jeremylong / DependencyCheckLinks
The dependency-check repository has moved:
☆36Updated last month
Alternatives and similar repositories for DependencyCheck
Users that are interested in DependencyCheck are comparing it to the libraries listed below
Sorting:
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆49Updated 4 months ago
- A fast and comprehensive tool for organizational network scanning☆135Updated last year
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆33Updated this week
- Damn Vulnerable C# Application (API)☆77Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated last year
- Wappalyzer CLI tool to find Web Technologies☆61Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- ☆63Updated 5 months ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆59Updated last year
- 📙 User documentation for Caido☆33Updated last week
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆163Updated 3 weeks ago
- Virtual environment for learning DevSecOps☆38Updated 8 years ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆257Updated 2 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- ☆28Updated last year
- Damn Vulnerable SCA Application☆42Updated last month
- ☆85Updated 2 years ago
- Red Team tools, infrastructure, and hardware weaponized☆109Updated last month
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated 2 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆67Updated 7 months ago
- Archive of Potential Insider Threats☆152Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- Secrets scanner that understands code☆160Updated 3 weeks ago
- Efficient DevSecOps☆47Updated 4 months ago
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆42Updated last week
- Collection of offensive tools targeting Microsoft Azure☆214Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆111Updated 2 years ago
- ☆56Updated last year
- Burp Suite extension for testing Passkey systems.☆75Updated 7 months ago