Mayhem Blog

How to Use Mayhem With Github Actions to Easily Secure Your Applications

How to Use Mayhem With Github Actions to Easily Secure Your Applications

Our Mayhem GitHub Action makes it easier than ever to secure your applications using Mayhem in a GitHub CI/CD pipeline.
Where Mayhem's Automated Security Testing Fits Best into Your DevOps Pipeline

Where Mayhem's Automated Security Testing Fits Best into Your DevOps Pipeline

This post explains how Mayhem fits into the development lifecycle, continually analyzing the main branch of your repo and generating regression tests.
How Mayhem Fits Into the Federal Guidance for Securing the Software Supply Chain

How Mayhem Fits Into the Federal Guidance for Securing the Software Supply Chain

In this blog post, we’ll take a deeper look at the NIST guidance for software development. In particular, we’ll look at PW 8.2 in NIST 800-218.
How to Use an HTTP Archive (HAR) With Mayhem

How to Use an HTTP Archive (HAR) With Mayhem

Learn how to fuzz an API without a specification by recording transactions with the API as an HTTP Archive (.har file).
How to Write Your Own Mayhem for API Plugin

How to Write Your Own Mayhem for API Plugin

Mayhem for API supports the writing of your own plugins to guide Mayhem for API into making legitimate requests to your API.
6 New Features This Month

6 New Features This Month

Over the last several weeks, we’ve made a number of updates to both our flagship Mayhem for Code product and Mayhem for API. Let’s take a look at each.
Automatically Resolve Errors During Analysis with Mayhem

Automatically Resolve Errors During Analysis with Mayhem

When executing the target in the context of a dynamic analysis, Mayhem employs mechanisms that first identify the root cause of a potential issue and then try to resolve it by intelligently providing different configuration values.
How to Integrate Mayhem Into Your Jenkins Pipeline

How to Integrate Mayhem Into Your Jenkins Pipeline

In this post, we’ll look at bringing Mayhem into a Jenkins pipeline using both Mayhem’s command line interface (CLI) as well as using Mayhem’s Docker image.
Branching Best Practices with Mayhem

Branching Best Practices with Mayhem

When using Mayhem, there are a few best practices the ForAllSecure team recommends to account for branches.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.