security-prince / Resources-for-Application-Security
Some good resources for getting started with application security
☆142Updated 3 years ago
Alternatives and similar repositories for Resources-for-Application-Security:
Users that are interested in Resources-for-Application-Security are comparing it to the libraries listed below
- All Things Bug Bounty☆114Updated 2 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆125Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆109Updated 7 years ago
- materials we hand out☆142Updated 3 weeks ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆135Updated 2 years ago
- ☆126Updated 4 years ago
- GraphQL security workshop labs☆104Updated 9 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆316Updated last year
- Common Security Interview Questions with Answers☆28Updated last year
- ☆71Updated 4 years ago
- API Pentesting notes.☆96Updated 5 months ago
- Summary of Cyber Security interview questions I have been through, hope this helps☆64Updated 5 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆204Updated 5 months ago
- stuff i'm willing to share with the world lol☆171Updated 2 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆90Updated 3 years ago
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…☆215Updated 5 years ago
- How to prepare for OSCP complete guide☆129Updated 5 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆245Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆102Updated last year
- Continuous monitoring for JavaScript files☆218Updated 5 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆210Updated 4 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆211Updated 5 years ago
- ☆100Updated last year
- Stuff done in preparation for AWAE course and OSWE certification☆151Updated 4 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆79Updated 2 years ago
- Simple shell script for automated domain recognition with some tools☆300Updated 4 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆133Updated 3 weeks ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆240Updated 5 years ago
- Data from my Sunday streams☆75Updated 5 years ago
- Hands-on content for Humla/Puliya sessions at null community☆90Updated 3 years ago