pumasecurity / puma-preyLinks
Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Core web applications that communicate with web services and data layer applications.
☆22Updated 2 weeks ago
Alternatives and similar repositories for puma-prey
Users that are interested in puma-prey are comparing it to the libraries listed below
Sorting:
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- AWS Security Checks☆39Updated 7 years ago
- A Github Repository Created to compliment a BSides Canberra 2018 talk on SharePoint Security.☆48Updated 7 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last week
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆74Updated 4 years ago
- Burp as a Docker Container☆59Updated 4 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- IriusRisk Community☆66Updated last year
- Amazon bucket brute force tool☆102Updated 12 years ago
- Source for public Cobalt external product documentation☆14Updated last month
- Desktop variant of OWASP Threat Dragon☆77Updated 4 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- Vulnerable Java based Web Application☆31Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- A collection of response templates for invalid bug bounty reports.☆91Updated 7 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆86Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago