pumasecurity / puma-preyLinks
Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Core web applications that communicate with web services and data layer applications.
☆21Updated 2 months ago
Alternatives and similar repositories for puma-prey
Users that are interested in puma-prey are comparing it to the libraries listed below
Sorting:
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- ☆21Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- ☆51Updated 3 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- AWS Security Checks☆40Updated 7 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆28Updated 5 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆64Updated 2 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- Vulnerable Task Manager☆20Updated 9 months ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- A Github Repository Created to compliment a BSides Canberra 2018 talk on SharePoint Security.☆48Updated 7 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 3 months ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆173Updated 6 years ago
- ZAP Management Scripts☆23Updated last month
- IriusRisk Community☆67Updated 2 years ago
- ☆32Updated 2 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆77Updated 5 years ago
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆31Updated 2 years ago
- CVSS (Common Vulnerability Scoring System) Calculator CVSSv3.1☆54Updated 5 years ago