OWASP / wrongsecretsLinks
Vulnerable app with examples showing how to not use secrets
☆1,382Updated this week
Alternatives and similar repositories for wrongsecrets
Users that are interested in wrongsecrets are comparing it to the libraries listed below
Sorting:
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆997Updated 3 months ago
- An open source threat modeling tool from OWASP☆1,269Updated this week
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,153Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆700Updated 3 weeks ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,685Updated last year
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆563Updated 2 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,174Updated last year
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆315Updated 4 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆473Updated 6 months ago
- ☆554Updated this week
- GitHub Actions Pipeline Enumeration and Attack Tool☆723Updated 3 months ago
- ☆420Updated 2 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,318Updated 11 months ago
- Security Champions Playbook v 2.1☆385Updated 2 years ago
- completely ridiculous API (crAPI)☆1,404Updated this week
- Checklist for container security - devsecops practices☆1,610Updated 3 months ago
- Agile Threat Modeling Toolkit☆717Updated last month
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆488Updated 6 months ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆825Updated 9 months ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆387Updated last year
- Websec interview questions by tib3rius answered☆307Updated 2 years ago
- Awesome Vulnerable Applications☆1,311Updated last month
- A Broken Application - Very Vulnerable!☆180Updated this week
- My cheatsheet notes to pentest AWS infrastructure☆699Updated 3 years ago
- Security Remediation Guides☆743Updated last month
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆424Updated last year
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,289Updated 4 months ago
- Threat matrix for CI/CD Pipeline☆758Updated last year
- Twitter vulnerable snippets☆1,082Updated 9 months ago
- OWASP Foundation Web Respository☆601Updated last month