Web Application Secure Coding Handbook resource.
☆349Mar 10, 2023Updated 3 years ago
Alternatives and similar repositories for Secure-Coding-Handbook
Users that are interested in Secure-Coding-Handbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Sep 13, 2021Updated 4 years ago
- Awesome Secure Coding☆18Feb 13, 2026Updated 2 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- ☆46Sep 10, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- Prototype pollution scanner using headless chrome☆217Jul 27, 2022Updated 3 years ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆853Feb 13, 2023Updated 3 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,677Apr 20, 2026Updated 3 weeks ago
- ☆66Aug 25, 2021Updated 4 years ago
- ☆1,011Jan 22, 2022Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- ☆755Jun 26, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆23Mar 29, 2022Updated 4 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- Tools to assess the DNS security of web applications☆128Oct 5, 2022Updated 3 years ago
- ☆38Aug 27, 2022Updated 3 years ago
- Vaf is a cross-platform very advanced and fast web fuzzer written in nim☆317May 29, 2022Updated 3 years ago
- A Tool to find subdomains from hackerone reports.☆17Jun 23, 2021Updated 4 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- ☆93Sep 18, 2021Updated 4 years ago
- Collections of Orange Tsai's public presentation slides.☆752Jan 1, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆302Feb 12, 2023Updated 3 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,835Jun 9, 2024Updated last year
- A tool to find redirection chains in multiple URLs☆78Jan 1, 2025Updated last year
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆2,002Sep 5, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Simple command shell collections☆35Mar 7, 2021Updated 5 years ago
- GH-Takeover — GitHub Pages Sub-domain Takeover Automation!☆28Apr 17, 2021Updated 5 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆801May 19, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Mar 2, 2022Updated 4 years ago
- Trying to make automated recon for bug bounties☆255May 3, 2021Updated 5 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,680May 24, 2025Updated 11 months ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- ☆18Apr 26, 2021Updated 5 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- Integrate GoKart security static analysis to GitHub Actions☆10Jan 11, 2023Updated 3 years ago