mgreiler / code-reviewsLinks
code reviews to practice
☆18Updated 4 years ago
Alternatives and similar repositories for code-reviews
Users that are interested in code-reviews are comparing it to the libraries listed below
Sorting:
- Fetch the details of assets hosted on AWS.☆88Updated 2 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Updated 3 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 7 months ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Updated 3 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 3 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Updated last year
- AWS Security Checks☆40Updated 8 years ago
- OWASP Foundation Web Respository☆37Updated 4 months ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- Running nuclei Continuously☆57Updated 3 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Updated 3 years ago
- ☆54Updated last year
- A tool geared towards pentesting APIs using OpenAPI definitions.☆185Updated 3 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 7 months ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆82Updated 3 years ago
- ☆196Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago
- ☆11Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- ☆124Updated 2 years ago
- ☆24Updated 3 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆55Updated 3 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆52Updated 4 years ago
- ☆16Updated 4 years ago