OWASP / Honeypot-Project
☆88Updated 10 months ago
Alternatives and similar repositories for Honeypot-Project:
Users that are interested in Honeypot-Project are comparing it to the libraries listed below
- The Secure Coding Framework☆268Updated 4 years ago
- The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)☆296Updated last year
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- ADAPT is a tool that performs automated Penetration Testing for WebApps.☆189Updated 5 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆123Updated 11 months ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆148Updated 2 years ago
- An application to catch, search and analyze HTTP secure headers.☆65Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆107Updated 5 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆105Updated 2 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆135Updated 2 years ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆156Updated 3 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated last year
- Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment☆137Updated 2 years ago
- OWASP Foundation Threat Dragon Project Web Repository☆77Updated this week
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆162Updated 2 weeks ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆69Updated last year
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆55Updated 5 months ago
- An Entropy-Based Link Vulnerability Tool☆61Updated 7 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆101Updated last year
- Container Security Verification Standard☆58Updated 5 years ago
- Some good resources for getting started with application security☆141Updated 3 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆141Updated 5 months ago
- Cloud Security Operations Orchestrator☆184Updated 10 months ago
- ☆20Updated 6 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆155Updated 2 years ago
- DefectDojo Documentation☆16Updated 3 years ago