HGustavs / LenaSYSLinks
Code Viewer and Course Organization System used in some courses at University of Skövde
☆70Updated 2 months ago
Alternatives and similar repositories for LenaSYS
Users that are interested in LenaSYS are comparing it to the libraries listed below
Sorting:
- A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.☆127Updated 3 years ago
- ☆10Updated 3 years ago
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆334Updated 3 years ago
- Test☆18Updated 3 years ago
- Log4j Vulnerability Scanner for Windows☆159Updated 4 months ago
- An IP Logger☆12Updated 4 years ago
- ☆14Updated 2 years ago
- Simple local scanner for applications containing vulnerable Spring libraries☆126Updated 3 years ago
- An astronomical collection of space-related cybersecurity tools 🚀✨☆24Updated 2 years ago
- Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.☆59Updated 3 years ago
- ☆14Updated 3 years ago
- Cyber Security Trainings☆320Updated 2 years ago
- 🔏 A web presentation for explaining secure coding best practices☆23Updated 2 years ago
- A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing…☆163Updated 7 months ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆489Updated 2 years ago
- ☆170Updated 8 months ago
- Cracker fb☆11Updated 3 years ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆111Updated 8 months ago
- Multi facebook Cracking With Random Numbercloning☆19Updated last year
- My blog about Cybersecurity, Privacy and Systems :)☆40Updated 4 months ago
- DevSecOps Guide, located devsecops.pagerduty.com☆13Updated 3 years ago
- Manually curated IP Blocklist. Recommended only to update your firewalls weekly with this list. Please read how to use before implementin…☆23Updated last week
- ☆22Updated 4 years ago
- ☆192Updated 3 years ago
- ☆19Updated 2 years ago
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.☆556Updated this week
- ☆11Updated last year
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆437Updated 2 years ago
- ☆10Updated 3 years ago