OWASP-Foundation / Project-HandbookLinks
This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWASP wiki.
☆18Updated 8 years ago
Alternatives and similar repositories for Project-Handbook
Users that are interested in Project-Handbook are comparing it to the libraries listed below
Sorting:
- Open Security Summit 2019☆26Updated 5 years ago
- Open Threat Modeling Template☆52Updated last year
- SWAMP-in-a-Box☆62Updated 5 years ago
- A Java library for parsing and programmatically using threat models☆82Updated 2 years ago
- ☆21Updated 7 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- ☆13Updated 8 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆58Updated 7 years ago
- ZAP Management Scripts☆23Updated last month
- Content for OWASP Summit 2017 site☆129Updated 5 years ago
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Updated last year
- OWASP SonarQube Project☆112Updated 6 years ago
- OWASP Foundation Web Respository☆16Updated last month
- ☆113Updated this week
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆66Updated 2 years ago
- DefectDojo Documentation☆17Updated 4 years ago
- Open Security Summit 2018☆29Updated 5 years ago
- IriusRisk Community☆71Updated 2 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Updated 9 years ago
- An attack tree generator built on electron☆62Updated 9 years ago
- CVE Project Documentation☆86Updated 6 months ago
- A MAL language that demonstrates the Maven project structure☆23Updated this week
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- ☆35Updated 3 years ago
- Repo to hold mapping of user-security-stories☆120Updated 7 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 5 months ago
- Privacy Cards for Software Developers☆54Updated 6 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆96Updated last year
- Pin designs for security related items☆37Updated last year