OWASP / secure-coding-practices-quick-reference-guide
The Secure Coding Practices Quick-reference Guide from OWASP
☆32Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for secure-coding-practices-quick-reference-guide
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 2 weeks ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆62Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆42Updated last year
- ☆71Updated last year
- OWASP Foundation Web Respository☆37Updated 2 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆61Updated 5 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- 📚A curated list of product security resources.☆18Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆43Updated this week
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆25Updated 4 months ago
- Awesome Secure Coding☆16Updated 9 months ago
- ☆30Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- OWASP Code Review Guide Web Repository☆122Updated 2 years ago
- OWASP Foundation Web Respository☆19Updated last month
- A project to visualize the software supply chain☆36Updated last year
- Awesome resources about Security in Kubernetes☆40Updated last year
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆16Updated 3 months ago
- OWASP Foundation Web Respository☆27Updated last year
- Awesome list for cloud security related projects☆77Updated 2 years ago
- OWASP Project Developer Guide - Document and Project Web pages☆88Updated this week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆98Updated 9 months ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- ☆21Updated 3 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆37Updated last year
- Regex patterns for manual application source code review☆25Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆50Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆92Updated 2 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆31Updated last year