kaakaww / javaspringvulnyLinks
javaspringvulny - a Spring Boot web application built wrong on purpose
☆22Updated last week
Alternatives and similar repositories for javaspringvulny
Users that are interested in javaspringvulny are comparing it to the libraries listed below
Sorting:
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- ZAP Management Scripts☆23Updated last month
- ☆68Updated 3 months ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆77Updated 5 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Updated 6 years ago
- ☆124Updated last year
- Kubernetes Pwnage for all☆56Updated 4 years ago
- OWASP Foundation Web Respository☆37Updated 3 weeks ago
- ☆27Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆77Updated last year
- ☆10Updated 3 years ago
- ☆74Updated 5 years ago
- ☆21Updated 7 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆28Updated 4 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆86Updated 2 years ago
- OWASP Kubernetes Security Testing Guide☆38Updated this week
- ☆57Updated 5 years ago
- Security scanning & static analysis tool☆93Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆32Updated 5 months ago
- Externalize Java application access to protected resources as log messages.☆43Updated last week
- ☆51Updated 5 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆15Updated 5 years ago
- A Security Scanner for Go☆26Updated 6 years ago