{"id":4556,"date":"2019-04-11T12:51:45","date_gmt":"2019-04-11T07:21:45","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=4556"},"modified":"2019-04-11T12:51:45","modified_gmt":"2019-04-11T07:21:45","slug":"defectdojo","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/defectdojo\/","title":{"rendered":"Django DefectDojo : Open-Source Application Vulnerability Correlation &#038; Security Orchestration Tool"},"content":{"rendered":"\n<p>DefectDojo is a security program and vulnerability management tool. It allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers. Consolidate your findings into one source of truth with the tool.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Demo<\/strong><\/p>\n\n\n\n<p>Try out it in our <a href=\"https:\/\/defectdojo.herokuapp.com\/\">testing environment<\/a> with the following credentials.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>admin \/ defectdojo@demo#appsec<\/li><li>product_manager \/ defectdojo@demo#product<\/li><\/ul>\n\n\n\n<p><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/chaos-poc\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"CHAOS : PoC that Allow Generate Payloads &amp; Control Remote OS (opens in a new tab)\">CHAOS : PoC that Allow Generate Payloads &amp; Control Remote OS<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo#quick-start\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Quick Start<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>git clone https:\/\/github.com\/DefectDojo\/django-DefectDojo <br>cd django-DefectDojo <br>docker-compose up<\/strong><\/p>\n\n\n\n<p>Navigate to <a href=\"http:\/\/localhost:8080\">http:\/\/localhost:8080<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo#documentation\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Documentation<\/strong><\/p>\n\n\n\n<p>For detailed documentation you can visit\n<a href=\"https:\/\/defectdojo.readthedocs.io\/\">Read the Docs<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo#installation-options\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation Options<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo\/blob\/master\/KUBERNETES.md\">Kubernetes<\/a><\/li><li><a href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo\/blob\/master\/DOCKER.md\">Docker<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo#getting-started\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Getting Started<\/strong><\/p>\n\n\n\n<p>We recommend checking out the <a href=\"https:\/\/defectdojo.readthedocs.io\/en\/latest\/about.html\">about<\/a> document to learn the terminology of the tool and the <a href=\"https:\/\/defectdojo.readthedocs.io\/en\/latest\/getting-started.html\">getting started guide<\/a> for setting up a new installation. <\/p>\n\n\n\n<p>We&#8217;ve also created some example <a href=\"https:\/\/defectdojo.readthedocs.io\/en\/latest\/workflows.html\">workflows<\/a> that should give you an idea of how to use it for your own team.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Client APIs<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Install the DefectDojo Python API via <code><strong>pip install defectdojo_api<\/strong><\/code> or clone the <a href=\"https:\/\/github.com\/aaronweaver\/defectdojo_api\">repository<\/a>.<\/li><li>Browse the API on <a href=\"https:\/\/app.swaggerhub.com\/apis\/DefectDojo\/defect-dojo_api_v_2\/1.0.0\">SwaggerHub<\/a>.<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Available Plugins<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/github.com\/grendel513\/defectDojo-engagement-survey\">Engagement Surveys<\/a> \u2013 A plugin that adds answerable surveys to engagements.