Probely / security_checklist
Web Application Security Checklist
☆117Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for security_checklist
- A checklist of practices for organizations dealing with account takeover (ATO)☆263Updated last month
- OWASP Foundation Web Respository☆64Updated last year
- The OWASP Secure Headers Project☆135Updated this week
- OWASP Code Review Guide Web Repository☆123Updated 2 years ago
- ☆121Updated last year
- The DevSecOps toolset for REST APIs☆271Updated last year
- Some good resources for getting started with application security☆136Updated 3 years ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆152Updated 3 years ago
- ☆75Updated 2 years ago
- OWASP Foundation Web Respository☆40Updated last year
- OWASP Foundation Web Respository☆129Updated last week
- Damn Vulnerable Java (EE) Application☆130Updated 10 months ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆169Updated 2 years ago
- Check any website (or set of websites) for insecure security headers.☆245Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- ☆181Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆332Updated 4 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆120Updated 7 months ago
- A simple web app that helps developers understand the ASVS requirements.☆154Updated 8 months ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆180Updated this week
- An application to catch, search and analyze HTTP secure headers.☆63Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆61Updated last year
- OWASP Foundation Web Respository☆27Updated 3 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆307Updated 7 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 3 months ago
- OWASP Foundation Project Web Repository for Secure Coding Practices Quick-reference Guide☆64Updated 6 months ago
- A Broken Application - Very Vulnerable!☆131Updated 2 weeks ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆57Updated 3 years ago