OWASP Project Developer Guide - Document and Project Web pages
☆116Apr 2, 2026Updated last month
Alternatives and similar repositories for www-project-developer-guide
Users that are interested in www-project-developer-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆23Feb 27, 2026Updated 2 months ago
- Unicode Security Toolkit☆21Apr 26, 2026Updated last week
- OWASP Foundation Project Web Repository for Secure Coding Practices Quick-reference Guide☆74May 22, 2024Updated last year
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆1,057Jan 5, 2026Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆35Dec 10, 2020Updated 5 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- The source files and tools needed to build the OWASP Cornucopia decks in various languages☆125Updated this week
- ☆30Aug 15, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 6 months ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- ☆154Updated this week
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- The Secure Coding Practices Quick-reference Guide from OWASP☆46Mar 14, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OWASP Foundation web repository☆36Apr 3, 2026Updated last month
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Security Champions Playbook v 2.1☆393Sep 25, 2023Updated 2 years ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆308Mar 15, 2026Updated last month
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Mar 20, 2026Updated last month
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 3 months ago
- ☆18Feb 3, 2026Updated 3 months ago
- Your gateway to OWASP. Discover, engage, and help shape the future!☆413Apr 28, 2026Updated last week
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- List Security Guide☆19Feb 24, 2021Updated 5 years ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 11 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆83Dec 22, 2025Updated 4 months ago
- ☆574Apr 27, 2026Updated last week
- Awesome Secure Coding☆18Feb 13, 2026Updated 2 months ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆266Apr 27, 2026Updated last week
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Simple comparison of performance between maps and hashdicts in Elixir☆12Mar 15, 2014Updated 12 years ago
- Making LLMs generate entire projects. Go from idea to runnable project in one step.☆34Feb 12, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- OWASP Foundation Web Respository☆10Mar 14, 2026Updated last month
- This repository is a carefully chosen collection of cloud security-related interview questions and scenarios. This resource will help you…☆32Feb 6, 2026Updated 2 months ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 3 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆26Oct 14, 2024Updated last year
- Misc. Public Reports of Penetration Testing and Security Audits.☆37Jan 8, 2021Updated 5 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- ☆26Jun 2, 2023Updated 2 years ago