veracode / verademoLinks
A deliberately insecure Java web application
☆43Updated 3 months ago
Alternatives and similar repositories for verademo
Users that are interested in verademo are comparing it to the libraries listed below
Sorting:
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- (aka Kotlin Goat) - an intentionally vulnerable Kotlin application☆36Updated last year
- Damn Vulnerable Java (EE) Application☆144Updated 2 years ago
- An insecure example application (Java)☆33Updated 5 months ago
- ☆34Updated 3 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Externalize Java application access to protected resources as log messages.☆43Updated last week
- IriusRisk Community☆71Updated 2 years ago
- OWASP Foundation Web Respository☆37Updated 3 months ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- Static Token And Credential Scanner☆95Updated 2 years ago
- Python API library for DefectDojo☆43Updated 2 years ago
- A Burp plugin to export findings to DefectDojo☆31Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Sample exploits of common vulnerabilities in Java librarires☆27Updated 2 years ago
- ☆32Updated 2 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆17Updated last year
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆186Updated 5 months ago
- Vulnerable Java based Web Application☆34Updated 6 years ago
- OWASP Benchmark Project Utilities - Provides scorecard generation and crawling tools for Benchmark style test suites.☆19Updated this week
- Vulnerable Python Application To Learn Secure Development☆126Updated last year
- Dependency Combobulator☆95Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- A collection of my Semgrep rules☆51Updated 2 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆97Updated last month
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆43Updated 3 months ago