DEV Community

# owasp

Posts

ūüĎč Sign in for the ability to sort posts by relevant, latest, or top.
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

5
Comments
3 min read
Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

3
Comments
7 min read
AWS Security Stories #04.4: OWASP - Injection

AWS Security Stories #04.4: OWASP - Injection

1
Comments
4 min read
AWS Security Stories #04.3: OWASP - XSS

AWS Security Stories #04.3: OWASP - XSS

Comments
4 min read
AWS Security Stories #04.2: OWASP - SSRF

AWS Security Stories #04.2: OWASP - SSRF

3
Comments
4 min read
AWS Security Stories #04.1: OWASP - CSRF

AWS Security Stories #04.1: OWASP - CSRF

5
Comments
4 min read
Cursos que formaram meu caráter: Desenvolvimento web com Quarkus - Validação de vulnerabilidades com OWASP Dependency Check

Cursos que formaram meu caráter: Desenvolvimento web com Quarkus - Validação de vulnerabilidades com OWASP Dependency Check

1
Comments
6 min read
OpenAPI/ChatGPT as security tool

OpenAPI/ChatGPT as security tool

1
Comments
2 min read
Don't Tackle Security Alone: A Beginner's Guide To OWASP

Don't Tackle Security Alone: A Beginner's Guide To OWASP

10
Comments
12 min read
How to Automate OWASP ZAP

How to Automate OWASP ZAP

6
Comments 1
8 min read
OWASP TOP 10 - SSRF

OWASP TOP 10 - SSRF

10
Comments
2 min read
Making Security Fun for Developers

Making Security Fun for Developers

6
Comments
2 min read
OWASP TOP 10 mapped to AWS Managed Rules

OWASP TOP 10 mapped to AWS Managed Rules

13
Comments
2 min read
Basic Recon Automation Using Github Actions

Basic Recon Automation Using Github Actions

6
Comments
7 min read
Don't let your users get pwned via email HTML injection

Don't let your users get pwned via email HTML injection

4
Comments 1
8 min read
API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
Automação básica de Recon utilizando o Github Actions

Automação básica de Recon utilizando o Github Actions

5
Comments
8 min read
API9:2019 - Improper Assets Management

API9:2019 - Improper Assets Management

4
Comments
2 min read
Use ZAP to Perform DAST (Dynamic Application Security Testing)

Use ZAP to Perform DAST (Dynamic Application Security Testing)

7
Comments 1
5 min read
6 DAST Tools Designed to Protect Against the OWASP Top 10

6 DAST Tools Designed to Protect Against the OWASP Top 10

4
Comments
5 min read
API3:2019 - Excessive Data Exposure

API3:2019 - Excessive Data Exposure

3
Comments
4 min read
API1:2019 - Broken Object Level Authorization

API1:2019 - Broken Object Level Authorization

3
Comments
2 min read
Why do we need all of this data? OWASP Privacy Risks - P-10

Why do we need all of this data? OWASP Privacy Risks - P-10

3
Comments
2 min read
Setup an AWS EKS cluster and deploy OWASP juice shop

Setup an AWS EKS cluster and deploy OWASP juice shop

6
Comments
6 min read
Insomnia+Resurface: API Usage Logger plugin

Insomnia+Resurface: API Usage Logger plugin

1
Comments
3 min read
OWASP Top 10 Vulnerabilities

OWASP Top 10 Vulnerabilities

2
Comments
2 min read
XSS - are you sure you are protected?

XSS - are you sure you are protected?

7
Comments
1 min read
Serving Static Files with Custom Headers using Golang

Serving Static Files with Custom Headers using Golang

6
Comments
3 min read
‘ĺ÷Ä’°’£÷Ä’°’Ķ’ę’∂ ’°’∂’ĺ’Ņ’°’∂’£’ł÷ā’©’Ķ’ł÷ā’∂’Ě SQL Injection (’ī’°’Ĺ 2)

‘ĺ÷Ä’°’£÷Ä’°’Ķ’ę’∂ ’°’∂’ĺ’Ņ’°’∂’£’ł÷ā’©’Ķ’ł÷ā’∂’Ě SQL Injection (’ī’°’Ĺ 2)

