OWASP / www-membersLinks
☆22Updated last year
Alternatives and similar repositories for www-members
Users that are interested in www-members are comparing it to the libraries listed below
Sorting:
- OWASP Code Review Guide Web Repository☆145Updated 3 years ago
- Obsidian Vault for bug bounty hunters☆94Updated 4 years ago
- The Black Hat GraphQL Book Repository☆275Updated 5 months ago
- ☆194Updated 2 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆69Updated last week
- ☆78Updated 6 years ago
- A Broken Application - Very Vulnerable!☆178Updated last week
- ☆156Updated 4 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- OWASP Foundation Web Respository☆89Updated last week
- CSbyGB PenTips Gitbook☆114Updated 2 months ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆98Updated last year
- University lecture on "IT Security" as Open Educational Resources material☆377Updated 2 years ago
- ☆130Updated 5 years ago
- ☆86Updated 2 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆500Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆134Updated 3 years ago
- Repository to house markdown templates for researchers☆212Updated 2 months ago
- Vulnerable API☆418Updated 2 years ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆274Updated last week
- 🚀 Join us for 30days of daily API security tests. #30days30tests We've spent last 120days building amazing API security tests for the c…☆218Updated 2 years ago
- ☆212Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆539Updated last week
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆164Updated last year
- ☆138Updated 4 years ago
- Common Security Interview Questions with Answers☆31Updated 2 years ago
- ☆108Updated 8 months ago
- Runs a scan using Dastardly by Burp Suite against a target site and creates a JUnit XML report for the scan on completion.☆292Updated last year