The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
-
Updated
Jun 30, 2022 - Python
{{ message }}
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Web path scanner
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
A list of web application security
w3af: web application attack and audit framework, the open source web vulnerability scanner.
Next generation web scanner
Git All the Payloads! A collection of web attack payloads.
DefectDojo is a DevSecOps and vulnerability management tool.
As identified in #1727, there may be multiple fields of CycloneDX BOMs that we currently don't ingest or display.
Assess DT's coverage of CycloneDX v1.4 fields and add support for ingesting and displaying missing fields.
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
Some of my security stuff and vulnerabilities. Nothing advanced. More to come.
Authentication via Azure/aad-pod-identity for keyvault access could be a good feature to avoid use of clientId/ clientSecret in chart values. Don't you think ?
OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. It is pre-installed on SamuraiWTF and OWASP BWA. The existing version can be updated on these platforms. With dozens of vulnerabilities and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software. A containerized version of the application is available as a companion project.
A vulnerable version of Rails that follows the OWASP Top 10
I just finished dealing with auto-migrated issues for this article, it could definitely use some content updates:
https://github.com/OWASP/www-community/blob/master/pages/HttpOnly.md it still talks about old versions of IE and Opera.
This article includes an extensive table that needs re-working after the auto-migration as well (which I did not tackle).
Is Opera even relevant in 2020? Do
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
OWASP ZAP Add-ons
The OWASP Vulnerable Web Applications Directory project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
Open Source Security Guide
Seeing the below error while installing rush.js. Probably might need a package in the base image. Any help would be appreciated.
#21 516.9 > keytar@7.6.0 install /usr/local/lib/node_modules/@microsoft/rush/node_modules/keytar
#21 516.9 > prebuild-install || npm run build
#21 516.9
#21 521.6 prebuild-install WARN install No prebuilt binaries found (target=14.16.0 runtime=node arch=arm64
Tests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.
Integrates Dependency-Check reports into SonarQube
Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
Oversecured Vulnerable Android App
Add a description, image, and links to the appsec topic page so that developers can more easily learn about it.
To associate your repository with the appsec topic, visit your repo's landing page and select "manage topics."
Is your feature request related to a problem?
The Traditional and Traditional Plus JSON reports treat "Other Info" as consistent between alerts which is not always the case. A new JSON report should be added which treats "Other Info" as potentially unique per alert instance.
As per the original issue a perfect way to test/experience this need is the Retire.JS passive scan alerts which i