security-prince / Resources-for-Application-SecurityLinks
Some good resources for getting started with application security
☆142Updated 4 years ago
Alternatives and similar repositories for Resources-for-Application-Security
Users that are interested in Resources-for-Application-Security are comparing it to the libraries listed below
Sorting:
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆129Updated 2 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated 11 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆137Updated 2 years ago
- Summary of Cyber Security interview questions I have been through, hope this helps☆64Updated 5 years ago
- All Things Bug Bounty☆116Updated 3 years ago
- A curated list of vulnerable web applications.☆318Updated last year
- GraphQL security workshop labs☆113Updated 2 months ago
- ☆192Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆80Updated 3 years ago
- materials we hand out☆147Updated 2 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆187Updated last year
- Hands-on content for Humla/Puliya sessions at null community☆92Updated 4 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆75Updated 5 months ago
- A starter secure code review checklist☆181Updated 6 years ago
- ☆212Updated 4 years ago
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- How to prepare for OSCP complete guide☆128Updated 5 years ago
- ☆129Updated 5 years ago
- Common Security Interview Questions with Answers☆29Updated 2 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆113Updated 8 years ago
- Capture The Flag | HackTheBox | OSCP | Bug Bounty Hunting | Jobs☆131Updated 5 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆133Updated last week
- Damn Vulnerable Cloud Application☆199Updated 7 years ago
- API Pentesting notes.☆96Updated 11 months ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆248Updated 3 months ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆92Updated 4 years ago
- ☆72Updated 5 years ago
- Damn Vulnerable Java (EE) Application☆141Updated last year