MarketingPipeline / API-Security-ChecklistLinks
A security checklist for anyone who's developing and deploying APIs
☆21Updated 2 years ago
Alternatives and similar repositories for API-Security-Checklist
Users that are interested in API-Security-Checklist are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆59Updated 4 months ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆13Updated last year
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆29Updated 2 years ago
- FAANG (MANGA) Security Engineer Interview Collection. An ongoing & curated collection of awesome software, frameworks and libraries, lear…☆43Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆38Updated 2 months ago
- OWASP ASVS Security Evaluation Templates with Nuclei☆35Updated last month
- Archive of Potential Insider Threats☆146Updated last year
- Chat Bot Security Checklist☆28Updated 5 years ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆163Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆60Updated 2 years ago
- The SaaS CTO Security Checklist Redux, The DevOps Security Checklist, and The Personal Infosec & Security Checklist☆25Updated 3 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆39Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆19Updated 2 years ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆21Updated 9 months ago
- A curated list of security tools for Hackers & Builders!☆99Updated 10 months ago
- Documentation of vmc☆16Updated 3 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆48Updated this week
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- Awesome list for cloud security related projects☆127Updated 2 years ago
- Regex patterns for manual application source code review☆28Updated 4 years ago
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Updated 3 years ago
- List of GREP modifications and alternatives for a variety of purposes☆128Updated 4 months ago
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆18Updated last year
- ☆10Updated last year
- Cracking the Security Engineer Interviews☆54Updated 2 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Updated 4 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated 11 months ago