mgreiler / code-reviewsLinks
code reviews to practice
☆18Updated 4 years ago
Alternatives and similar repositories for code-reviews
Users that are interested in code-reviews are comparing it to the libraries listed below
Sorting:
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆134Updated 3 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 3 years ago
- AWS Security Checks☆40Updated 7 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 5 months ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆182Updated 3 years ago
- Fetch the details of assets hosted on AWS.☆88Updated 2 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Updated 2 years ago
- OWASP Foundation Web Respository☆37Updated 2 months ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Updated last year
- ☆195Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Python script to check HTTP security headers☆68Updated last month
- ☆54Updated 11 months ago
- OWASP Code Review Guide Web Repository☆146Updated 3 years ago
- Running nuclei Continuously☆57Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Penetration Testing Checklist☆37Updated 5 years ago
- ☆124Updated 2 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- Damn Vulnerable Java (EE) Application☆144Updated last year
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆54Updated 3 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆32Updated 3 years ago
- ☆23Updated 3 years ago