kh4sh3i / Application-Security-Interview-Questions
Here are some common interview questions for an application security position you can review for your own interview, along with example answers
☆26Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Application-Security-Interview-Questions
- Regex patterns for manual application source code review☆24Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆43Updated this week
- Common Security Interview Questions with Answers☆29Updated last year
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆31Updated last year
- Penetration Testing Interview Questions☆34Updated 2 years ago
- Penetration Testing Checklist☆35Updated 4 years ago
- ☆70Updated last year
- ☆22Updated 3 years ago
- AWS Security Checks☆36Updated 6 years ago
- Damn Vulnerable Rails app☆11Updated 12 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 2 years ago
- ☆29Updated 3 years ago
- 📚A curated list of product security resources.☆18Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆50Updated 2 years ago
- Summary of Cyber Security interview questions I have been through, hope this helps☆63Updated 4 years ago
- ☆29Updated 3 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆50Updated 7 months ago
- ☆17Updated 3 years ago
- Damn Vulnerable WordPress Site☆50Updated last year
- ☆26Updated 4 years ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆55Updated 2 months ago
- ☆14Updated 3 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆17Updated 6 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆57Updated last year
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆135Updated last year
- ☆15Updated 3 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆40Updated 3 months ago
- ☆15Updated 3 years ago