DEV Community

# owasp

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Comments 2
6 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

3
Comments
14 min read
Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Comments
2 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

1
Comments
7 min read
OWASP Broken Access Control Vulnerabilities

OWASP Broken Access Control Vulnerabilities

Comments
4 min read
Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

5
Comments
11 min read
API Security: Threats, Tools, and Best Practices

API Security: Threats, Tools, and Best Practices

5
Comments
1 min read
Ethical Hacking - This article is about discovering vulnerabilities in web applications.

Ethical Hacking - This article is about discovering vulnerabilities in web applications.

6
Comments
11 min read
How to Explore an Exposed .git

How to Explore an Exposed .git

6
Comments 1
4 min read
Compreendendo o SAMM

Compreendendo o SAMM

Comments
6 min read
🛡️🌐OWASP - Open Web Application Security Project

🛡️🌐OWASP - Open Web Application Security Project

Comments
3 min read
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Comments
7 min read
Open Web Application Security Project OWASP Top Ten

Open Web Application Security Project OWASP Top Ten

1
Comments
3 min read
OWASP® Cornucopia 2.0

OWASP® Cornucopia 2.0

25
Comments 1
6 min read
WEB API VULNERABILITY THROUGH OTP

WEB API VULNERABILITY THROUGH OTP

Comments
2 min read
Create your own card game with OWASP® Cornucopia

Create your own card game with OWASP® Cornucopia

Comments 2
2 min read
Be a Part of OWASP Top 10 2024!

Be a Part of OWASP Top 10 2024!

5
Comments 3
4 min read
SAST Scanning with SonarQube and Docker

SAST Scanning with SonarQube and Docker

10
Comments
10 min read
Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules

Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules

1
Comments
1 min read
Securing Self-Hosted Services with CF Tunnel Gate

Securing Self-Hosted Services with CF Tunnel Gate

Comments
5 min read
SnowFROC 2024: Securing The Future With OWASP Community In Denver

SnowFROC 2024: Securing The Future With OWASP Community In Denver

1
Comments
7 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments 1
3 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
Mastering Application Security: The Power of Rate Limiting

Mastering Application Security: The Power of Rate Limiting

7
Comments
6 min read
How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

9
Comments 1
5 min read
OWASP API10:2023 Unsafe Consumption of APIs

OWASP API10:2023 Unsafe Consumption of APIs

5
Comments
3 min read
OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

8
Comments
3 min read
HackTheBox - Writeup Drive [Retired]

HackTheBox - Writeup Drive [Retired]

Comments 1
15 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

4
Comments
3 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

7
Comments
4 min read
OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

4
Comments
4 min read
OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

5
Comments
5 min read
OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

5
Comments
5 min read
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

7
Comments 3
4 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

3
Comments 4
2 min read
Introduction to OWASP

Introduction to OWASP

8
Comments
2 min read
Leveraging Advanced WAF Solutions for Business Security with OpenAppSec 🌐

Leveraging Advanced WAF Solutions for Business Security with OpenAppSec 🌐

1
Comments
2 min read
OWASP Top 10 for LLMs

OWASP Top 10 for LLMs

Comments
1 min read
Techno Security & Digital Forensics Conference East 2023

Techno Security & Digital Forensics Conference East 2023

4
Comments
10 min read
AWS Lambda Cookbook — Elevate your handler’s code — Part 5— Input Validation

AWS Lambda Cookbook — Elevate your handler’s code — Part 5— Input Validation

4
Comments
9 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

10
Comments
5 min read
Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

6
Comments
7 min read
AWS Security Stories #04.4: OWASP - Injection

AWS Security Stories #04.4: OWASP - Injection

1
Comments
4 min read
AWS Security Stories #04.3: OWASP - XSS

AWS Security Stories #04.3: OWASP - XSS

Comments
4 min read
AWS Security Stories #04.2: OWASP - SSRF

AWS Security Stories #04.2: OWASP - SSRF

3
Comments
4 min read
AWS Security Stories #04.1: OWASP - CSRF

AWS Security Stories #04.1: OWASP - CSRF

8
Comments
4 min read
How to Automate OWASP ZAP

How to Automate OWASP ZAP

7
Comments 1
8 min read
OWASP TOP 10 - SSRF

OWASP TOP 10 - SSRF

10
Comments
2 min read
Making Security Fun for Developers

Making Security Fun for Developers

6
Comments
2 min read
OWASP TOP 10 mapped to AWS Managed Rules

OWASP TOP 10 mapped to AWS Managed Rules

13
Comments
2 min read
Don't let your users get pwned via email HTML injection

Don't let your users get pwned via email HTML injection

4
Comments 1
8 min read
API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
Basic Recon Automation Using Github Actions

Basic Recon Automation Using Github Actions

6
Comments
7 min read
Automação básica de Recon utilizando o Github Actions

Automação básica de Recon utilizando o Github Actions

5
Comments
8 min read
API9:2019 - Improper Assets Management

API9:2019 - Improper Assets Management

4
Comments
2 min read
loading...