All Projects → joswha → Secure-Coding-Handbook

joswha / Secure-Coding-Handbook

Licence: other
Web Application Secure Coding Handbook resource.

Projects that are alternatives of or similar to Secure-Coding-Handbook

Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-78.05%)
Mutual labels:  owasp, blueteam
tutorials
Additional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-89.02%)
Mutual labels:  owasp, secure-coding
www-project-code-review-guide
OWASP Code Review Guide Web Repository
Stars: ✭ 74 (-77.44%)
Mutual labels:  owasp, webappsecurity
multi-juicer
Run Capture the Flags and Security Trainings with OWASP Juice Shop
Stars: ✭ 179 (-45.43%)
Mutual labels:  owasp
OSINTBookmarks
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-89.63%)
Mutual labels:  blueteam
mod csrfprotector
apache 2.x.x module, for CSRF mitigation
Stars: ✭ 20 (-93.9%)
Mutual labels:  owasp
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+174.09%)
Mutual labels:  blueteam
cyclonedx-dotnet
Creates CycloneDX Software Bill of Materials (SBOM) from .NET Projects
Stars: ✭ 110 (-66.46%)
Mutual labels:  owasp
combobulator
Dependency Combobulator
Stars: ✭ 83 (-74.7%)
Mutual labels:  secure-coding
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 7,533 (+2196.65%)
Mutual labels:  owasp
www-project-zap
OWASP Zed Attack Proxy project landing page.
Stars: ✭ 52 (-84.15%)
Mutual labels:  owasp
crAPI
completely ridiculous API (crAPI)
Stars: ✭ 549 (+67.38%)
Mutual labels:  owasp
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-81.4%)
Mutual labels:  blueteam
raider
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
Stars: ✭ 88 (-73.17%)
Mutual labels:  owasp
BlueTeam.Lab
Blue Team detection lab created with Terraform and Ansible in Azure.
Stars: ✭ 82 (-75%)
Mutual labels:  blueteam
bank mitigations
Anti keylogger, anti screen logger... Strategy to protect with hookings or improve your sandbox with spyware detection... - Demo
Stars: ✭ 17 (-94.82%)
Mutual labels:  blueteam
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-81.71%)
Mutual labels:  blueteam
zap-sonar-plugin
Integrates OWASP Zed Attack Proxy reports into SonarQube
Stars: ✭ 66 (-79.88%)
Mutual labels:  owasp
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-75.91%)
Mutual labels:  blueteam
dummyDLL
Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-89.33%)
Mutual labels:  blueteam

Secure Coding Handbook

Welcome to the Secure Coding Handbook! Here, you will find everything that I have found on secure coding: best practices, analyzing, and, of course, patching code-related vulnerabilities. All of the enumerated attacks and defensive techniques are strictly related to web applications. (for now :) )

Handbook structure:

{% content-ref url="resources.md" %} resources.md {% endcontent-ref %}

{% content-ref url="broken-reference" %} Broken link {% endcontent-ref %}

{% content-ref url="broken-reference" %} Broken link {% endcontent-ref %}

{% content-ref url="broken-reference" %} Broken link {% endcontent-ref %}

{% content-ref url="broken-reference" %} Broken link {% endcontent-ref %}

{% content-ref url="broken-reference" %} Broken link {% endcontent-ref %}

Spotted a bug?

Making mistakes is human nature, fortunately. Please note that I am by no means an expert and should you find something that is totally erroneous or deviated from the subject, please create an issue here.

Want to contribute?

Sure thing! Message me on Twitter @VladToie, or simply write a pull request in the Secure-Coding-Handbook repository.

You can also buy me a Pizza so I wouldn't have to cook it myself, and write more guides in that time =D

{% embed url="https://www.buymeacoffee.com/bobi" %}

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].