31-days-of-API-Security-Tips
awesome-web-hacking
Our great sponsors
31-days-of-API-Security-Tips | awesome-web-hacking | |
---|---|---|
2 | 2 | |
2,057 | 5,440 | |
- | - | |
0.0 | 5.4 | |
about 2 years ago | about 1 month ago | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
31-days-of-API-Security-Tips
awesome-web-hacking
What are some alternatives?
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
vapi - vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
awesome-web-security - 🐶 A curated list of Web Security materials and resources.
sec-interview - 信息安全面试题汇总
see awesome-security - A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
ASVS - Application Security Verification Standard
Infosec_Reference - An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
offensiveinterview - Interview questions to screen offensive (red team/pentest) candidates
awesome-appsec - A curated list of resources for learning about application security
Web_Hacking - Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
Local-File-Inclusion-Payloads - Local File inclusion (LFI), or simply File Inclusion, refers to an inclusion attack through which an attacker can trick the web application into including files on the web server