4
Comments
2 min read
‘ĺ÷Ä’°’£÷Ä’°’Ķ’ę’∂ ’°’∂’ĺ’Ņ’°’∂’£’ł÷ā’©’Ķ’ł÷ā’∂’Ě SQL Injection (’ī’°’Ĺ 1)

‘ĺ÷Ä’°’£÷Ä’°’Ķ’ę’∂ ’°’∂’ĺ’Ņ’°’∂’£’ł÷ā’©’Ķ’ł÷ā’∂’Ě SQL Injection (’ī’°’Ĺ 1)

3
Comments
1 min read
API Testing basado en OWASP

API Testing basado en OWASP

4
Comments
4 min read
Handling Cross-Site Scripting (XSS) in Java

Handling Cross-Site Scripting (XSS) in Java

7
Comments
2 min read
OWASP Secure Coding Practices

OWASP Secure Coding Practices

2
Comments
4 min read
MASVS & MSTG: A Quick Guide To Mobile App Security

MASVS & MSTG: A Quick Guide To Mobile App Security

12
Comments
10 min read
Check for Vulnarability in React / Node app using OWASP dependency check

Check for Vulnarability in React / Node app using OWASP dependency check

20
Comments 3
2 min read
Interview with Cloud Advocate Tanya Janca

Interview with Cloud Advocate Tanya Janca

2
Comments
25 min read
Security Testing with ZAP and GitHub Actions

Security Testing with ZAP and GitHub Actions

8
Comments
2 min read
Website Penetration Testing

Website Penetration Testing

66
Comments 3
1 min read
CWEs vs OWASP top 10?

CWEs vs OWASP top 10?

10
Comments
7 min read
CSRF attack

CSRF attack

22
Comments
1 min read
What is the CORS?

What is the CORS?

8
Comments
1 min read
What is Xss attack? (Php)

What is Xss attack? (Php)

8
Comments
2 min read
Conhecendo a OWASP

Conhecendo a OWASP

3
Comments
3 min read
The 10 most critical API security risks - Part 9: Improper Assets Management

The 10 most critical API security risks - Part 9: Improper Assets Management

7
Comments
2 min read
The 10 most critical API security risks - Part 8: Injection

The 10 most critical API security risks - Part 8: Injection

17
Comments
2 min read
The 10 most critical API security risks - Part 7: Security Misconfiguration

The 10 most critical API security risks - Part 7: Security Misconfiguration

7
Comments
2 min read
The 10 most critical API security risks - Part 6: Mass Assignment

The 10 most critical API security risks - Part 6: Mass Assignment

7
Comments
2 min read
Security Champion

Security Champion

7
Comments
2 min read
About Penetration Testing: Standards and Guides

About Penetration Testing: Standards and Guides

5
Comments
3 min read
An Intro On HTTP Security

An Intro On HTTP Security

63
Comments 8
8 min read
Automatic security tests in Jenkins with OWASP ZAP

Automatic security tests in Jenkins with OWASP ZAP

19
Comments 9
1 min read
OWASP - Who?

OWASP - Who?

91
Comments 11
4 min read
Three Steps For Increasing The Security of Your Web Apps

Three Steps For Increasing The Security of Your Web Apps

194
Comments 16
6 min read
Why you should practice security to better secure your application.

Why you should practice security to better secure your application.

23
Comments 2
4 min read
Self-Signed Certificate with HSTS Site and ZAP with Chrome

Self-Signed Certificate with HSTS Site and ZAP with Chrome

9
Comments
1 min read
Are Your Children Safe?

Are Your Children Safe?

14
Comments
1 min read
Securing a Webapp - Step 1: Start As You Mean To Go On

Securing a Webapp - Step 1: Start As You Mean To Go On

6
Comments 4
7 min read
You have critical security vulnerabilities in your software but you don’t know it yet!

You have critical security vulnerabilities in your software but you don’t know it yet!

5
Comments
13 min read
Hackitect series vol.3 - Building Capture the flag for developers

Hackitect series vol.3 - Building Capture the flag for developers

13
Comments 1
4 min read
Global AppSec 2019 - Tel Aviv

Global AppSec 2019 - Tel Aviv

5
Comments
6 min read
loading...