DefectDojo / godojoLinks
Golang installer for DefectDojo
☆28Updated 7 months ago
Alternatives and similar repositories for godojo
Users that are interested in godojo are comparing it to the libraries listed below
Sorting:
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- Tools to automate AWS Cloud security assessments☆25Updated 5 years ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆54Updated 2 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last month
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- CLI component of OWASP PurpleTeam☆131Updated last year
- Falcon Integration Gateway (FIG)☆20Updated 3 weeks ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆65Updated 3 months ago
- Training scenarios for cyber ranges☆12Updated 5 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated last week
- A static website template for security pages.☆52Updated last month
- Dependency Combobulator☆93Updated last year
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆26Updated 3 months ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ☆59Updated 2 years ago
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆20Updated 2 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated 2 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- Scanner to identify dangling DNS records and subdomain takeovers☆46Updated 9 months ago
- ☆11Updated 8 years ago
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆78Updated this week
- Scan your account for the use of untrusted AMIs☆28Updated last week
- InfoSec OpenAI Examples☆19Updated last year
- ☆14Updated last year