mgreiler / awesome-code-review-checklists
☆41Updated 6 months ago
Alternatives and similar repositories for awesome-code-review-checklists:
Users that are interested in awesome-code-review-checklists are comparing it to the libraries listed below
- Sample exploits of common vulnerabilities in Java librarires☆23Updated last year
- ZAP Management Scripts☆23Updated this week
- Serial Whitelist Application Trainer☆29Updated 5 years ago
- ☆14Updated last year
- Maven tooling for static code analysis☆32Updated 2 months ago
- Cloud security projects with Spring Cloud Config Server and Vault☆28Updated this week
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- Awesome Java Security Resources 🕶☕🔐☆307Updated last year
- ☆33Updated 3 years ago
- Application Intrusion Detection projects☆19Updated 8 months ago
- Jenkins Plugin from Contrast Security☆13Updated 8 months ago
- exercises for this training course offered via O'Reilly☆17Updated 2 years ago
- ☆93Updated 6 months ago
- POC in order to materialize CSRF prevention concepts described in the following OWASP CSRF cheatsheet☆30Updated 7 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆15Updated 8 years ago
- Export Fortify vulnerability data to GitHub, GitLab, SonarQube and more☆26Updated 10 months ago
- The aim of this project is to protect Java applications against CSRF attacks with the use of Synchronizer Tokens☆86Updated last week
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- Equal Experts Secure Delivery Playbook☆25Updated 2 years ago
- This is a curated list of resources about code reviews: articles, tools, trainings...☆206Updated 5 months ago
- ☆53Updated this week
- OWASP Foundation Web Respository☆10Updated last year
- ☆24Updated 3 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated this week
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆26Updated last year
- OWASP Code Review Guide Web Repository☆132Updated 2 years ago
- Sites and URLs on software and securities that I hope to learn from you guys☆42Updated 4 years ago
- Integrates Xanitizer results into SonarQube☆21Updated 3 years ago