Mixeway / MixewayBackend
Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend project contains source code of backend with all plugin integrations writer in Spring Boot.
☆15Updated 3 months ago
Alternatives and similar repositories for MixewayBackend:
Users that are interested in MixewayBackend are comparing it to the libraries listed below
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host p…☆16Updated 5 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated 3 weeks ago
- A framework for automating penetration testing using a plugin based architecture☆36Updated 2 years ago
- ☆14Updated last year
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ZAP Management Scripts☆21Updated last week
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Automated Static Analysis Framework☆9Updated 2 years ago
- Mixeway Scanner is Spring Boot application which aggregate integration with number of OpenSource Vulnerability scanners - both SAST and D…☆21Updated 3 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Maturity Model Collaborative project☆14Updated last year
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 3 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 11 months ago
- Tools for auditing WAFS☆18Updated 2 years ago
- Source code for the Binaries of OWASP WrongSecrets☆10Updated 2 months ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆12Updated 5 years ago
- A tool for detecting sensitive data in code repositories☆14Updated last month
- ☆13Updated 9 months ago
- Repository for OWASP Code Review document☆16Updated 10 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 7 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago