OWASP-Foundation / Project-HandbookLinks
This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWASP wiki.
☆15Updated 8 years ago
Alternatives and similar repositories for Project-Handbook
Users that are interested in Project-Handbook are comparing it to the libraries listed below
Sorting:
- ☆13Updated 8 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Updated 8 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆43Updated 11 months ago
- ZAP Management Scripts☆23Updated 2 weeks ago
- Open Security Summit 2018☆29Updated 4 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Updated last year
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- A curated threat modeling library collection☆22Updated last year
- ZAP Admin☆29Updated last week
- ☆20Updated 6 years ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Updated 4 years ago
- Source for public Cobalt external product documentation☆14Updated last week
- Viproxy (Interactive TCP/TLS proxy forked from em-proxy)☆11Updated 10 years ago
- Repository for OWASP Code Review document☆16Updated 10 years ago
- A framework for automating penetration testing using a plugin based architecture☆38Updated 3 years ago
- A static website template for security pages.☆52Updated 9 months ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆28Updated 2 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- CVE database☆22Updated 4 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago