Issues
- 0
New payload results in DOS attack
#58 opened by vidhyasasi - 0
Windows Support
#55 opened by r3ptar - 14
Doing just the same using a RegEx
#5 opened by back2root - 1
- 0
Unresolved reference 'args' in check_line Log4ShellDetector/Log4ShellDetector.py
#45 opened by boog1ebug - 1
- 1
New payloads
#47 opened by GH-Rake - 4
zip-compressed files support
#37 opened by aylatalo - 0
- 2
False alarms?
#42 opened by rennis250 - 7
Need assistance with script
#26 opened by Viceman256 - 1
- 1
http statuscode to exploit attempts
#23 opened by 4jwWa2EnYK5FIIaK7AVp - 1
- 2
gzipped log-file path validation
#29 opened by aylatalo - 1
- 7
Add pattern '${base64:JHtqbmRp'
#21 opened by baonq-me - 4
Exploit attempt?
#17 opened by Viceman256 - 1
- 1
segfault on linux
#14 opened by pastascript - 2
- 3
"Exploitation attempt detected", but pattern not in DETECTION_STRINGS. False positive?
#1 opened by busch - 1
New query formats
#6 opened by kaipee - 1
Search filter should be extended.
#7 opened by kaipee - 2
Payload used ITW
#3 opened by IlluminatiFish