cschneider4711 / MarathonLinks
Vulnerable Java Web Application (for demo and education purposes)
☆63Updated 2 months ago
Alternatives and similar repositories for Marathon
Users that are interested in Marathon are comparing it to the libraries listed below
Sorting:
- Hands-On Workshop for OAuth 2.0 and OpenID Connect 1.0☆92Updated last year
- ☆118Updated 4 months ago
- The SonarQube plugin for jQAssistant☆12Updated 2 weeks ago
- Keycloak Configuration Auditor☆53Updated last week
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆146Updated last month
- Cloud-Native Microservice Security Bootcamp☆20Updated 4 years ago
- ☆110Updated last year
- A secure spring boot based java service providing an API to store and retrieve browser bookmarks☆19Updated last year
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆43Updated last year
- An extensive glossary of software architecture (and development) terminology. Explains the terms used and referenced in the iSAQB founda…☆39Updated 6 months ago
- Exposing Keycloak metrics endpoints for Prometheus!☆15Updated 6 years ago
- Slides and Demos for "Secure Development on Kubernetes" talk☆22Updated 9 months ago
- creates CycloneDX Software-Bill-of-Materials (SBOM) from node-based projects☆133Updated 2 weeks ago
- Integrates Xanitizer results into SonarQube☆21Updated 4 years ago
- UI für verschiedene Reifegrad-Dimensionen☆32Updated 2 years ago
- A cli that can be used to query various online vulnerability sources such as the NVD or GHSA. The CLI and docker images can be used to mi…☆147Updated 2 weeks ago
- Software Component Verification Standard (SCVS)☆149Updated 5 months ago
- Container Security Verification Standard☆58Updated 6 years ago
- A light-weight app to audit and inventory large codebases for open source license compliance.☆66Updated last week
- Integrates OWASP Zed Attack Proxy reports into SonarQube☆72Updated last month
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago
- An Awesome List of Log4Shell resources to help you stay informed and secure! 🔒☆232Updated 3 years ago
- ☆21Updated 6 years ago
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆76Updated last week
- Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive d…☆144Updated last week
- Maven plugin that integrates with a Dependency Track server to submit dependency manifests and optionally fail execution when vulnerable …☆71Updated last month
- OWASP Foundation Threat Dragon Project Web Repository☆82Updated this week
- A multi-dimensional docker build generator☆63Updated last month
- verinice is a tool for managing information security.☆204Updated 7 months ago
- A Java library for calculating CVSSv2 and CVSSv3 scores and vectors☆47Updated 8 months ago