jeremylong / DependencyCheckLinks
The dependency-check repository has moved:
☆43Updated 4 months ago
Alternatives and similar repositories for DependencyCheck
Users that are interested in DependencyCheck are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable SCA Application☆43Updated last week
- Virtual environment for learning DevSecOps☆39Updated 8 years ago
- Damn Vulnerable C# Application (API)☆79Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- Efficient DevSecOps☆47Updated 7 months ago
- Automatic security vulnerability remediation for your code.☆64Updated this week
- Find CVE PoCs on GitHub☆160Updated 6 months ago
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆41Updated this week
- Monorepo of Labs for the Security Knowledge Framework (SKF)☆42Updated 7 months ago
- Wappalyzer CLI tool to find Web Technologies☆61Updated 2 years ago
- OWASP Code Review Guide Web Repository☆148Updated 3 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆102Updated 2 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Updated 3 months ago
- OWASP Foundation Web Respository☆25Updated last week
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆163Updated 4 years ago
- A source code static analysis platform for AppSec enthusiasts.☆267Updated 2 months ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Updated 2 years ago
- CLI component of OWASP PurpleTeam☆134Updated 2 years ago
- Nuclei documentation☆86Updated 2 years ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆259Updated 4 months ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆51Updated last week
- An Interface for AI built for cybersecurity professionals☆93Updated 11 months ago
- Tool to discover external and internal network attack surface☆203Updated last year
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆119Updated 4 months ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Updated 2 weeks ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆113Updated 11 months ago
- First iteration of ML based Feedback WAF☆59Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆116Updated 2 years ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆76Updated 10 months ago