From 1127574ad9e7b0b348dc59f2616ebbde0ddc0be6 Mon Sep 17 00:00:00 2001 From: meleksabit <32045473+meleksabit@users.noreply.github.com> Date: Mon, 30 Sep 2024 22:28:15 +0300 Subject: [PATCH] add release badge (#13) * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * add sonar-project.properties file + edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * Revert "edit SonarQube workflow" This reverts commit 47207bcb03ed003411c8b5093bd0a38d3491afe9. * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow + add docker-compose file * edit SonarQube workflow + edit docker-compose file * edit SonarQube workflow + edit docker-compose file * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow * edit SonarQube workflow + edit docker-compose file * edit SonarQube workflow + edit docker-compose file * edit docker-compose file * remove version attribute from the docker-compose.yml * increase seconds in the sleep attribute * edit workflow, docker-compose and Jenkinsfile files + add Dockerfile * improve CodeQL Scan * improve OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit OWASP Dependency Check workflow * edit Semgrep SAST workflow * edit Semgrep SAST workflow * edit Semgrep SAST workflow * edit Semgrep SAST workflow * add SonarCloud workflow + add Quality Gate in the Jenkinsfile * edit the SonarCloud workflow * edit the SonarCloud workflow * add badges to the README file * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit Semgrep workflow * edit README.md * edit README.md * add release badge --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index b54729c..e0a0756 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ # $\color{LimeGreen}{OWASP\ Mutillidae\ II\ -\ Forked\ to\ showcase\ DevSecOps\ pipelines\}$ -[![JavaScript CodeQL Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-codeql.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-codeql.yml) [![Scan Application Code with Semgrep SAST](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-semgrep.yml/badge.svg?branch=development)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-semgrep.yml) [![Scan with OWASP Dependency Check](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-owasp-dependency-check.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-owasp-dependency-check.yml) [![SonarCloud Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/sonarcloud.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/sonarcloud.yml) [![Scan PHP code with Snyk Code](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-snyk-code.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-snyk-code.yml) [![SonarQube Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/sonarqube.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/sonarqube.yml) +[![JavaScript CodeQL Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-codeql.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-codeql.yml) [![Scan Application Code with Semgrep SAST](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-semgrep.yml/badge.svg?branch=development)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-semgrep.yml) [![Scan with OWASP Dependency Check](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-owasp-dependency-check.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-owasp-dependency-check.yml) [![SonarCloud Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/sonarcloud.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/sonarcloud.yml) [![Scan PHP code with Snyk Code](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-snyk-code.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/scan-with-snyk-code.yml) [![SonarQube Analysis](https://github.com/meleksabit/mutillidae/actions/workflows/sonarqube.yml/badge.svg)](https://github.com/meleksabit/mutillidae/actions/workflows/sonarqube.yml)![GitHub Release](https://img.shields.io/github/v/release/meleksabit/mutillidae) OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application designed for web-security enthusiasts. It serves as a target for learning and practicing web security skills. Mutillidae can be easily installed on Linux and Windows systems using LAMP, WAMP, and XAMMP stacks. Additionally, it comes pre-installed on SamuraiWTF and OWASP BWA, and the existing version can be updated on these platforms. With dozens of vulnerabilities and hints to guide the user, Mutillidae provides an accessible web hacking environment suitable for labs, security enthusiasts, classrooms, CTFs, and vulnerability assessment tool targets. It has been widely used in graduate security courses, corporate web security training, and as an assessment target for vulnerability assessment software. OWASP Mutillidae II provides a comprehensive platform for learning and practicing web security techniques in a controlled environment.