This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWASP wiki.
☆18Feb 22, 2017Updated 9 years ago
Alternatives and similar repositories for Project-Handbook
Users that are interested in Project-Handbook are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆17Dec 9, 2025Updated 2 months ago
- ☆13May 30, 2017Updated 8 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated last week
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Feb 13, 2026Updated 2 weeks ago
- Content for OWASP Summit 2017 site☆129Nov 12, 2020Updated 5 years ago
- ☆16Feb 19, 2026Updated last week
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- Example lua scripts for ATS ts_lua plugin☆12Nov 6, 2025Updated 3 months ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Mana base probability calculator for MTG☆12Dec 5, 2022Updated 3 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 2 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Updated this week
- React component for rendering RDF graphs and datasets using n3.js and cytoscape.js☆10Nov 8, 2021Updated 4 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- ☆11May 6, 2025Updated 9 months ago
- List your tfsec issues in the QuickFix window with this plugin.☆12May 16, 2022Updated 3 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Palestra sobre desenvolvimento seguro de imagens e containers para a DockerCon 2021 sala Brasil☆10May 27, 2021Updated 4 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Abstraction layer for Xilinx FPGAs☆15Aug 9, 2019Updated 6 years ago
- The Mobile access to Health Documents (MHD) Profile defines one standardized interface to health documents for use by mobile devices so t…☆13Feb 18, 2026Updated last week
- ☆14Mar 8, 2021Updated 4 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- K8 Deep dive - Core Concepts, CRDs, Operators, Controllers, Openshift, kubebuilder, Coreos operator framework☆10May 1, 2023Updated 2 years ago
- ☆10Feb 27, 2019Updated 7 years ago
- MIT IAP 2019 Computational Law Course☆14Jul 10, 2019Updated 6 years ago
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆13Nov 1, 2023Updated 2 years ago
- Application using libopenikev2 and libopenikev2_impl libraries. It has a similar behaviour than others IKEv2 daemons, like racoon2 or ike…☆11Mar 19, 2020Updated 5 years ago
- Game Hacking Adventures Scripts & Tools☆20Dec 29, 2012Updated 13 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Updated this week
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Gradle plugin for integrating with HCL AppScan Source☆13Jan 29, 2026Updated last month
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- Helm charts for Redis Enterprise☆13May 5, 2019Updated 6 years ago