security-prince / Resources-for-Application-SecurityLinks
Some good resources for getting started with application security
☆141Updated 4 years ago
Alternatives and similar repositories for Resources-for-Application-Security
Users that are interested in Resources-for-Application-Security are comparing it to the libraries listed below
Sorting:
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- All Things Bug Bounty☆116Updated 3 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆138Updated 2 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated last year
- Summary of Cyber Security interview questions I have been through, hope this helps☆64Updated 5 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆134Updated 2 years ago
- GraphQL security workshop labs☆116Updated last month
- A curated list of vulnerable web applications.☆324Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆189Updated last year
- Common Security Interview Questions with Answers☆30Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- ☆192Updated 2 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆93Updated 4 years ago
- ☆129Updated 5 years ago
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- A collection of templates for bug bounty reporting☆426Updated 6 months ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆114Updated 8 years ago
- Damn Vulnerable Java (EE) Application☆143Updated last year
- A starter secure code review checklist☆182Updated 6 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆77Updated 7 months ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆134Updated last month
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆247Updated 4 months ago
- materials we hand out☆148Updated 4 months ago
- Hands-on content for Humla/Puliya sessions at null community☆92Updated 4 years ago
- ☆101Updated 2 years ago
- Damn Vulnerable Cloud Application☆199Updated 7 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- Capture The Flag | HackTheBox | OSCP | Bug Bounty Hunting | Jobs☆133Updated 5 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Bugbounty scope tool☆331Updated 8 months ago