OWASP / Application-Security-CurriculumLinks
☆29Updated 4 years ago
Alternatives and similar repositories for Application-Security-Curriculum
Users that are interested in Application-Security-Curriculum are comparing it to the libraries listed below
Sorting:
- Reconnaissance tool for GitLab and GitHub organizations☆53Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Updated 3 years ago
- AWS Security Checks☆40Updated 8 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Updated 6 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆69Updated 4 years ago
- Vulnerable Task Manager☆21Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆66Updated 2 years ago
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- Evenly distributes scanner load across targets☆92Updated 9 months ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- ☆29Updated 6 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆48Updated this week
- Burp extension for quickly copying request/response data.☆31Updated 6 months ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- Detect exposed API keys on GitHub commits.☆35Updated 3 years ago
- Additional Resources For Securing The Stack Tutorials☆40Updated 7 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- ☆54Updated last year
- ☆29Updated 9 years ago
- A Burp plugin to export findings to DefectDojo☆31Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Scrap Latest Information Security Resources☆34Updated 5 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago