franksec42 / Vulnerability-management-maturity
Maturity Model Collaborative project
☆14Updated last year
Alternatives and similar repositories for Vulnerability-management-maturity:
Users that are interested in Vulnerability-management-maturity are comparing it to the libraries listed below
- AWS Security Checks☆36Updated 7 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆22Updated 3 years ago
- ☆18Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 2 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Jast (Just Another Screenshot Tool)☆9Updated 5 years ago
- ☆14Updated last year
- ☆28Updated 8 years ago
- ☆10Updated 2 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Updated 2 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- Python script to check GitHub accounts for world-editable wiki pages☆21Updated last year
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- ☆21Updated last year
- ☆10Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Scripts and tools for AWS Pentest☆51Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 2 months ago
- ☆27Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago