security-prince / Resources-for-Application-Security
Some good resources for getting started with application security
β135Updated 3 years ago
Related projects β
Alternatives and complementary repositories for Resources-for-Application-Security
- ποΈ A [work-in-progress] collection for interview questions for Information Security rolesβ136Updated last year
- All Things Bug Bountyβ110Updated 2 years ago
- materials we hand outβ138Updated last month
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!β112Updated last year
- GraphQL security workshop labsβ102Updated 4 months ago
- Summary of Cyber Security interview questions I have been through, hope this helpsβ63Updated 4 years ago
- Common Security Interview Questions with Answersβ29Updated last year
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug natureβ107Updated 7 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wikiβ203Updated 2 weeks ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.β306Updated 7 months ago
- β206Updated 3 years ago
- Damn Vulnerable Cloud Applicationβ187Updated 6 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaksβ76Updated 2 years ago
- β122Updated 4 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learningβ135Updated last month
- β33Updated 3 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.β205Updated 4 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.β27Updated 5 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.β236Updated 5 years ago
- Damn Vulnerable Java (EE) Applicationβ130Updated 9 months ago
- β121Updated 3 years ago
- How to prepare for OSCP complete guideβ128Updated 5 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tiβ¦β90Updated 3 years ago
- Continuous monitoring for JavaScript filesβ219Updated 4 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures tβ¦β205Updated 4 years ago
- Data from my Sunday streamsβ72Updated 5 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaβ¦β168Updated 5 years ago
- Hands-on content for Humla/Puliya sessions at null communityβ86Updated 3 years ago