fortify-ps / FortifyBugTrackerUtilityLinks
Automated submission of FoD and SSC vulnerabilities to external systems
☆24Updated last year
Alternatives and similar repositories for FortifyBugTrackerUtility
Users that are interested in FortifyBugTrackerUtility are comparing it to the libraries listed below
Sorting:
- IriusRisk Community☆65Updated last year
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 2 weeks ago
- ☆32Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Open Security Summit 2019☆26Updated 4 years ago
- Mobile Security testing Framework☆41Updated 6 years ago
- ZAP Management Scripts☆23Updated 2 weeks ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- Python Package for burprestapi☆16Updated 5 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Updated 5 years ago
- An insecure example application (Java)☆33Updated 2 months ago
- A deliberately insecure Java web application☆37Updated 4 months ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- A zero-dependency tool for finding secrets in directories☆10Updated 4 years ago
- ☆34Updated 3 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Python API library for DefectDojo☆42Updated 2 years ago
- Repository to showcase various configuration recipes with various technologies☆36Updated 2 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆15Updated 3 weeks ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 5 years ago
- Burp extension to passively scan for applications revealing software version numbers☆31Updated last year
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- Open Threat Modeling Template☆50Updated 11 months ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Updated 6 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago