• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

owasp

  1. dEEpEst

    SensePost Training: Pragmatic API Exploration 2025

    SensePost training: Pragmactic API Exploration The threat landscape of organizations increases with the adoption of APIs. The content of the course creates awareness around the various attack vectors used to target APIs and provides actionable mitigation strategies. The aim of this course is to...
  2. itsMe

    OWASP TOP 10: SQL injection ~ 2023

    Vulnerabilities in SQL injection | Learn with Fun way Description SQL injection is a type of vulnerability that can allow attackers to inject malicious SQL code into a web application's backend database, potentially giving them access to sensitive data or even taking control of the entire...
  3. itsMe

    Ethical Hacking: OWASP top 10 Web Application Hacking

    Find out about the OWASP top 10 most common Cyber Security and Web Application hacking threats. What you’ll learn Ethical Hacking: OWASP top 10 Web Application Hacking     Find the top 10 threats from the OWASP list.     Web Application Security: The basics.     Each vulnerability has its own...
  4. dEEpEst

    OWASP Web Security Testing Guide v4.2 [ PDF ]

    Hidden content
  5. itsMe

    coraza: OWASP Coraza Web Application Firewall

    Welcome to OWASP Coraza WAF, Coraza is a golang enterprise-grade Web Application Firewall framework that supports Modsecurity’s seclang language and is 100% compatible with OWASP Core Ruleset. Coraza v2 differences with v1     Full internal API refactor, public API has not changed     Full...
  6. itsMe

    OWASP Nettacker v0.0.2 - Automated Penetration Testing Framework

    OWASP Nettacker project is created to automate information gathering, vulnerability scanning, and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP, and many other...
  7. B

    OWASP Top 10 2017 Exploit and Mitigation

    Description We will be looking at the OWASP Top 10 web attacks 2017. Students are going to understand each attack by practicing them on their own with the help of this course. We will use Mutillidae 2 Vulnerable Web Application for all attack practice. We will start from setting up the lab to...
  8. itsMe

    Ultimate Guide to Web Application Security OWASP Top Attacks

    Master Top Techniques Used by Hackers, Get Hands-on Practical Exercises to "Know the Enemy" and Secure Your Apps. What you'll learn     Web Security Fundamentals     OWASP Top 10 Hacking Techniques     Cyber Security     Penetration Testing     Bug Bounty     Application Security     SQL...
  9. itsMe

    Ultimate Guide to Web Application Security OWASP Top Attacks

    What you'll learn     Web Security Fundamentals     OWASP Top 10 Hacking Techniques     Cyber Security     Penetration Testing     Bug Bounty     Application Security     SQL injection     Cross-site Scripting XSS     Cross-site Request Forgery CSRF     Sensitive Data Exposure     Weak...
  10. itsMe

    OpenDoor v4.0.1 - OWASP WEB Directory Scanner

    OpenDoor OWASP is a console multifunctional websites scanner. This application finds all possible ways to login, index of/ directories, web shells, restricted access points, subdomains, hidden data, and large backups. The scanning is performed by the built-in dictionary and external dictionaries...
  11. itsMe

    OWASP Mutillidae II 2.8.2 - OWASP Mutillidae II Web Pen-Test Practice Application

    OWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for the web-security enthusiast. Mutillidae can be installed on Linux and Windows using a LAMP, WAMP, and XAMMP. It is pre-installed on SamuraiWTF and OWASP BWA. The existing version can be...
  12. 0x1

    OWASP ZSC

      OWASP ZSC Tool Project OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under Python. Watch the video to learn how generate shellcode with ZCR...
  13. dEEpEst

    OWASP Amass

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. Information Gathering Techniques Used...
  14. dEEpEst

    OWASP API Security Top 10 2019

    OWASP API Security Top 10 2019 Hidden content
  15. itsMe

    JoomScan – OWASP Joomla Vulnerability Scanner Project

    Hidden content Introduction JoomScan, OWASP Vulnerability Scanner, is an open source project developed in perl which detects Joomla CMS vulnerabilities and analyses them. This tool enables seamless and effortless scanning of Joomla installations, and has a modular and lightweight architecture...
  16. F B I

    OWASP Nettacker

    OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other...
Back
Top