OWASP / secure-coding-practices-quick-reference-guide
The Secure Coding Practices Quick-reference Guide from OWASP
☆34Updated last year
Alternatives and similar repositories for secure-coding-practices-quick-reference-guide:
Users that are interested in secure-coding-practices-quick-reference-guide are comparing it to the libraries listed below
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 2 months ago
- ☆32Updated 2 years ago
- OWASP Foundation Web Respository☆34Updated 5 months ago
- Maturity Model Collaborative project☆14Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 8 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 5 months ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆120Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- OWASP Foundation Web Respository☆43Updated 5 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 4 years ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- OWASP Code Review Guide Web Repository☆129Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆134Updated last year
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆156Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 9 months ago
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆35Updated this week
- ☆82Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆38Updated 10 months ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆78Updated 2 years ago
- OWASP Foundation Web Respository☆27Updated 6 months ago
- ☆36Updated 3 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆104Updated last year
- Some good resources for getting started with application security☆141Updated 3 years ago