibility if you rely solely upon this tool to determine if you were affected.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].