OWASP / wrongsecrets
Vulnerable app with examples showing how to not use secrets
☆1,303Updated this week
Alternatives and similar repositories for wrongsecrets:
Users that are interested in wrongsecrets are comparing it to the libraries listed below
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆985Updated 5 months ago
- Awesome secure by default libraries to help you eliminate bug classes!☆690Updated 2 weeks ago
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆922Updated 2 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆429Updated 2 months ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,529Updated 9 months ago
- An open source threat modeling tool from OWASP☆1,088Updated this week
- Automating situational awareness for cloud penetration tests.☆2,095Updated last month
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆517Updated 2 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆631Updated 3 weeks ago
- completely ridiculous API (crAPI)☆1,229Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,842Updated 3 months ago
- Checklist for container security - devsecops practices☆1,560Updated last year
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆840Updated 6 months ago
- Security Remediation Guides☆723Updated 3 months ago
- A list of open source web security scanners☆1,093Updated this week
- Websec interview questions by tib3rius answered☆308Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,621Updated 6 months ago
- Create your own vulnerable by design AWS penetration testing playground☆370Updated 2 weeks ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,171Updated 5 months ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆712Updated last week
- Azure and AWS Attacks☆1,106Updated 2 years ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆464Updated last month
- Open source templates you can use to bootstrap your security programs☆841Updated last month
- ☆524Updated last week
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,230Updated 3 months ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆605Updated last year
- Awesome Vulnerable Applications☆1,164Updated 8 months ago
- ☆653Updated this week
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆801Updated last month
- My cheatsheet notes to pentest AWS infrastructure☆674Updated 2 years ago