DEV Community

# owasp

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Create your own card game with OWASP® Cornucopia

Create your own card game with OWASP® Cornucopia

Comments
2 min read
Open Web Application Security Project OWASP Top Ten

Open Web Application Security Project OWASP Top Ten

Comments
3 min read
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Comments
7 min read
Be a Part of OWASP Top 10 2024!

Be a Part of OWASP Top 10 2024!

5
Comments 1
4 min read
OWASP® Cornucopia 2.0

OWASP® Cornucopia 2.0

21
Comments 1
6 min read
WEB API VULNERABILITY THROUGH OTP

WEB API VULNERABILITY THROUGH OTP

Comments
2 min read
SAST Scanning with SonarQube and Docker

SAST Scanning with SonarQube and Docker

9
Comments
10 min read
Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules

Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules

1
Comments
1 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments
3 min read
Securing Self-Hosted Services with CF Tunnel Gate

Securing Self-Hosted Services with CF Tunnel Gate

Comments
5 min read
SnowFROC 2024: Securing The Future With OWASP Community In Denver

SnowFROC 2024: Securing The Future With OWASP Community In Denver

1
Comments
7 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
Mastering Application Security: The Power of Rate Limiting

Mastering Application Security: The Power of Rate Limiting

3
Comments
6 min read
How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

1
Comments
5 min read
OWASP API10:2023 Unsafe Consumption of APIs

OWASP API10:2023 Unsafe Consumption of APIs

5
Comments
3 min read
OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

6
Comments
3 min read
HackTheBox - Writeup Drive [Retired]

HackTheBox - Writeup Drive [Retired]

Comments 1
15 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

3
Comments
3 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

6
Comments
4 min read
OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

4
Comments
4 min read
OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

5
Comments
5 min read
OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

4
Comments
5 min read
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

6
Comments 3
4 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

2
Comments 4
2 min read
OWASP Top 10 for LLMs

OWASP Top 10 for LLMs

Comments
1 min read
AWS Lambda Cookbook — Elevate your handler’s code — Part 5— Input Validation

AWS Lambda Cookbook — Elevate your handler’s code — Part 5— Input Validation

4
Comments
9 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

4
Comments
5 min read
Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

5
Comments
7 min read
AWS Security Stories #04.4: OWASP - Injection

AWS Security Stories #04.4: OWASP - Injection

1
Comments
4 min read
AWS Security Stories #04.3: OWASP - XSS

AWS Security Stories #04.3: OWASP - XSS

Comments
4 min read
AWS Security Stories #04.2: OWASP - SSRF

AWS Security Stories #04.2: OWASP - SSRF

3
Comments
4 min read
AWS Security Stories #04.1: OWASP - CSRF

AWS Security Stories #04.1: OWASP - CSRF

7
Comments
4 min read
Cursos que formaram meu caráter: Desenvolvimento web com Quarkus - Validação de vulnerabilidades com OWASP Dependency Check

Cursos que formaram meu caráter: Desenvolvimento web com Quarkus - Validação de vulnerabilidades com OWASP Dependency Check

1
Comments
6 min read
OpenAPI/ChatGPT as security tool

OpenAPI/ChatGPT as security tool

1
Comments
2 min read
Don't Tackle Security Alone: A Beginner's Guide To OWASP

Don't Tackle Security Alone: A Beginner's Guide To OWASP

13
Comments
12 min read
How to Automate OWASP ZAP

How to Automate OWASP ZAP

6
Comments 1
8 min read
OWASP TOP 10 - SSRF

OWASP TOP 10 - SSRF

10
Comments
2 min read
Making Security Fun for Developers

Making Security Fun for Developers

6
Comments
2 min read
OWASP TOP 10 mapped to AWS Managed Rules

OWASP TOP 10 mapped to AWS Managed Rules

13
Comments
2 min read
Don't let your users get pwned via email HTML injection

Don't let your users get pwned via email HTML injection

4
Comments 1
8 min read
API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
Automação básica de Recon utilizando o Github Actions

Automação básica de Recon utilizando o Github Actions

5
Comments
8 min read
Basic Recon Automation Using Github Actions

Basic Recon Automation Using Github Actions

6
Comments
7 min read
API9:2019 - Improper Assets Management

API9:2019 - Improper Assets Management

4
Comments
2 min read
Use ZAP to Perform DAST (Dynamic Application Security Testing)

Use ZAP to Perform DAST (Dynamic Application Security Testing)

7
Comments 1
5 min read
6 DAST Tools Designed to Protect Against the OWASP Top 10

6 DAST Tools Designed to Protect Against the OWASP Top 10

4
Comments
5 min read
API3:2019 - Excessive Data Exposure

API3:2019 - Excessive Data Exposure

3
Comments
4 min read
API1:2019 - Broken Object Level Authorization

API1:2019 - Broken Object Level Authorization

4
Comments
2 min read
Why do we need all of this data? OWASP Privacy Risks - P-10

Why do we need all of this data? OWASP Privacy Risks - P-10

3
Comments
2 min read
Insomnia+Resurface: API Usage Logger plugin

Insomnia+Resurface: API Usage Logger plugin

1
Comments
3 min read
OWASP Top 10 Vulnerabilities

OWASP Top 10 Vulnerabilities

2
Comments
2 min read
XSS - are you sure you are protected?

XSS - are you sure you are protected?

7
Comments
1 min read
Serving Static Files with Custom Headers using Golang

Serving Static Files with Custom Headers using Golang

6
Comments
3 min read
Ծրագրային անվտանգություն՝ SQL Injection (մաս 2)

Ծրագրային անվտանգություն՝ SQL Injection (մաս 2)

5
Comments
2 min read
Ծրագրային անվտանգություն՝ SQL Injection (մաս 1)

Ծրագրային անվտանգություն՝ SQL Injection (մաս 1)

3
Comments
1 min read
loading...