"The ultimate" collection of security resources and tools for secure development, secure coding and DevSecOps. Contributions (PRs) are appreciated.
- OWASP Top 10 (Updated 2021)
- https://owasp.org/Top10/
- Don’t just know about it, learn the actual contents!
- OWASP Top 10 for APIs
- OWASP Top 10 for mobile
- OWASP cheat sheets
- Best developer security practices for “everything!”
- https://cheatsheetseries.owasp.org/
- Examples:
- Best practice for file uploads: https://cheatsheetseries.owasp.org/cheatsheets/File_Upload_Cheat_Sheet.html
- Best practice for input validation: https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html
- JavaScript third-party (dependency) management: https://cheatsheetseries.owasp.org/cheatsheets/Third_Party_Javascript_Management_Cheat_Sheet.html
- CWE/SANS Top 25 Most Dangerous Software Errors
- Department of Defense (DoD) Enterprise DevSecOps Initiative
- OpenSSF Best Practices Working Group (WG)
- Security Champions Playbook
- Books
- OWASP Code Review Guide v2 (2017)
- Free must read for every developer
- Project page
- Secure Programming HOWTO - Creating Secure Software by David A. Wheeler
- Free HTML and PDF book by the author of Flawfinder
- The Art of Software Security Assessment by John McDonald, Mark Down and Justin Schuh
- As recommended by Natalie Silvanovich at Google Project Zero
- Note only ebook is the complete version for some reason
- A Bug Hunter's Diary by Tobias Klein
- OWASP Code Review Guide v2 (2017)
- Articles
- How to prevent, detect and respond to cloud token theft (Session hijacking of cloud access token)
- SVGs are dangerous. How an XSS vulnerability in an electron application can lead to remote code execution.
- Equinor AppSec information pages
- NAV's security playbook (Norwegian)
- 10 developer mitigations to prevent supply chain attacks
- Fifty Years of Open Source Software Supply Chain Security
- Learn OWASP Top 10 (2017 edition) interactive with WebGoat (free)
- OWASP Secure Coding Dojo (free) interactive secure coding training
- https://securecodingdojo.owasp.org/
- Project page with self-hosting & workshop resources:
- TryHackMe (some rooms are free) interactive tutorials of various topics
- PortSwigger Web Security Academy (free) interactive online web sec. training
- Free API Security class & certification based on OWASP API Security Top 10
- OWASP Juice Shop (free) intentionally vulnerable application
- Practice cloud security with AzureGoat and AwsGoat
- Learn and practice fuzzing
- Analyze and test your HTTP Security Headers
- https://securityheaders.com/ (free)
- Analyze and test your TLS/SSL configuration
- (Web) Vulnerability scanners
- Nikto (free)
- Trivy (free)
- Greenbone Community Edition (previously OpenVAS) (free)
- Nessus
- Static Application Security Testing (SAST)
- Repository listing static analysis tools for all programming languages
- OWASP Source Code Analysis Tools
- NIST’s list of SAST tools you can integrate in your DevSecOps pipeline:
- Semgrep (commercial)
- Snyk Code (commercial)
- Sonarcube (commercial)
- Flawfinder
- Commercial DevSecOps vulnerability scanners
- “Attack proxies” for web analysis and attacks:
- OWASP Zap Proxy (free)
- Portswigger Burp Suite (free limited version available)
- Hetty (free)
- Aikido "all-in-one AppSec suite"
- Privacy tools / alternatives to popular products
- DevSecOps Book Club
- /r/netsec
- Security Champions Norge (Norwegian)
Find vulnerable packages:
dotnet list package --vulnerable --include-transitive
Outdated packages:
dotnet list package --outdated
Find vulnerable dependencies with pip-audit
Check for third-party (dependencies) vulnerabilities:
npm audit
Only production packages:
npm audit --omit=dev
Use cargo-audit
Use govulncheck.