Web Application Secure Coding Handbook resource.
☆349Mar 10, 2023Updated 3 years ago
Alternatives and similar repositories for Secure-Coding-Handbook
Users that are interested in Secure-Coding-Handbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Sep 13, 2021Updated 4 years ago
- Awesome Secure Coding☆18Feb 13, 2026Updated 2 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- ☆46Sep 10, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- Prototype pollution scanner using headless chrome☆217Jul 27, 2022Updated 3 years ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆853Feb 13, 2023Updated 3 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,660Apr 10, 2026Updated last week
- ☆66Aug 25, 2021Updated 4 years ago
- ☆1,015Jan 22, 2022Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- ☆755Jun 26, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆23Mar 29, 2022Updated 4 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆330Mar 27, 2024Updated 2 years ago
- Tools to assess the DNS security of web applications☆127Oct 5, 2022Updated 3 years ago
- ☆38Aug 27, 2022Updated 3 years ago
- Vaf is a cross-platform very advanced and fast web fuzzer written in nim☆319May 29, 2022Updated 3 years ago
- A Tool to find subdomains from hackerone reports.☆17Jun 23, 2021Updated 4 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- Collections of Orange Tsai's public presentation slides.☆750Jan 1, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,833Jun 9, 2024Updated last year
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆301Feb 12, 2023Updated 3 years ago
- A tool to find redirection chains in multiple URLs☆78Jan 1, 2025Updated last year
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,997Sep 5, 2021Updated 4 years ago
- Simple command shell collections☆35Mar 7, 2021Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- GH-Takeover — GitHub Pages Sub-domain Takeover Automation!☆28Apr 17, 2021Updated 5 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆801May 19, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆29Mar 2, 2022Updated 4 years ago
- Trying to make automated recon for bug bounties☆255May 3, 2021Updated 4 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,674May 24, 2025Updated 10 months ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- Integrate GoKart security static analysis to GitHub Actions☆10Jan 11, 2023Updated 3 years ago