snyk-labs / awesome-log4shell
An Awesome List of Log4Shell resources to help you stay informed and secure! ๐
โ227Updated 2 years ago
Alternatives and similar repositories for awesome-log4shell
Users that are interested in awesome-log4shell are comparing it to the libraries listed below
Sorting:
- Purposely vulnerable Java application to help lead secure coding workshopsโ179Updated 10 months ago
- oauth security guidelinesโ223Updated 5 years ago
- A curated list of security tools for Hackers & Builders!โ99Updated 9 months ago
- Awesome resources about Security in Kubernetesโ42Updated 2 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use โฆโ66Updated 11 months ago
- โ561Updated 4 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modulesโ189Updated 3 years ago
- โ126Updated 10 months ago
- A pre-DDoS security assessment toolโ120Updated 3 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Contaโฆโ274Updated 2 years ago
- Damn Vulnerable Java (EE) Applicationโ138Updated last year
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ158Updated 3 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.โ221Updated 2 years ago
- Hashes for vulnerable LOG4J versionsโ154Updated 3 years ago
- Damn Vulnerable Cloud Applicationโ193Updated 6 years ago
- Finding exposed secrets and personal data in GitLabโ198Updated 5 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.โ134Updated 5 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderโ139Updated 3 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.โ125Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.โ436Updated last month
- Weaponizing Live CT logs for automated monitoring ofย assetsโ133Updated 3 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.โ181Updated last week
- OWASP Code Review Guide Web Repositoryโ133Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.โ316Updated last year
- Static code analysis tool based on Elasticsearchโ129Updated 4 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID securityโ173Updated 6 months ago
- Container Security Verification Standardโ58Updated 5 years ago
- โ247Updated 8 months ago
- A deliberately vulnerable Kubernetes clusterโ124Updated last year
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable weโฆโ43Updated last month