<\/li><li><a href=\"https:\/\/django-auth-ldap.readthedocs.io\/en\/latest\/\">LDAP Integration<\/a><\/li><li><a href=\"https:\/\/pypi.python.org\/pypi\/djangosaml2\/\">SAML Integration<\/a><\/li><li><a href=\"https:\/\/django-mfa.readthedocs.io\/en\/latest\/\">Multi-Factor Auth<\/a><\/li><\/ul>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>DefectDojo is a security program and vulnerability management tool. It allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers. Consolidate your findings into one source of truth with the tool. Demo Try out it in our testing environment with the following [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[799,875,3017,3562],"class_list":["post-4556","post","type-post","status-publish","format-standard","hentry","category-kali","tag-defectdojo","tag-django","tag-security-orchestration","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DefectDojo : Vulnerability Correlation &amp; Security Orchestration Tool<\/title>\n<meta name=\"description\" content=\"DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/defectdojo\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DefectDojo : Vulnerability Correlation &amp; Security Orchestration Tool\" \/>\n<meta property=\"og:description\" content=\"DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/defectdojo\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-11T07:21:45+00:00\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/defectdojo\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/defectdojo\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Django DefectDojo : Open-Source Application Vulnerability Correlation &#038; Security Orchestration Tool\",\"datePublished\":\"2019-04-11T07:21:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/defectdojo\/\"},\"wordCount\":203,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"keywords\":[\"DefectDojo\",\"Django\",\"Security Orchestration\",\"vulnerability\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/defectdojo\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/defectdojo\/\",\"name\":\"DefectDojo : Vulnerability Correlation & Security Orchestration Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"datePublished\":\"2019-04-11T07:21:45+00:00\",\"description\":\"DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/defectdojo\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DefectDojo : Vulnerability Correlation & Security Orchestration Tool","description":"DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/defectdojo\/","og_locale":"en_US","og_type":"article","og_title":"DefectDojo : Vulnerability Correlation & Security Orchestration Tool","og_description":"DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program","og_url":"https:\/\/kalilinuxtutorials.com\/defectdojo\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-04-11T07:21:45+00:00","author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/defectdojo\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/defectdojo\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Django DefectDojo : Open-Source Application Vulnerability Correlation &#038; Security Orchestration Tool","datePublished":"2019-04-11T07:21:45+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/defectdojo\/"},"wordCount":203,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"keywords":["DefectDojo","Django","Security Orchestration","vulnerability"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/defectdojo\/","url":"https:\/\/kalilinuxtutorials.com\/defectdojo\/","name":"DefectDojo : Vulnerability Correlation & Security Orchestration Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"datePublished":"2019-04-11T07:21:45+00:00","description":"DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/defectdojo\/"]}]},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4618,"url":"https:\/\/kalilinuxtutorials.com\/xsstrike-xss-scanner\/","url_meta":{"origin":4556,"position":0},"title":"XSStrike : Most Advanced XSS Scanner","author":"R K","date":"April 15, 2019","format":false,"excerpt":"XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler. Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":20284,"url":"https:\/\/kalilinuxtutorials.com\/petereport\/","url_meta":{"origin":4556,"position":1},"title":"PeTeReport : An Open-Source Application Vulnerability Reporting Tool","author":"R K","date":"November 19, 2021","format":false,"excerpt":"PeTeReport (PenTest\u00a0Report) is an open-source application vulnerability reporting tool designed to assist pentesting\/redteaming efforts, by simplifying the task of writing and generation of reports. Focused in product security, the tool help security researchers and pentesters to provide detailed findings, appendix, attack paths and manage a finding template database to avoid\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiX7XYpq7XW71N77I2H73ZRC7eJ_40CRrRsn9MZxk4ot3THI93gcrbZwmUaWllysd4s-J37B18Rxom66KWUkguto0L1IshZZODin-NvOnpepO6wRp7_YSAM3r_iqCgYJ3vyVwZZAuRcUkWECJa6v4qnevODneBu4fbtDdu2h9WEB7kZChEauERCV7Ah=s1002","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiX7XYpq7XW71N77I2H73ZRC7eJ_40CRrRsn9MZxk4ot3THI93gcrbZwmUaWllysd4s-J37B18Rxom66KWUkguto0L1IshZZODin-NvOnpepO6wRp7_YSAM3r_iqCgYJ3vyVwZZAuRcUkWECJa6v4qnevODneBu4fbtDdu2h9WEB7kZChEauERCV7Ah=s1002 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiX7XYpq7XW71N77I2H73ZRC7eJ_40CRrRsn9MZxk4ot3THI93gcrbZwmUaWllysd4s-J37B18Rxom66KWUkguto0L1IshZZODin-NvOnpepO6wRp7_YSAM3r_iqCgYJ3vyVwZZAuRcUkWECJa6v4qnevODneBu4fbtDdu2h9WEB7kZChEauERCV7Ah=s1002 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiX7XYpq7XW71N77I2H73ZRC7eJ_40CRrRsn9MZxk4ot3THI93gcrbZwmUaWllysd4s-J37B18Rxom66KWUkguto0L1IshZZODin-NvOnpepO6wRp7_YSAM3r_iqCgYJ3vyVwZZAuRcUkWECJa6v4qnevODneBu4fbtDdu2h9WEB7kZChEauERCV7Ah=s1002 2x"},"classes":[]},{"id":28359,"url":"https:\/\/kalilinuxtutorials.com\/aptrs\/","url_meta":{"origin":4556,"position":2},"title":"APTRS : Automated Penetration Testing Reporting System","author":"R K","date":"February 16, 2023","format":false,"excerpt":"APTRS (Automated Penetration Testing Reporting System) is an automated reporting tool in Python and Django. The tool allows Penetration testers to create a report directly without using the Traditional Docx file. It also provides an approach to keeping track of the projects and vulnerabilities. Read Documentation here. Prerequisites Python 3.8\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGYW-wZe4ge2MSJqpBi5xUOWLnWYrCtr7HlVaYoHNnSNVw_62WKR8auASHIFtZODnEXR9Dy1RNx9hhINE8eSPGz8SMFW72e1uIgWMz7Yi_vKazOnBOXH2W7-F-DH67SzAoGIVUhEwNfMVnWaegD9sf5lE8ubVMen28QQLa2-HTUMb4COdQg0JDzX_O\/s728\/artps.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGYW-wZe4ge2MSJqpBi5xUOWLnWYrCtr7HlVaYoHNnSNVw_62WKR8auASHIFtZODnEXR9Dy1RNx9hhINE8eSPGz8SMFW72e1uIgWMz7Yi_vKazOnBOXH2W7-F-DH67SzAoGIVUhEwNfMVnWaegD9sf5lE8ubVMen28QQLa2-HTUMb4COdQg0JDzX_O\/s728\/artps.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGYW-wZe4ge2MSJqpBi5xUOWLnWYrCtr7HlVaYoHNnSNVw_62WKR8auASHIFtZODnEXR9Dy1RNx9hhINE8eSPGz8SMFW72e1uIgWMz7Yi_vKazOnBOXH2W7-F-DH67SzAoGIVUhEwNfMVnWaegD9sf5lE8ubVMen28QQLa2-HTUMb4COdQg0JDzX_O\/s728\/artps.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGYW-wZe4ge2MSJqpBi5xUOWLnWYrCtr7HlVaYoHNnSNVw_62WKR8auASHIFtZODnEXR9Dy1RNx9hhINE8eSPGz8SMFW72e1uIgWMz7Yi_vKazOnBOXH2W7-F-DH67SzAoGIVUhEwNfMVnWaegD9sf5lE8ubVMen28QQLa2-HTUMb4COdQg0JDzX_O\/s728\/artps.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5336,"url":"https:\/\/kalilinuxtutorials.com\/yaazhini-vulnerability-scanner\/","url_meta":{"origin":4556,"position":3},"title":"Yaazhini &#8211; Free Android APK &#038; API Vulnerability Scanner","author":"R K","date":"June 14, 2019","format":false,"excerpt":"Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of android application and find the vulnerabilities. It includes vulnerability scan of API, the vulnerability of APK and reporting section to generate a report. System\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/t87zk2M-keg\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":25515,"url":"https:\/\/kalilinuxtutorials.com\/bwasp\/","url_meta":{"origin":4556,"position":4},"title":"BWASP : BoB Web Application Security Project","author":"R K","date":"June 24, 2022","format":false,"excerpt":"BWASP is\u00a0BoB Web Application Security Project (BWASP) is an open-source, analysis tool to support