koenbuyens / oauth-2.0-security-cheat-sheet
oauth security guidelines
☆222Updated 5 years ago
Alternatives and similar repositories for oauth-2.0-security-cheat-sheet:
Users that are interested in oauth-2.0-security-cheat-sheet are comparing it to the libraries listed below
- Damn Vulnerable Java (EE) Application☆133Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 4 years ago
- ☆179Updated 2 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated 2 weeks ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆308Updated 10 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆177Updated 7 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.☆420Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 5 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆281Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆169Updated 3 months ago
- Damn Vulnerable Cloud Application☆190Updated 6 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆186Updated last month
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆119Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆106Updated last year
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆153Updated 5 months ago
- Fetch the details of assets hosted on AWS.☆86Updated last year
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆150Updated last year
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆267Updated 4 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆282Updated 9 months ago
- Some good resources for getting started with application security☆141Updated 3 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆78Updated 2 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 2 years ago
- GraphQL security workshop labs☆101Updated 6 months ago
- GraphQL threat framework used by security professionals to research security gaps in GraphQL implementations☆300Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆213Updated 2 months ago
- Awesome resources about Security in Kubernetes☆40Updated 2 years ago
- APIs to practise diverse techniques to hack JWT Signatures☆64Updated 2 years ago