OWASP / OWASP-Learning-Gateway
OWASP Learning Gateway Project
☆14Updated last year
Alternatives and similar repositories for OWASP-Learning-Gateway:
Users that are interested in OWASP-Learning-Gateway are comparing it to the libraries listed below
- DefectDojo Documentation☆17Updated 3 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆15Updated 8 years ago
- ☆13Updated 7 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 8 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated last year
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Repository for lab materials for the Advanced Cloud Security and Applied DevSecOps training class.☆11Updated 5 years ago
- OWASP Top Ten☆48Updated 3 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Repository for OWASP Code Review document☆16Updated 10 years ago
- docker image analyzer☆13Updated last week
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Repository for various tools around security☆42Updated 8 months ago
- A deliberately vulnerable Android application to demonstrate exfiltration scenarios☆12Updated 4 years ago
- The OVAL Language Sandbox☆44Updated 4 years ago
- ZAP Admin☆29Updated this week
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- Threat Modeling Manifesto☆28Updated 8 months ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 11 months ago
- ZAP Management Scripts☆23Updated 3 weeks ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 11 months ago
- Checklists☆16Updated 8 years ago
- CISOfy Handbook☆33Updated 8 years ago