This document highlights organizations, projects, and individuals using OWASP Nettacker in their security workflows.
Showcasing adoption encourages community engagement, provides credibility, and helps new users discover real-world use cases.
If you or your organization use OWASP Nettacker, please:
- Fork this repository.
- Add your name, logo, and a short description below.
- Submit a pull request.
| Logo | Name | Description | Website |
|---|---|---|---|
| Example Acme Corp | Uses Nettacker for automated penetration testing. | https://acme.example.com | |
| Example SecurityCo | Integrates Nettacker into their CI/CD pipeline for continuous security assessment. | https://securityco.example.org | |
![]() |
HISC (Information Security Club - HCMUTE) | Using Nettacker for automated reconnaissance, vulnerability research, and security training in CTF environments. | https://phucquan.github.io/ |
- Example project X — integrates Nettacker for infrastructure scanning in Kubernetes environments.
- Example tool — extends Nettacker modules for custom vulnerability detection.
- Alice Smith example person — security researcher (Twitter: @alice)
Thanks to everyone using and contributing to OWASP Nettacker! We appreciate your support and feedback.
