security-prince / Resources-for-Application-SecurityLinks
Some good resources for getting started with application security
β143Updated 4 years ago
Alternatives and similar repositories for Resources-for-Application-Security
Users that are interested in Resources-for-Application-Security are comparing it to the libraries listed below
Sorting:
- ποΈ A [work-in-progress] collection for interview questions for Information Security rolesβ138Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.β324Updated last year
- All Things Bug Bountyβ116Updated 3 years ago
- Summary of Cyber Security interview questions I have been through, hope this helpsβ64Updated 5 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!β132Updated 2 years ago
- β129Updated 5 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaksβ80Updated 3 years ago
- Hands-on content for Humla/Puliya sessions at null communityβ92Updated 4 years ago
- GraphQL security workshop labsβ115Updated last week
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wikiβ212Updated 11 months ago
- Common Security Interview Questions with Answersβ29Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug natureβ114Updated 8 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.β75Updated 6 months ago
- β192Updated 2 years ago
- A starter secure code review checklistβ182Updated 6 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tiβ¦β92Updated 4 years ago
- Damn Vulnerable Java (EE) Applicationβ142Updated last year
- A curated list of vulnerable web applications.β323Updated last year
- How to prepare for OSCP complete guideβ128Updated 6 years ago
- Purposely vulnerable Java application to help lead secure coding workshopsβ187Updated last year
- Penetration Testing, Vulnerability Assessment and Red Team Learningβ133Updated 2 weeks ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbountyβ248Updated 4 months ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.β217Updated 4 years ago
- materials we hand outβ147Updated 3 months ago
- My notes on PentesterLab's Bootcamp series π΅οΈβ46Updated 2 years ago
- Capture The Flag | HackTheBox | OSCP | Bug Bounty Hunting | Jobsβ131Updated 5 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.ioβ276Updated 2 years ago
- Pentesting/Bugbounty Dockerfiles.β177Updated 4 years ago
- Sharing Various Thingsβ22Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.β135Updated 5 years ago