Probely / security_checklist
Web Application Security Checklist
☆122Updated 3 years ago
Alternatives and similar repositories for security_checklist:
Users that are interested in security_checklist are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆63Updated last year
- The DevSecOps toolset for REST APIs☆274Updated 2 years ago
- ☆38Updated last month
- Some good resources for getting started with application security☆142Updated 3 years ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆156Updated 3 years ago
- ☆186Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- A simple web app that helps developers understand the ASVS requirements.☆157Updated last month
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆171Updated 6 years ago
- ☆123Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆123Updated 2 years ago
- A checklist of practices for organizations dealing with account takeover (ATO)☆264Updated 5 months ago
- Scan all possible TLD's for a given domain name☆83Updated 3 years ago
- A Broken Application - Very Vulnerable!☆148Updated this week
- Awesome information for WebSockets security research☆264Updated 3 years ago
- ☆80Updated 3 years ago
- A starter secure code review checklist☆182Updated 6 years ago
- OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security Scanner.☆167Updated 2 months ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆338Updated 4 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- Check any website (or set of websites) for insecure security headers.☆247Updated last year
- OWASP Cloud Security - Enabling conversations through threat and control stories☆179Updated 6 years ago
- Security Champions Playbook v 2.1☆360Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 9 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆45Updated this week
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated last year
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago