pumasecurity / puma-preyLinks
Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Core web applications that communicate with web services and data layer applications.
☆21Updated 2 months ago
Alternatives and similar repositories for puma-prey
Users that are interested in puma-prey are comparing it to the libraries listed below
Sorting:
- A Burp plugin to export findings to DefectDojo☆30Updated 2 years ago
- AWS Security Checks☆40Updated 7 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 4 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆107Updated last year
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆65Updated 2 years ago
- Collection of links to Security stuff☆117Updated 2 months ago
- ☆21Updated 7 years ago
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- Vulnerable Task Manager☆20Updated 10 months ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 3 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- IriusRisk Community☆67Updated 2 years ago
- DefectDojo Documentation☆17Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆28Updated 5 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- Security conferences talks☆25Updated 5 years ago
- ☆51Updated 3 years ago
- Python API library for DefectDojo☆43Updated 2 years ago
- An AWS Lambda vulnerable application written in flask.☆50Updated 8 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago