kaakaww / javaspringvulny
javaspringvulny - a Spring Boot web application built wrong on purpose
☆19Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for javaspringvulny
- ZAP Management Scripts☆21Updated this week
- A Security Scanner for Go☆26Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated last year
- ☆20Updated 6 years ago
- Kubernetes Pwnage for all☆54Updated 3 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- Maturity Model Collaborative project☆13Updated last year
- Dockerfile Security Checker using OPA Rego policies with Conftest☆59Updated 2 years ago
- ☆27Updated last week
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- ☆74Updated 4 years ago
- ☆14Updated last year
- ☆14Updated last year
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated last year
- AWS Security Checks☆36Updated 6 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- OWASP Foundation Web Respository☆33Updated 2 months ago
- ☆22Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆97Updated 9 months ago
- ☆36Updated 3 years ago
- Provides a suite of Burp extensions and a maven plugin to automate security tests using BurpSuite.☆25Updated 6 years ago
- ☆58Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆21Updated 4 months ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago