Contrast-Security-OSS / safelog4jView external linksLinks
Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning or upgrading
☆42Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for safelog4j
Users that are interested in safelog4j are comparing it to the libraries listed below
Sorting:
- An example for creating AWS AMIs with packer☆13Dec 11, 2017Updated 8 years ago
- Wireshark dissector for wirelessHART☆13Aug 2, 2017Updated 8 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- Burp Plugin for Contrast Security☆16Oct 8, 2025Updated 4 months ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- ☆23Aug 9, 2024Updated last year
- Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)☆48Feb 23, 2022Updated 3 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Dec 22, 2021Updated 4 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Aug 18, 2023Updated 2 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Aug 30, 2019Updated 6 years ago
- Base infrastructure for future DevSecOps environment in AWS☆25Oct 21, 2020Updated 5 years ago
- ☆27Sep 15, 2022Updated 3 years ago
- A community collection of security reviews of open source software components.☆96Feb 29, 2024Updated last year
- Jenkins Plugin for Sysdig Secure☆14Jan 7, 2026Updated last month
- TEAM Mentor 3.x Released Code☆16Aug 5, 2016Updated 9 years ago
- D4 core software (server and sample sensor client)☆42Dec 23, 2023Updated 2 years ago
- Packer Scripts for Red Hat Family 7 (RedHat 7, CentOS 7, OEL 7)☆29Jul 21, 2015Updated 10 years ago
- ☆31Apr 5, 2022Updated 3 years ago
- A tool to check the security settings of Github Organizations.☆75Updated this week
- Systematic Universal Security Testing Orchestration☆37Mar 28, 2022Updated 3 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated last month
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆41Dec 17, 2025Updated last month
- System Validation Platform☆12Sep 18, 2025Updated 4 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- Hands-on workshop on how to build security automation in pipelines☆37Apr 22, 2024Updated last year
- Okapi BM25 with Go☆13Mar 28, 2023Updated 2 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Deploy and manage containerized Liberty applications on Kubernetes. Documentation: https://ibm.biz/wlo-docs☆12Updated this week
- ☆10May 12, 2022Updated 3 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Jan 9, 2026Updated last month
- Auto-deploy to GitHub using WP2Static☆11May 18, 2019Updated 6 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- Kubernetes on AWS Workshop☆10Nov 3, 2017Updated 8 years ago