cschneider4711 / Marathon
Vulnerable Java Web Application (for demo and education purposes)
☆60Updated last month
Alternatives and similar repositories for Marathon:
Users that are interested in Marathon are comparing it to the libraries listed below
- ☆106Updated 7 months ago
- ☆14Updated 3 years ago
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆65Updated this week
- 🥋 Framework for continuously improving the IT-Security of your teams through gamification and self-assessment.☆81Updated 2 years ago
- Keycloak Configuration Auditor☆18Updated this week
- A secure spring boot based java service providing an API to store and retrieve browser bookmarks☆18Updated 8 months ago
- verinice is a tool for managing information security.☆189Updated last month
- German translation of the Microsoft Elevation of Privilege card game along with notes and examples☆10Updated 9 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆136Updated this week
- Pin designs for security related items☆37Updated 9 months ago
- Code Samples to my talk "Testing and Infrastructure" / "Testen von und mit Infrastruktur"☆26Updated 2 years ago
- ☆82Updated 3 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- Agile Load Testing☆11Updated 3 years ago
- Cloud-Native Microservice Security Bootcamp☆20Updated 3 years ago
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆41Updated 8 months ago
- Asynchronous data replication and event streaming with plain REST/HTTP.☆47Updated 3 years ago
- The Open Application Standard Platform for Java☆60Updated 3 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated this week
- Slides and Demos for "Secure Development on Kubernetes" talk☆22Updated 3 months ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- Java by Comparison Kata☆37Updated 4 months ago
- Slides of IT-Security Meetup Kassel☆36Updated 4 months ago
- Quality requirements and goals for software and system architectures☆26Updated 3 weeks ago
- Beispiele für Qualitätsanforderungen an Software (etwa: Zur Vereinfachung von ATAM-Analysen oder Quality-Driven Software Architecture)☆82Updated last year
- ☆38Updated last month
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆75Updated this week
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆131Updated last year
- Informatik als Beruf FAQ☆52Updated 5 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated 2 years ago