mgreiler / secure-code-review-checklistLinks
☆190Updated 2 years ago
Alternatives and similar repositories for secure-code-review-checklist
Users that are interested in secure-code-review-checklist are comparing it to the libraries listed below
Sorting:
- OWASP Code Review Guide Web Repository☆141Updated 3 years ago
- A starter secure code review checklist☆180Updated 6 years ago
- A Broken Application - Very Vulnerable!☆172Updated this week
- Some good resources for getting started with application security☆142Updated 4 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆301Updated last month
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆128Updated 2 years ago
- materials we hand out☆147Updated 2 months ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆80Updated 3 years ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆92Updated last year
- Websec interview questions by tib3rius answered☆311Updated last year
- This repo contains the code for my secure code review challenges☆164Updated 3 weeks ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆321Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆185Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆109Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated 10 months ago
- ☆34Updated 4 years ago
- ☆83Updated 2 years ago
- GraphQL security workshop labs☆113Updated last month
- Damn Vulnerable Java (EE) Application☆141Updated last year
- A collection of content, tips and considerations from the AppSec community to spread the word of DevSecOps and guide aspirants who don't …☆26Updated 9 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆234Updated 3 years ago
- intentionally vuln web Application Security in django☆276Updated 2 weeks ago
- Awesome information for WebSockets security research☆275Updated 3 years ago
- ☆124Updated last year
- Damn Vulnerable C# Application (API)☆74Updated last year
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆164Updated last year
- 🚀 Join us for 30days of daily API security tests. #30days30tests We've spent last 120days building amazing API security tests for the c…☆216Updated 2 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆81Updated 2 years ago
- oauth security guidelines☆227Updated 6 years ago
- ☆100Updated last year