rstatsinger / contrast-java-webgoat-docker
Contrast Security Instrumentation for Dockerized Webgoat, with lab instructions.
☆26Updated 2 years ago
Alternatives and similar repositories for contrast-java-webgoat-docker:
Users that are interested in contrast-java-webgoat-docker are comparing it to the libraries listed below
- A very vulnerable implementation of a GraphQL API.☆15Updated 2 months ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Updated 6 years ago
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆41Updated 8 months ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- ☆13Updated 10 months ago
- Hands-on Security Automation in DevOps, published by Packt☆49Updated 2 years ago
- DevSecOps Toolchain☆110Updated 7 years ago
- Checkmarx Scan and Result Orchestration☆91Updated this week
- Labs for Threat Modelling training delivered by ControlPlane☆30Updated 9 months ago
- Exports vulnerability scan data from the Checkmarx SAST platform for use in analytical tools.☆19Updated 3 months ago
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- Jekyll Files for cloudsecwiki.com☆51Updated 3 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 8 months ago
- OWASP Foundation Web Respository☆10Updated last year
- ☆20Updated 6 years ago
- OWASP Foundation Web Respository☆14Updated this week
- ☆58Updated last month
- Software Component Verification Standard (SCVS)☆140Updated 10 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated last week
- book website☆67Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 9 months ago
- OWASP Foundation Web Respository☆34Updated 5 months ago
- a tool to audit the istio service mesh☆174Updated 3 years ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆99Updated 2 months ago
- OWASP Foundation Web Respository☆54Updated last year
- Externalize Java application access to protected resources as log messages.☆40Updated 9 months ago
- A zero-dependency tool for finding secrets in directories☆10Updated 4 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆93Updated 4 years ago
- ☆37Updated last year
- Learn Kubernetes Security, published by Packt☆45Updated 2 years ago