cschneider4711 / Marathon
Vulnerable Java Web Application (for demo and education purposes)
☆60Updated 2 months ago
Alternatives and similar repositories for Marathon:
Users that are interested in Marathon are comparing it to the libraries listed below
- ☆106Updated 9 months ago
- Hitchhikers Guide to Docs-as-Code - Code + Infos zur JavaMagazin-Kolumne von R.D. Müller und G.Starke☆56Updated 6 years ago
- Quality requirements and goals for software and system architectures☆26Updated last month
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆68Updated this week
- Exposing Keycloak metrics endpoints for Prometheus!☆15Updated 5 years ago
- A set of rules to build consistent and high quality REST and Async APIs at OTTO.☆47Updated last week
- Slides of IT-Security Meetup Kassel☆36Updated 5 months ago
- Hands-On Workshop for OAuth 2.0 and OpenID Connect 1.0☆90Updated last year
- ISA Principles Web Site☆51Updated 3 months ago
- An extensive glossary of software architecture (and development) terminology. Explains the terms used and referenced in the iSAQB founda…☆37Updated last month
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆136Updated last month
- ☆14Updated 3 years ago
- A secure spring boot based java service providing an API to store and retrieve browser bookmarks☆18Updated 9 months ago
- Tool and documentation for systematically using Technical Debt Records☆31Updated 4 months ago
- The companion site to the cards42 project - The activity cards for software architects☆25Updated 9 months ago
- Pin designs for security related items☆37Updated 10 months ago
- A brief overview of architecture and design patterns☆20Updated last year
- Asynchronous data replication and event streaming with plain REST/HTTP.☆47Updated 3 years ago
- Java by Comparison Kata☆37Updated 5 months ago
- UI für verschiedene Reifegrad-Dimensionen☆31Updated 2 years ago
- Deutsche Übersetzung der DDD Referenz von Eric Evans☆69Updated 4 years ago
- Keycloak Configuration Auditor☆22Updated this week
- Internet-Radio mit Pi Zero☆24Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated last month
- Beispiele für Qualitätsanforderungen an Software (etwa: Zur Vereinfachung von ATAM-Analysen oder Quality-Driven Software Architecture)☆82Updated last year
- Cumulus. Threat modeling the Clouds.☆17Updated 6 months ago
- DefectDojo Community Content☆17Updated 5 months ago
- Dokumentation zu Fehlern im Fachsystem Luca (und der LucaApp)☆33Updated 3 years ago
- Asciidoc template for advanced level curricula☆11Updated 3 weeks ago
- Interactive tutorials for introducing new people to the world of Software Analytics with Jupyter, Python, pandas and Co.☆16Updated 3 years ago