OWASP / www-project-automated-threats-to-web-applicationsView external linksLinks
OWASP Foundation Web Respository
☆74Dec 22, 2025Updated last month
Alternatives and similar repositories for www-project-automated-threats-to-web-applications
Users that are interested in www-project-automated-threats-to-web-applications are comparing it to the libraries listed below
Sorting:
- OWASP Kubernetes Security Testing Guide☆41Dec 22, 2025Updated last month
- OWASP Foundation Web Respository☆42Oct 8, 2025Updated 4 months ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 2 years ago
- Raf Scanner IDE☆12Apr 14, 2023Updated 2 years ago
- The setup instructions and exercises for the workshop.☆15Mar 5, 2019Updated 6 years ago
- ☆13Feb 18, 2023Updated 3 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 7 months ago
- Ultimate Benchmark for Container Image Scanners☆13Oct 16, 2020Updated 5 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆16Jun 1, 2022Updated 3 years ago
- Enable discrete SSH Agents to avoid leaking access across hosts☆20Dec 17, 2020Updated 5 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- This application is an simple ETL in rust that can be used as a connector between systems☆22Feb 3, 2026Updated 2 weeks ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆52Nov 24, 2025Updated 2 months ago
- Simple log generation and process resource monitor used to benchmark log agents☆19Jul 28, 2020Updated 5 years ago
- Internet Draft: OAuth 2.0 Demonstration of Proof-of-Possession at the Application-layer☆21Apr 13, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆164Jan 26, 2026Updated 3 weeks ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Aug 8, 2020Updated 5 years ago
- ☆11Sep 14, 2022Updated 3 years ago
- The Github Actions - AWS CDK Lambda Monorepo Starter is a comprehensive template designed for efficiently building and deploying multiple…☆11Dec 22, 2023Updated 2 years ago
- key-value in-memory database server☆13Jan 20, 2023Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Jun 25, 2025Updated 7 months ago
- Tool for creating, modifying and validating CycloneDX SBOMs.☆28Feb 9, 2026Updated last week
- Kotlin Secure Coding Practices is a guide written for anyone using Kotlin for mobile development.☆33Feb 14, 2022Updated 4 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆82Dec 22, 2025Updated last month
- ☆11Jun 12, 2023Updated 2 years ago
- ☆11Jul 18, 2023Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33May 18, 2022Updated 3 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Dec 14, 2025Updated 2 months ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Aug 26, 2018Updated 7 years ago
- Kubernetes API event watcher☆33Mar 31, 2023Updated 2 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Jun 16, 2023Updated 2 years ago
- Documentation for the private preview of Project Yellowstone (Built-in Power BI reports for Dynamics 365 Business Central)☆13Apr 22, 2025Updated 9 months ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆37Dec 15, 2022Updated 3 years ago
- Skeleton for a Quarkus app that exposes as REST endpoint, compiles as a GraalVM native image (arm64), deploys to AWS Lambda and exposes t…☆14Oct 6, 2025Updated 4 months ago
- Niagara weather module for Open Weather Map provider☆15Jan 12, 2020Updated 6 years ago