The OWASP Secure Headers Project
☆188Mar 15, 2026Updated last week
Alternatives and similar repositories for www-project-secure-headers
Users that are interested in www-project-secure-headers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- An application to catch, search and analyze HTTP secure headers.☆64Jun 2, 2021Updated 4 years ago
- Venom tests suite to validate an HTTP security response headers configuration against OSHP recommendation.☆137Jan 25, 2026Updated last month
- Codeaudit - Modern Python source code security analyzer based on distrust.☆27Mar 12, 2026Updated last week
- Repository for storing code for O'Reilly book☆34Feb 11, 2024Updated 2 years ago
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Jul 9, 2025Updated 8 months ago
- PAM module for Auth0☆12Apr 20, 2020Updated 5 years ago
- Auth0 log schema definitions☆18Feb 23, 2026Updated last month
- A very vulnerable implementation of a GraphQL API.☆17Mar 13, 2026Updated last week
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆24Feb 19, 2026Updated last month
- A small REST API for an imaginary todo app called "todoman"☆11Aug 15, 2018Updated 7 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆1,042Jan 5, 2026Updated 2 months ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- [- mxmap -]☆11Apr 9, 2025Updated 11 months ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- O-Saft - OWASP SSL advanced forensic tool☆383Feb 24, 2026Updated last month
- ☆12Mar 31, 2021Updated 4 years ago
- Vulnerable app with examples showing how to not use secrets☆1,404Mar 16, 2026Updated last week
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- ☆18Jan 21, 2022Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 9 months ago
- VULCONHUB provides access to files to build your own hands-on vulnerable container image to learn and practice security☆29Apr 14, 2023Updated 2 years ago
- ☆12Dec 21, 2021Updated 4 years ago
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆112Nov 26, 2024Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Nov 23, 2021Updated 4 years ago
- The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.☆8,963Updated this week
- Core model including reused documentation☆102Dec 16, 2025Updated 3 months ago
- Application Security Verification Standard☆3,373Mar 17, 2026Updated last week
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- Advanced API Security (2nd Edition) Book Samples☆11Nov 12, 2020Updated 5 years ago
- ‹ᴜɴᴍᴀɪɴᴛᴀɪɴᴇᴅ› Scaffolding to generate Amazon EC2 AMIs for Arch Linux.☆28Dec 30, 2015Updated 10 years ago
- Continuous Security on AWS Workshop (CSOA) published by Pearson☆11Aug 14, 2022Updated 3 years ago