OWASP / wrongsecretsLinks
Vulnerable app with examples showing how to not use secrets
☆1,363Updated last week
Alternatives and similar repositories for wrongsecrets
Users that are interested in wrongsecrets are comparing it to the libraries listed below
Sorting:
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆972Updated 3 weeks ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,033Updated 11 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,153Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,653Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆700Updated 6 months ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆552Updated last month
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆386Updated 10 months ago
- An open source threat modeling tool from OWASP☆1,217Updated this week
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,302Updated 9 months ago
- Checklist for container security - devsecops practices☆1,596Updated last month
- completely ridiculous API (crAPI)☆1,359Updated this week
- Websec interview questions by tib3rius answered☆311Updated last year
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆465Updated 4 months ago
- Security Champions Playbook v 2.1☆383Updated 2 years ago
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆848Updated this week
- ☆418Updated 2 years ago
- ☆542Updated last week
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆303Updated 2 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,298Updated 11 months ago
- Awesome Vulnerable Applications☆1,268Updated last year
- OWASP Foundation Web Respository☆595Updated 3 weeks ago
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for …☆1,172Updated 2 weeks ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,258Updated 2 months ago
- Twitter vulnerable snippets☆1,074Updated 7 months ago
- My cheatsheet notes to pentest AWS infrastructure☆691Updated 3 years ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆815Updated 7 months ago
- Agile Threat Modeling Toolkit☆706Updated last month
- Runs a scan using Dastardly by Burp Suite against a target site and creates a JUnit XML report for the scan on completion.☆290Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆398Updated 2 months ago
- A curated list of awesome CI CD security resources☆650Updated 3 weeks ago