Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities
-
Updated
Nov 4, 2024
Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities
Don't have a professional version of BurpSuite? It doesn 't matter . I wrote scripts to solve their labs.
Bachelor’s Work - WEB programming
Short description of this project
Demonstration of an Android attack through a vulnerability in Android
Bachelor’s Work - WEB programming
Curso de OWASP Top 10: de Injections a monitoramento.
Ejemplo de vulnerabilidades: A1 - SQL injection y A2 - Pérdida de Autenticación según OWASP TOP 10 2017
Focused on introduction to secure coding, emphasized concepts, principles, and best practices of structured secure programs within security standards.
Add a description, image, and links to the broken-authentication topic page so that developers can more easily learn about it.
To associate your repository with the broken-authentication topic, visit your repo's landing page and select "manage topics."