dev-resources.site
for different kinds of informations.
owasp Article's
30 articles in total
Access Control Security: Learning from Major Data Breaches
read article
OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation
read article
Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually
read article
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
read article
Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity
read article
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
read article
OWASP Broken Access Control Vulnerabilities
read article
Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker
read article
API Security: Threats, Tools, and Best Practices
read article
Top 10 OWASP Vulnerabilities: What Every Developer Should Know!
read article
Ethical Hacking - This article is about discovering vulnerabilities in web applications.
read article
How to Explore an Exposed .git
read article
Compreendendo o SAMM
read article
🛡️🌐OWASP - Open Web Application Security Project
read article
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices
read article
Open Web Application Security Project OWASP Top Ten
read article
OWASP® Cornucopia 2.0
read article
WEB API VULNERABILITY THROUGH OTP
read article
Create your own card game with OWASP® Cornucopia
read article
Be a Part of OWASP Top 10 2024!
read article
SAST Scanning with SonarQube and Docker
read article
Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules
read article
Threat Modeling
read article
Securing Self-Hosted Services with CF Tunnel Gate
read article
SnowFROC 2024: Securing The Future With OWASP Community In Denver
read article
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?
read article
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?
read article
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity
read article
Mastering Application Security: The Power of Rate Limiting
read article
How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )
read article
Featured ones: