OWASP / secure-coding-practices-quick-reference-guide
The Secure Coding Practices Quick-reference Guide from OWASP
☆35Updated last year
Alternatives and similar repositories for secure-coding-practices-quick-reference-guide
Users that are interested in secure-coding-practices-quick-reference-guide are comparing it to the libraries listed below
Sorting:
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆64Updated 10 months ago
- ☆87Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- ☆10Updated 3 years ago
- Monorepo of Labs for the Security Knowledge Framework (SKF)☆36Updated last week
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 5 months ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- OWASP Foundation Web Respository☆44Updated 8 months ago
- OWASP Foundation Web Respository☆28Updated 8 months ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆20Updated 9 months ago
- OWASP Code Review Guide Web Repository☆134Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 8 months ago
- code reviews to practice☆16Updated 3 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 11 months ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated last year
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- ☆31Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Awesome resources about Security in Kubernetes☆42Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆138Updated last year
- ☆78Updated 2 years ago
- OWASP Foundation Web Respository☆9Updated 2 weeks ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago