Ready to use images of Zap and Glue, especially for CI integration.
☆35Mar 12, 2019Updated 7 years ago
Alternatives and similar repositories for owasp-zap-glue-ci-images
Users that are interested in owasp-zap-glue-ci-images are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some sample terraform to launch rancher 2.0 server.☆12Dec 8, 2020Updated 5 years ago
- Ansible Modules to manage Citrix Netscaler devices☆12Dec 20, 2018Updated 7 years ago
- Script to query APIC for faults and summarize corrective actions based on fault documentation on APIC☆10Oct 29, 2014Updated 11 years ago
- Syntax highlighting and snippets for Citrix ADC/NetScaler configuration (ns.conf) files in Visual Studio Code☆11Nov 11, 2022Updated 3 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- KaliGPT is a production-ready, AI-powered penetration testing assistant designed specifically for Kali Linux. It reads and understands te…☆27Dec 11, 2025Updated 3 months ago
- Docker Machine driver for Hypriot☆16May 4, 2016Updated 9 years ago
- Cisco switch configuration generator☆22Aug 15, 2012Updated 13 years ago
- Sample AWS Lambda function to use AWS IoT Device Shadow to switch a connected lightbulb ON or OFF☆14Mar 3, 2016Updated 10 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Azure Templates for NetScaler☆16Mar 3, 2026Updated last month
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Generate mysql table schema to graphql defination☆10Apr 3, 2019Updated 7 years ago
- Kubernetes client-go sample☆10Jun 7, 2020Updated 5 years ago
- Newsletter Sign Up - a .NET Framework app using Docker containers on Windows☆29Oct 26, 2024Updated last year
- Angular Agility form validation that is retrieved from Web API and DTO classes☆12Jul 18, 2016Updated 9 years ago
- Locally run Python 3.5+ Flask based application that provides HTTP POST simulations of Location Scanning, WebHook Alerts and Splash Page …☆11May 1, 2023Updated 2 years ago
- Citrix Developer tools for Visual Studio Code☆14Mar 17, 2023Updated 3 years ago
- Security scan Images with Clair☆27Mar 25, 2021Updated 5 years ago
- Application Security Automation☆527Sep 5, 2023Updated 2 years ago
- Collection of links to Security stuff☆117Jan 23, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆17Mar 23, 2016Updated 10 years ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆19Sep 27, 2020Updated 5 years ago
- Personal repo for random Go stuff☆15Jul 11, 2019Updated 6 years ago
- For the code behind the eyes here https://www.youtube.com/watch?v=K9V43iSXRQA☆17Jul 31, 2025Updated 8 months ago
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆16Mar 26, 2019Updated 7 years ago
- GitHub Action for Copacetic: Directly patch container image vulnerabilities☆32Dec 10, 2025Updated 4 months ago
- Funding requests for project infrastructure, events, and consulting.☆18Oct 2, 2023Updated 2 years ago
- Service Mesh in Action lab for Red Hat Summit 2019☆10Aug 20, 2019Updated 6 years ago
- ☆55Apr 13, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆14Mar 1, 2023Updated 3 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Amazon Echo Integration with Cisco Spark☆18Mar 10, 2016Updated 10 years ago
- Inspect Windows Docker images to check sizes and base layers☆20Jul 26, 2018Updated 7 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Jul 3, 2018Updated 7 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆19Dec 22, 2025Updated 3 months ago