mgreiler / code-reviewsLinks
code reviews to practice
☆18Updated 4 years ago
Alternatives and similar repositories for code-reviews
Users that are interested in code-reviews are comparing it to the libraries listed below
Sorting:
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- Fetch the details of assets hosted on AWS.☆88Updated 2 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 6 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- AWS Security Checks☆40Updated 8 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Updated last year
- OWASP Foundation Web Respository☆37Updated 3 months ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 3 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- Running nuclei Continuously☆57Updated 3 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Updated 2 years ago
- Penetration Testing Checklist☆37Updated 5 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Updated 3 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- ☆196Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆144Updated last year
- ☆10Updated 5 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- 📚A curated list of product security resources.☆22Updated 7 months ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 6 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- ☆72Updated 5 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- ☆24Updated 3 years ago
- ☆15Updated 4 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated last year
- ☆11Updated 2 years ago