cschneider4711 / Marathon
Vulnerable Java Web Application (for demo and education purposes)
☆60Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Marathon
- ☆104Updated 4 months ago
- A secure spring boot based java service providing an API to store and retrieve browser bookmarks☆18Updated 5 months ago
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆62Updated this week
- Hands-On Workshop for OAuth 2.0 and OpenID Connect 1.0☆90Updated 10 months ago
- Cloud-Native Microservice Security Bootcamp☆18Updated 3 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆53Updated 2 months ago
- OWASP Foundation Web Respository☆27Updated 3 months ago
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆129Updated last year
- ☆14Updated 3 years ago
- UI für verschiedene Reifegrad-Dimensionen☆31Updated last year
- Pin designs for security related items☆37Updated 6 months ago
- An extensive glossary of software architecture (and development) terminology. Explains the terms used and referenced in the iSAQB founda…☆37Updated 3 months ago
- Some examples for the architecture testing library ArchUnit. I use these examples in my live coding sessions.☆18Updated last month
- ☆111Updated 5 months ago
- verinice is a tool for managing information security.☆184Updated 10 months ago
- ☆80Updated 3 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆125Updated 3 weeks ago
- Incubating project for decoupling responsibilities from Dependency-Track's monolithic API server into separate, scalable services.☆61Updated this week
- A Java library for calculating CVSSv2 and CVSSv3 scores and vectors☆39Updated 2 weeks ago
- Beispiele für Qualitätsanforderungen an Software (etwa: Zur Vereinfachung von ATAM-Analysen oder Quality-Driven Software Architecture)☆79Updated 10 months ago
- All Labs of the Security for Developers Training☆10Updated last year
- Talk about Linux host security and various code examples☆16Updated last year
- Exposing Keycloak metrics endpoints for Prometheus!☆14Updated 5 years ago
- DefectDojo Community Content☆17Updated last month
- Slides of IT-Security Meetup Kassel☆35Updated last month
- OWASP Foundation Web Respository☆10Updated last year
- Asynchronous data replication and event streaming with plain REST/HTTP.☆47Updated 2 years ago
- ☆18Updated 2 years ago
- Hitchhikers Guide to Docs-as-Code - Code + Infos zur JavaMagazin-Kolumne von R.D. Müller und G.Starke☆55Updated 6 years ago