for Web Vulnerability Manual Analysis hackers. The BWASP tool basically provides predicted information through vulnerability analysis without proceeding with an attack. BWASP supports performing automated analysis and manual analysis. The BWASP Project supports: Find Attack vector\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi3y16Ir4UHi_cBpSY73vcgkJYml24KPwvC4rxuCnnA2ljnZiUJxh7MDUTQCIdzkOqUQjNwIM_ZAzWh6QG4r2YlNoPo7GXkIM2zhPxJ4uCNr8Khfm19-eYYZtIi73Iy9PbMnR6i59rCdrVxmZvvsMi0E1QaLQnIam19kR0ynAUO3RsyR3j7RZykdGXl\/s728\/BWASP-BoB-Web-Application-Security-Project-1280x720%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi3y16Ir4UHi_cBpSY73vcgkJYml24KPwvC4rxuCnnA2ljnZiUJxh7MDUTQCIdzkOqUQjNwIM_ZAzWh6QG4r2YlNoPo7GXkIM2zhPxJ4uCNr8Khfm19-eYYZtIi73Iy9PbMnR6i59rCdrVxmZvvsMi0E1QaLQnIam19kR0ynAUO3RsyR3j7RZykdGXl\/s728\/BWASP-BoB-Web-Application-Security-Project-1280x720%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi3y16Ir4UHi_cBpSY73vcgkJYml24KPwvC4rxuCnnA2ljnZiUJxh7MDUTQCIdzkOqUQjNwIM_ZAzWh6QG4r2YlNoPo7GXkIM2zhPxJ4uCNr8Khfm19-eYYZtIi73Iy9PbMnR6i59rCdrVxmZvvsMi0E1QaLQnIam19kR0ynAUO3RsyR3j7RZykdGXl\/s728\/BWASP-BoB-Web-Application-Security-Project-1280x720%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi3y16Ir4UHi_cBpSY73vcgkJYml24KPwvC4rxuCnnA2ljnZiUJxh7MDUTQCIdzkOqUQjNwIM_ZAzWh6QG4r2YlNoPo7GXkIM2zhPxJ4uCNr8Khfm19-eYYZtIi73Iy9PbMnR6i59rCdrVxmZvvsMi0E1QaLQnIam19kR0ynAUO3RsyR3j7RZykdGXl\/s728\/BWASP-BoB-Web-Application-Security-Project-1280x720%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":35442,"url":"https:\/\/kalilinuxtutorials.com\/sechub\/","url_meta":{"origin":4556,"position":5},"title":"SecHub : Streamlining Security Across Software Development Lifecycles","author":"Varshini","date":"December 11, 2024","format":false,"excerpt":"The free and open-source security platform SecHub, provides a central API to test software with different security tools. SecHub supports many free and open-source as well as proprietary security tools. SecHub Features: Easy to use Scan using one API\/client Single human readable report Mark findings as false-positive Supports many security\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgfIKV09EOfV1GHGObzwX7X_AavwKB1bMxqqL9ZSaPvYiLEX5pVYfpKCtV5kFIFjM2xwZOFb0IlhevKVPZZ3fhPihq-X_QPbCx-2eZMrOdXTT4LKEg5s7BtL-ESnn0VHlLvXANh_mfl9eQwRe_0h_nHrcTVPU9GWEa1evKccqQEa1Wh3My4m7s-BVY380A4\/s1600\/SecHub%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgfIKV09EOfV1GHGObzwX7X_AavwKB1bMxqqL9ZSaPvYiLEX5pVYfpKCtV5kFIFjM2xwZOFb0IlhevKVPZZ3fhPihq-X_QPbCx-2eZMrOdXTT4LKEg5s7BtL-ESnn0VHlLvXANh_mfl9eQwRe_0h_nHrcTVPU9GWEa1evKccqQEa1Wh3My4m7s-BVY380A4\/s1600\/SecHub%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgfIKV09EOfV1GHGObzwX7X_AavwKB1bMxqqL9ZSaPvYiLEX5pVYfpKCtV5kFIFjM2xwZOFb0IlhevKVPZZ3fhPihq-X_QPbCx-2eZMrOdXTT4LKEg5s7BtL-ESnn0VHlLvXANh_mfl9eQwRe_0h_nHrcTVPU9GWEa1evKccqQEa1Wh3My4m7s-BVY380A4\/s1600\/SecHub%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgfIKV09EOfV1GHGObzwX7X_AavwKB1bMxqqL9ZSaPvYiLEX5pVYfpKCtV5kFIFjM2xwZOFb0IlhevKVPZZ3fhPihq-X_QPbCx-2eZMrOdXTT4LKEg5s7BtL-ESnn0VHlLvXANh_mfl9eQwRe_0h_nHrcTVPU9GWEa1evKccqQEa1Wh3My4m7s-BVY380A4\/s1600\/SecHub%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgfIKV09EOfV1GHGObzwX7X_AavwKB1bMxqqL9ZSaPvYiLEX5pVYfpKCtV5kFIFjM2xwZOFb0IlhevKVPZZ3fhPihq-X_QPbCx-2eZMrOdXTT4LKEg5s7BtL-ESnn0VHlLvXANh_mfl9eQwRe_0h_nHrcTVPU9GWEa1evKccqQEa1Wh3My4m7s-BVY380A4\/s1600\/SecHub%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgfIKV09EOfV1GHGObzwX7X_AavwKB1bMxqqL9ZSaPvYiLEX5pVYfpKCtV5kFIFjM2xwZOFb0IlhevKVPZZ3fhPihq-X_QPbCx-2eZMrOdXTT4LKEg5s7BtL-ESnn0VHlLvXANh_mfl9eQwRe_0h_nHrcTVPU9GWEa1evKccqQEa1Wh3My4m7s-BVY380A4\/s1600\/SecHub%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=4556"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4556\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=4556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=4556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=4556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}