diff --git a/pages/en/vulnerability_scans/log4shell.txt b/pages/en/vulnerability_scans/log4shell.txt
deleted file mode 100644
index d8f72ed..0000000
--- a/pages/en/vulnerability_scans/log4shell.txt
+++ /dev/null
@@ -1,43 +0,0 @@
-====== Log4shell ======
-
-On December the 9th, 2021, Apache published a severe vulnerability called [[https://nvd.nist.gov/vuln/detail/CVE-2021-44228|Log4shell]] (and other Log4j-related vulnerabilities).
-
-===== Download =====
-
-How to scan your services quickly, basically with log4j-scan from fullhunt, but using cisagov:
-
-git clone https://github.com/cisagov/log4j-scanner.git
-cd log4-scanner/
-
-
-==== Requirements ====
-
- * python
- * python-requests
- * python-termcolor
- * python-pycryptodome
-
-
-===== Create a url list =====
-
-The easiest way is to create a list of all URLs you want to check:
-
-nano urls.txt
-
-
-https://techsaviours.org
-https://meet.techsaviours.org
-https://searx.techsaviours.org
-
-
-===== Check your urls =====
-
-
-python log4j-scan.py -l urls.txt --waf-bypass --run-all-tests
-
-
-or just a url
-
-
-python log4j-scan.py -u https://techsaviours.org --waf-bypass --run-all-tests
-
\ No newline at end of file