Skip to content

Instantly share code, notes, and snippets.

View tech-sumit's full-sized avatar
😎
Working from home

Sumit S. Agrawal tech-sumit

😎
Working from home
View GitHub Profile
@tech-sumit
tech-sumit / Dockerfile
Created March 11, 2025 08:10
nexus-cli dockerfile
# Stage 1: Build the Nexus CLI binary
FROM ubuntu:22.04 AS builder
ENV DEBIAN_FRONTEND=noninteractive
# Install dependencies
RUN apt-get update && \
apt-get install -y \
build-essential \
pkg-config \
@tech-sumit
tech-sumit / 20211210-TLP-WHITE_LOG4J.md
Last active December 18, 2021 10:03 — forked from SwitHak/20211210-TLP-WHITE_LOG4J.md
BlueTeam CheatSheet * Log4Shell* | Last updated: 2021-12-14 0006 UTC

Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228)

Errors, typos, something to say ?

  • If you want to add a link, comment or send it to me
  • Feel free to report any mistake directly below in the comment

Other great ressources

@tech-sumit
tech-sumit / log4j_rce_detection.md
Last active December 18, 2021 09:21 — forked from Neo23x0/log4j_rce_detection.md
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log