righettod / injection-cheat-sheets
Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).
☆9Updated 4 years ago
Alternatives and similar repositories for injection-cheat-sheets:
Users that are interested in injection-cheat-sheets are comparing it to the libraries listed below
- ZAP Management Scripts☆21Updated last week
- DefectDojo Documentation☆15Updated 3 years ago
- ☆20Updated 6 years ago
- Source code for the Binaries of OWASP WrongSecrets☆10Updated 2 months ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 6 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated 2 years ago
- A curated threat modeling library collection☆22Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 8 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- BurpJDSer-ng☆26Updated 3 weeks ago
- ios source grepper☆37Updated 7 years ago
- Vulnerable Grails application☆43Updated 9 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- AppSecPipeline Specification for DevOps automation.☆38Updated 2 years ago
- Vulnerable Java based Web Application☆31Updated 5 years ago
- ☆13Updated 7 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆19Updated 4 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 8 months ago
- REST API test utility☆23Updated 5 years ago
- Open Security Summit 2018☆29Updated 4 years ago