cschneider4711 / MarathonLinks
Vulnerable Java Web Application (for demo and education purposes)
☆66Updated 6 months ago
Alternatives and similar repositories for Marathon
Users that are interested in Marathon are comparing it to the libraries listed below
Sorting:
- Keycloak Configuration Auditor☆85Updated this week
- ☆113Updated last year
- Hands-On Workshop for OAuth 2.0 and OpenID Connect 1.0☆91Updated 2 years ago
- Integrates Xanitizer results into SonarQube☆21Updated 4 years ago
- ☆120Updated 8 months ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆157Updated last month
- Slides and Demos for "Secure Development on Kubernetes" talk☆22Updated last year
- scripts which help harden containers☆32Updated 3 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated this week
- Cloud-Native Microservice Security Bootcamp☆20Updated 4 years ago
- Exposing Keycloak metrics endpoints for Prometheus!☆15Updated 6 years ago
- A secure spring boot based java service providing an API to store and retrieve browser bookmarks☆18Updated last month
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆81Updated last month
- OWASP Foundation Web Respository☆18Updated 2 weeks ago
- Software Component Verification Standard (SCVS)☆153Updated 9 months ago
- Pin designs for security related items☆37Updated last year
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆43Updated 3 months ago
- Github action to run dependency check☆93Updated 3 weeks ago
- An Awesome List of Log4Shell resources to help you stay informed and secure! 🔒☆234Updated 3 years ago
- Computer Aided Integration of Requirements and Information Security - Server☆167Updated last week
- A curated list of security tools for Hackers & Builders!☆98Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆163Updated 2 years ago
- Integrates OWASP Zed Attack Proxy reports into SonarQube☆73Updated 5 months ago
- Log4Shell CVE-2021-44228 mitigation tester☆16Updated 4 years ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆305Updated this week
- Keycloak security scanner☆59Updated last year
- OWASP Foundation Threat Dragon Project Web Repository☆86Updated last week
- The Elevation of Privilege Threat Modeling Game☆337Updated last year
- Offensive Terraform Website☆45Updated 5 years ago
- An extensive glossary of software architecture (and development) terminology. Explains the terms used and referenced in the iSAQB founda…☆39Updated 2 weeks ago