mgreiler / code-reviewsLinks
code reviews to practice
☆18Updated 4 years ago
Alternatives and similar repositories for code-reviews
Users that are interested in code-reviews are comparing it to the libraries listed below
Sorting:
- Fetch the details of assets hosted on AWS.☆89Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- OWASP Foundation Web Respository☆37Updated 3 weeks ago
- Running nuclei Continuously☆57Updated 2 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- AWS Security Checks☆40Updated 7 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆81Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆28Updated 4 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- ☆23Updated 3 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Penetration Testing Checklist☆36Updated 5 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 3 months ago
- ☆53Updated 9 months ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Updated 2 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆52Updated 4 years ago
- ☆22Updated 4 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆182Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 3 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆188Updated 4 years ago
- Noobish Recon Automation☆21Updated last year
- ☆60Updated last year