fortify / ssc-js-sandboxLinks
Fortify Software Security JavaScript sandbox
☆11Updated 2 years ago
Alternatives and similar repositories for ssc-js-sandbox
Users that are interested in ssc-js-sandbox are comparing it to the libraries listed below
Sorting:
- ☆35Updated 4 years ago
- materials we hand out☆148Updated 4 months ago
- ☆124Updated 2 years ago
- The ZAP Heads Up Display (HUD)☆271Updated 3 weeks ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆299Updated last week
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆174Updated 6 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated last year
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated last week
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆735Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆111Updated last year
- ☆259Updated last year
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆260Updated 3 months ago
- ☆421Updated 2 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Updated 4 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Updated 2 years ago
- OWASP Foundation Web Respository☆100Updated this week
- A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets☆395Updated last year
- ☆192Updated 2 years ago
- This is a companion to the Security Engineer Questions☆206Updated last year
- Websec interview questions by tib3rius answered☆309Updated 2 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆304Updated 3 months ago
- This repository contains information about DevSecOps and how to get involved in this community effort.☆149Updated 6 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆164Updated 2 years ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.☆111Updated 10 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆417Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆349Updated 5 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆77Updated last year
- Serverless Functions for establishing Reverse Shells to Lambda, Azure Functions, and Google Cloud Functions☆251Updated 4 months ago