Ejemplo de vulnerabilidades: A1 - SQL injection y A2 - Pérdida de Autenticación según OWASP TOP 10 2017
-
Updated
Mar 3, 2023 - JavaScript
Ejemplo de vulnerabilidades: A1 - SQL injection y A2 - Pérdida de Autenticación según OWASP TOP 10 2017
Charla sobre el top 10 de OWASP impartida en la comunidad @XantarDev por @dariocp y @dagope
Small app that is vulnerable to PHP Object Injection
Common generic prototypes for Nodejs
Construire une API sécurisée pour une application d'avis gastronomiques
This repository documents my hands on experience and assignments during the Columbia University Cybersecurity Program. It includes home labs related to network security, penetration testing, and defensive security
Optimize your web vulnerability assessments with PassiveDigger, a comprehensive Burp Suite extension that specializes in passive traffic analysis. Detect potential vulnerabilities, get actionable insights, and supercharge your security audits.
Award‑Winning Application Security Specialist, Blockchain Security Researcher
A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application.
Built with Apache, MySQL, PHP, HTML5 and CSS. A simple front and back end app with login to add or remove daily chores from your list. Currently has security for cross site scripting and sql injection. I'll be implementing the rest of the OWASP top 10. Version 1.4.
It contains the Resources for learning OWASP top 10 vulnerabilities.
Project for the class Computer Security
Notes & misc taken from Complete Ethical Hacking Bootcamp 2021: ZTM(ARCHIVED) and EC-Council's CodeRed
Pencrypt: a Framework for Web, Linux, Windows Pentesting and Cryptographic Operations, Exploit Development and Reverse Engineering, Malware Analysis
Fundamentals of Cybersecurity (3 ECTS) LTAT.05.033. The objective of this course is to create more general technical background knowledge for people with a non-technical background; for instance, an overview of today's (and potentially near future) possible security attacks, methods, and approaches mitigate them.
Project for the course: https://cybersecuritybase.github.io/
BondoMan - Transaction logging app for raw material trades, created using Kotlin Android-Natives
Add a description, image, and links to the owasp-top-10 topic page so that developers can more easily learn about it.
To associate your repository with the owasp-top-10 topic, visit your repo's landing page and select "manage topics."