DefectDojo / DocumentationLinks
DefectDojo Documentation
☆17Updated 3 years ago
Alternatives and similar repositories for Documentation
Users that are interested in Documentation are comparing it to the libraries listed below
Sorting:
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆16Updated 9 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆22Updated 7 years ago
- The currently released SimpleRisk source code.☆97Updated last month
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 5 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆42Updated last year
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆34Updated 10 years ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- ☆67Updated 8 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Updated 8 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Simple REST-style web service for the CVE searching☆98Updated 2 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 9 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- HoneySAP: SAP Low-interaction research honeypot☆50Updated 2 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Security conferences talks☆25Updated 5 years ago
- ☆21Updated 7 years ago
- ☆14Updated 8 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Python Remote Administration Tool☆13Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- ☆13Updated 9 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated last month
- ☆14Updated 8 years ago