MahdiMashrur / Awesome-Application-Security-Checklist
Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application
β610Updated 5 years ago
Alternatives and similar repositories for Awesome-Application-Security-Checklist:
Users that are interested in Awesome-Application-Security-Checklist are comparing it to the libraries listed below
- My cheatsheet notes to pentest AWS infrastructureβ673Updated 2 years ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,162Updated 5 months ago
- Azure and AWS Attacksβ1,106Updated 2 years ago
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.β542Updated 5 months ago
- Websec interview questions by tib3rius answeredβ308Updated last year
- API Security Project aims to present unique attack & defense methods in API Security fieldβ1,381Updated last year
- BUG BOUNTY WRITEUPS - OWASP TOP 10 π΄π΄π΄π΄ββ837Updated 2 years ago
- β1,121Updated last year
- Golden Guideβ484Updated last year
- β716Updated 2 years ago
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!β369Updated last year
- This repository contains a curated list of resources I suggest on LinkedIn and Twitter.ππβ632Updated 11 months ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.β604Updated last year
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to creaβ¦β538Updated 2 years ago
- These are my checklists which I use during my hunting.β635Updated last year
- π A curated list of awesome Docker security resourcesβ667Updated 5 months ago
- A list of bookmarks I have used since I started my journey in cyber securityβ283Updated 2 years ago
- Watch the latest awesome security talks around the globeβ274Updated 2 months ago
- A curated list of awesome CI CD security resourcesβ541Updated 5 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Secβ¦β288Updated last year
- Bugbounty Resourcesβ539Updated last year
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWSβ¦β1,359Updated last month
- A OWASP Based Checklist With 500+ Test Casesβ730Updated 2 years ago
- Web Application Secure Coding Handbook resource.β347Updated 2 years ago
- β104Updated 4 years ago
- β435Updated 2 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testingβ983Updated 5 months ago
- Repository of Bug-Bounty Writeupsβ302Updated 2 weeks ago
- A curated list of Awesome Security Challenges.β180Updated 5 months ago
- A Huge Learning Resources with Labs For Offensive Security Playersβ959Updated 2 years ago