OWASP-Foundation / Project-HandbookLinks
This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWASP wiki.
☆17Updated 8 years ago
Alternatives and similar repositories for Project-Handbook
Users that are interested in Project-Handbook are comparing it to the libraries listed below
Sorting:
- Open Security Summit 2019☆26Updated 4 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Updated 4 years ago
- ZAP Management Scripts☆23Updated last month
- OWASP Foundation Web Respository☆27Updated 2 weeks ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆28Updated 2 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- ☆13Updated 8 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆42Updated last year
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- ☆20Updated 6 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- OWASP Foundation Web Respository☆10Updated 2 years ago
- A framework for automating penetration testing using a plugin based architecture☆38Updated 3 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- A curated threat modeling library collection☆22Updated last year
- Source for public Cobalt external product documentation☆14Updated 3 weeks ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- ☆14Updated 2 years ago