Django DefectDojo : Open-Source Application Vulnerability Correlation & Security Orchestration Tool

DefectDojo is a security program and vulnerability management tool. It allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers. Consolidate your findings into one source of truth with the tool.

Demo

Try out it in our testing environment with the following credentials.

  • admin / defectdojo@demo#appsec
  • product_manager / defectdojo@demo#product

Also Read – CHAOS : PoC that Allow Generate Payloads & Control Remote OS

Quick Start

git clone https://github.com/DefectDojo/django-DefectDojo
cd django-DefectDojo
docker-compose up

Navigate to http://localhost:8080.

Documentation

For detailed documentation you can visit Read the Docs.

Installation Options

Getting Started

We recommend checking out the about document to learn the terminology of the tool and the getting started guide for setting up a new installation.

We’ve also created some example workflows that should give you an idea of how to use it for your own team.

Client APIs

  • Install the DefectDojo Python API via pip install defectdojo_api or clone the repository.
  • Browse the API on SwaggerHub.

Available Plugins

AddThis Website Tools
R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

13 hours ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

1 day ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

1 day ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

2 days ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

2 days ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

2 days ago