OWASP / OWASP-Learning-Gateway
OWASP Learning Gateway Project
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for OWASP-Learning-Gateway
- DefectDojo Documentation☆15Updated 3 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆15Updated 7 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated last year
- Repository for OWASP Code Review document☆16Updated 10 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- The OVAL Language Sandbox☆44Updated 3 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 3 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 9 months ago
- Spam Honeypot Tool☆26Updated 8 years ago
- ☆14Updated 4 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆17Updated 10 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆28Updated 9 years ago
- ZAP Management Scripts☆21Updated 2 weeks ago
- OWASP Foundation Web Respository☆27Updated last year
- DPE - Default Password Enumeration☆32Updated 11 years ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆29Updated 6 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated 2 years ago
- ☆15Updated 6 years ago
- OpenISMS is a tool for information security managers. The goal is to create one single tool for the governance of information security. T…☆19Updated 8 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated last year
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆20Updated 7 months ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- OWASP Top Ten☆48Updated 3 years ago
- A curated list of tools for incident response☆27Updated 8 months ago
- Node.js SDK for IBM X-Force Exchange☆13Updated 6 years ago