security-prince / Resources-for-Application-SecurityLinks
Some good resources for getting started with application security
β142Updated 4 years ago
Alternatives and similar repositories for Resources-for-Application-Security
Users that are interested in Resources-for-Application-Security are comparing it to the libraries listed below
Sorting:
- ποΈ A [work-in-progress] collection for interview questions for Information Security rolesβ135Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.β316Updated last year
- Summary of Cyber Security interview questions I have been through, hope this helpsβ64Updated 5 years ago
- All Things Bug Bountyβ115Updated 3 years ago
- Purposely vulnerable Java application to help lead secure coding workshopsβ184Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wikiβ209Updated 8 months ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaksβ79Updated 2 years ago
- Damn Vulnerable Cloud Applicationβ195Updated 6 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!β128Updated 2 years ago
- GraphQL security workshop labsβ112Updated this week
- A curated list of vulnerable web applications.β305Updated last year
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tiβ¦β91Updated 4 years ago
- Damn Vulnerable Java (EE) Applicationβ139Updated last year
- This are some Dorks and Platform to find the Bug Bounty Programs.β71Updated 3 months ago
- Common Security Interview Questions with Answersβ28Updated 2 years ago
- Hands-on content for Humla/Puliya sessions at null communityβ92Updated 3 years ago
- β127Updated 5 years ago
- Pentesting/Bugbounty Dockerfiles.β177Updated 4 years ago
- API Pentesting notes.β97Updated 8 months ago
- A collection of templates for bug bounty reportingβ408Updated 2 months ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug natureβ109Updated 7 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learningβ133Updated 3 weeks ago
- A tool geared towards pentesting APIs using OpenAPI definitions.β178Updated 2 years ago
- A starter secure code review checklistβ182Updated 6 years ago
- Detectify Crowdsource Challengeβ69Updated 3 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modulesβ188Updated 3 years ago
- β100Updated last year
- β188Updated 2 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbountyβ246Updated 2 weeks ago
- β71Updated 4 years ago