PeterMosmans / devsecops-lab
Demo files
☆19Updated 2 years ago
Related projects: ⓘ
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆110Updated last year
- ☆21Updated 3 weeks ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆58Updated 3 months ago
- Some good resources for getting started with application security☆133Updated 3 years ago
- OWASP Code Review Guide Web Repository☆119Updated 2 years ago
- ☆69Updated last year
- Damn Vulnerable Java (EE) Application☆129Updated 7 months ago
- ☆178Updated last year
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆103Updated last year
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆75Updated 2 years ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆142Updated 3 years ago
- Vulnerable Python Application To Learn Secure Development☆95Updated 3 months ago
- A Broken Application - Very Vulnerable!☆120Updated this week
- The Secure Coding Practices Quick-reference Guide from OWASP☆32Updated 9 months ago
- Awesome list for cloud security related projects☆70Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆201Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆54Updated 2 months ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆15Updated last month
- 🖇️ STRIDE vs. ASVS equivalence table☆74Updated 3 weeks ago
- Damn Vulnerable Cloud Application☆183Updated 6 years ago
- Intentionally Vulnerable Flask app for use in Demos☆28Updated 3 months ago
- GraphQL security workshop labs☆100Updated 2 months ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆135Updated last year
- Awesome Secure Coding☆15Updated 7 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆305Updated 5 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆102Updated 8 months ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 2 years ago
- An ongoing list of virtual cybersecurity conferences.☆115Updated 3 years ago
- OWASP Foundation Web Respository☆59Updated last week
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆183Updated 2 months ago