cschneider4711 / MarathonLinks
Vulnerable Java Web Application (for demo and education purposes)
☆62Updated 4 months ago
Alternatives and similar repositories for Marathon
Users that are interested in Marathon are comparing it to the libraries listed below
Sorting:
- Slides of IT-Security Meetup Kassel☆36Updated 7 months ago
- ☆107Updated 11 months ago
- OWASP Foundation Web Respository☆18Updated this week
- Asciidoc template for advanced level curricula☆12Updated last week
- Informatik als Beruf FAQ☆52Updated 5 years ago
- Code Samples to my talk "Testing and Infrastructure" / "Testen von und mit Infrastruktur"☆26Updated 2 years ago
- Asynchronous data replication and event streaming with plain REST/HTTP.☆47Updated 3 years ago
- Slides and Demos for "Secure Development on Kubernetes" talk☆22Updated 6 months ago
- Hitchhikers Guide to Docs-as-Code - Code + Infos zur JavaMagazin-Kolumne von R.D. Müller und G.Starke☆56Updated 6 years ago
- ISA Principles Web Site☆51Updated 5 months ago
- Hands-On Workshop for OAuth 2.0 and OpenID Connect 1.0☆90Updated last year
- DefectDojo Community Content☆18Updated 7 months ago
- Exposing Keycloak metrics endpoints for Prometheus!☆15Updated 5 years ago
- Quality requirements and goals for software and system architectures☆28Updated this week
- Beispiele für Qualitätsanforderungen an Software (etwa: Zur Vereinfachung von ATAM-Analysen oder Quality-Driven Software Architecture)☆82Updated last year
- Keycloak Configuration Auditor☆29Updated this week
- German translation of the Microsoft Elevation of Privilege card game along with notes and examples☆10Updated 9 years ago
- Agile Load Testing☆11Updated 3 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆139Updated 2 weeks ago
- Java by Comparison Kata☆37Updated 7 months ago
- An extensive glossary of software architecture (and development) terminology. Explains the terms used and referenced in the iSAQB founda…☆38Updated 3 months ago
- Talk about Linux host security and various code examples☆16Updated last year
- Cloud-Native Microservice Security Bootcamp☆20Updated 3 years ago
- ☆14Updated 4 years ago
- OWASP Threat Dragon core files☆28Updated 4 years ago
- A brief overview of architecture and design patterns☆21Updated last year
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆22Updated last week
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆41Updated 11 months ago
- Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive d…☆137Updated this week
- Standalone (batch- and command-line) and Gradle-plugin html sanity checker - detects missing images, dead links and cross-references, dup…☆74Updated last month