DefectDojo / DocumentationLinks
DefectDojo Documentation
☆17Updated 3 years ago
Alternatives and similar repositories for Documentation
Users that are interested in Documentation are comparing it to the libraries listed below
Sorting:
- A curated threat modeling library collection☆22Updated last year
- Scripts for AWS amusement...☆21Updated 3 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Python Remote Administration Tool☆13Updated 8 years ago
- A static website template for security pages.☆52Updated 9 months ago
- Open Security Summit 2018☆29Updated 4 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Metasploit Framework☆25Updated 7 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- ZAP Management Scripts☆23Updated 2 weeks ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- ☆14Updated 8 years ago
- ☆11Updated 8 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- ☆38Updated 8 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 5 years ago