The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
-
Updated
Nov 12, 2020 - Python
{{ message }}
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
A collection of hacking / penetration testing resources to make you better!
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
In-depth Attack Surface Mapping and Asset Discovery
A curated list of resources for learning about application security
I notice that the Cards API returns the full credit card number, while the UI only shows the last digits
|
|:------------------------
Next generation web scanner
What's the issue?
Overwritten test scenario, can be summarized and link to payload lists from other repos
How do we solve it?
Chop down the content to the required and needed information, link to payload lists instead of enumerating all possible usernames and passwords, provide further guidance on how to test.
If no one is up to handle it, I can take care of it
bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS
Automated Security Testing For REST API's
BeanUtils is a library that is doing automatic mapping to Java object.
It can cause arm when the attack controls part of the list of properties being sets. BeanUtils does not blacklist properties like class, classloader or other objects that are likely to load arbitrary classes and possibly run code.
import org.apache.commons.beanutils.BeanUtils;
publicThe component_name and component_version fields were added recently. Some scanners already populate these fields, but lots of them don't. For some scanners these fields cannot be set, i.e. for scanners that try xss on web pages etc. But probably there are some scanners that can/should be updated.
Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
Awesome Node.js Security resources
Easy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
Automated Penetration Testing Framework
Dependency-Track is an intelligent Supply Chain Component Analysis platform that allows organizations to identify and reduce risk from the use of third-party and open source components.
OWASP Joomla Vulnerability Scanner Project
OWASP WEB Directory Scanner
OWASP ZAP Add-ons
Damn Vulnerable NodeJS Application
The OWASP Vulnerable Web Applications Directory project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
Add a description, image, and links to the owasp topic page so that developers can more easily learn about it.
To associate your repository with the owasp topic, visit your repo's landing page and select "manage topics."
Background:
This is logged on the back of the discussion with the ZAP team about the current behaviour of XML External Entity Attack scanner. There were two concerns raised in this discussion. I am creating seperate tickets for them as they can be addressed independent of each other. F