joswha / Secure-Coding-HandbookLinks
Web Application Secure Coding Handbook resource.
β347Updated 2 years ago
Alternatives and similar repositories for Secure-Coding-Handbook
Users that are interested in Secure-Coding-Handbook are comparing it to the libraries listed below
Sorting:
- π¦π Awesome list of secrets in environment variables π₯οΈβ892Updated 2 years ago
- Storage Explorer - Publicly open storage viewer (Amazon S3 Bucket, Azure Blob, FTP server, HTTP Index Of/)β445Updated last year
- Ongoing Infosec Dealsβ111Updated 6 months ago
- A curated list of awesome CI CD security resourcesβ546Updated 7 months ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands β¦β940Updated 2 years ago
- β751Updated 11 months ago
- Bugbounty Resourcesβ541Updated 2 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wikiβ209Updated 7 months ago
- π A curated list of awesome Docker security resourcesβ676Updated 7 months ago
- Golden Guideβ485Updated last year
- My cheatsheet notes to pentest AWS infrastructureβ675Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,893Updated last year
- A curated list of Awesome Security Challenges.β186Updated 7 months ago
- β168Updated last year
- An introduction to Active Directory securityβ647Updated 2 years ago
- Reverse proxies cheatsheetβ1,820Updated last year
- Awesome information for WebSockets security researchβ272Updated 3 years ago
- all paths lead to cloudsβ638Updated last year
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.β316Updated last year
- An organized list of resources including tools, blog-posts and how-to tutorials compiled and created by SCSP community members.β438Updated 2 years ago
- Collections of Orange Tsai's public presentation slides.β732Updated 5 months ago
- BugBountyTipsβ409Updated last month
- Awesome note-taking apps for hackers & pentesters !β371Updated 4 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Secβ¦β292Updated last year
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to creaβ¦β537Updated 2 years ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhβ¦β670Updated 4 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCEβ796Updated last year
- Notes Taken for HTB Machines & InfoSec Community.β365Updated 2 years ago
- β223Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderβ139Updated 3 years ago