Mixeway / MixewayBackend
Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend project contains source code of backend with all plugin integrations writer in Spring Boot.
☆15Updated this week
Related projects: ⓘ
- The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host p…☆15Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆10Updated this week
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆23Updated last year
- ☆13Updated 11 months ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 2 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 3 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- A framework for automating penetration testing using a plugin based architecture☆34Updated 2 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated last year
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 3 years ago
- ZAP Management Scripts☆20Updated last week
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- Reconnaissance test in Kubernetes clusters☆21Updated 5 years ago
- AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Ser…☆12Updated 2 years ago
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆25Updated 2 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 5 months ago
- DefectDojo Community Content☆17Updated 5 months ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆25Updated 2 weeks ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 4 months ago
- Cloud metadata extraction tools and scripts☆33Updated last year
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆27Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago