veracode / verademoLinks
A deliberately insecure Java web application
☆43Updated 2 months ago
Alternatives and similar repositories for verademo
Users that are interested in verademo are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Java (EE) Application☆144Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆192Updated last year
- (aka Kotlin Goat) - an intentionally vulnerable Kotlin application☆36Updated last year
- Static Token And Credential Scanner☆95Updated 2 years ago
- Vulnerable Python Application To Learn Secure Development☆124Updated last year
- OWASP Foundation Web Respository☆37Updated 3 months ago
- A Burp plugin to export findings to DefectDojo☆29Updated 2 years ago
- Sample exploits of common vulnerabilities in Java librarires☆27Updated 2 years ago
- IriusRisk Community☆70Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- Vulnerable Java based Web Application☆34Updated 6 years ago
- Externalize Java application access to protected resources as log messages.☆43Updated 2 months ago
- An insecure example application (Java)☆33Updated 4 months ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- ☆34Updated 3 years ago
- A collection of my Semgrep rules☆50Updated 2 years ago
- ☆32Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- ☆36Updated 5 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Python API library for DefectDojo☆43Updated 2 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Updated 2 years ago
- Repository to showcase various configuration recipes with various technologies☆37Updated 3 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆109Updated 6 years ago
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Automate security tests using Burp Suite.☆233Updated last year