RedHatInsights / secure-coding-checklistLinks
Secure Coding Checklist for Developers
☆18Updated 2 years ago
Alternatives and similar repositories for secure-coding-checklist
Users that are interested in secure-coding-checklist are comparing it to the libraries listed below
Sorting:
- code reviews to practice☆18Updated 4 years ago
- OWASP Foundation Web Respository☆37Updated 4 months ago
- OWASP Code Review Guide Web Repository☆148Updated 3 years ago
- ☆12Updated 4 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 8 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- ☆106Updated 2 months ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Updated 3 years ago
- Awesome resources about Security in Kubernetes☆46Updated 3 years ago
- Damn Vulnerable Java (EE) Application☆144Updated 2 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 6 months ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆286Updated 2 years ago
- ☆269Updated 3 weeks ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆111Updated last year
- This repository contains links to awesome security articles.☆42Updated 6 months ago
- ☆114Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆141Updated 3 months ago
- ☆12Updated last year
- ☆127Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆81Updated last month
- OWASP Foundation Web Respository☆101Updated last month
- Repository for the OWASP DevSlop's Docker Game Day☆20Updated 2 years ago
- A step by step workshop to exploit various vulnerabilities in Node.js and Java applications☆157Updated last year
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆32Updated this week
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- OWASP Kubernetes Security Testing Guide☆41Updated last month
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated last year
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆82Updated 3 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆139Updated 2 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated last year