OWASP Project Developer Guide - Document and Project Web pages
☆116Mar 15, 2026Updated last week
Alternatives and similar repositories for www-project-developer-guide
Users that are interested in www-project-developer-guide are comparing it to the libraries listed below
Sorting:
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 9 months ago
- The Secure Coding Dojo is a platform for delivering secure coding knowledge.☆597Nov 23, 2025Updated 3 months ago
- OWASP Foundation Project Web Repository for Secure Coding Practices Quick-reference Guide☆74May 22, 2024Updated last year
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆1,042Jan 5, 2026Updated 2 months ago
- ☆35Dec 10, 2020Updated 5 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- A minimalistic way to run WAVSEP☆16May 14, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 5 months ago
- ☆147Mar 15, 2026Updated last week
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- The Secure Coding Practices Quick-reference Guide from OWASP☆44Mar 14, 2026Updated last week
- ☆17Feb 3, 2026Updated last month
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆279Updated this week
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Sep 2, 2022Updated 3 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Jun 4, 2025Updated 9 months ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- List Security Guide☆19Feb 24, 2021Updated 5 years ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 9 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆83Dec 22, 2025Updated 3 months ago
- ☆569Updated this week
- OWASP Foundation main site repository☆636Updated this week
- Awesome Secure Coding☆18Feb 13, 2026Updated last month
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Simple comparison of performance between maps and hashdicts in Elixir☆12Mar 15, 2014Updated 12 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- Making LLMs generate entire projects. Go from idea to runnable project in one step.☆34Feb 12, 2023Updated 3 years ago
- The OWASP Developer Guide☆2,149Updated this week
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆884Mar 2, 2026Updated 2 weeks ago
- This repository is a carefully chosen collection of cloud security-related interview questions and scenarios. This resource will help you…☆31Feb 6, 2026Updated last month
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆214Feb 4, 2026Updated last month
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- ☆15Apr 20, 2020Updated 5 years ago
- ☆26Jun 2, 2023Updated 2 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated 2 years ago