update lists
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome AppSec [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome AppSec [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
|
||||
[38;5;12mA curated list of resources for learning about application security. Contains books,[39m
|
||||
[38;5;12mwebsites, blog posts, and self-assessment quizzes.[39m
|
||||
@@ -11,11 +11,11 @@
|
||||
[38;5;12mIf you are an absolute beginner to the topic of software security, you may benefit[39m
|
||||
[38;5;12mfrom reading [39m[38;5;14m[1mA Gentle Introduction to Application Security[0m[38;5;12m (https://paragonie.com/blog/2015/08/gentle-introduction-application-security).[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mContributing[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mContributing[0m
|
||||
|
||||
[38;5;14m[1mPlease refer to the contributing guide for details[0m[38;5;12m (CONTRIBUTING.md).[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mApplication Security Learning Resources[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mApplication Security Learning Resources[0m
|
||||
|
||||
|
||||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGeneral[0m[38;5;12m (#general)[39m
|
||||
@@ -30,22 +30,20 @@
|
||||
[48;5;235m[38;5;249m * **Cryptography Engineering** (#-cryptography-engineering-2010) (2010) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Securing DevOps** (#-securing-devops-2018) (2018) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Gray Hat Python: Programming for Hackers and Reverse Engineers** (#-gray-hat-python-programming-for-hackers-and-reverse-engineers-2009) (2009) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities** (#-the-art-of-software-security-assessment-identifying-and-preventing-software-vulnerabilities-2006) (2006) !**nonfree** (img/nonfree.p[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249mng)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities** (#-the-art-of-software-security-assessment-identifying-and-preventing-software-vulnerabilities-2006) (2006) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **C Interfaces and Implementations: Techniques for Creating Reusable Software** (#-c-interfaces-and-implementations-techniques-for-creating-reusable-software-1996) (1996) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Reversing: Secrets of Reverse Engineering** (#-reversing-secrets-of-reverse-engineering-2005) (2005) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **JavaScript: The Good parts** (#-javascript-the-good-parts-2008) (2008) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Windows Internals: Including Windows Server 2008 and Windows Vista, Fifth Edition ** (#-windows-internals-including-windows-server-2008-and-windows-vista-fifth-edition-2007) (2007) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **The Mac Hacker's Handbook** (#-the-mac-hackers-handbook-2009) (2009) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler** (#-the-ida-pro-book-the-unofficial-guide-to-the-worlds-most-popular-disassembler-2008) (2008) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Internetworking with TCP/IP Vol. II: ANSI C Version: Design, Implementation, and Internals (3rd Edition)** (#-internetworking-with-tcpip-vol-ii-ansi-c-version-design-implementation-and-internals-3rd-edition-1998) (1998) !**nonfree[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Internetworking with TCP/IP Vol. II: ANSI C Version: Design, Implementation, and Internals (3rd Edition)** (#-internetworking-with-tcpip-vol-ii-ansi-c-version-design-implementation-and-internals-3rd-edition-1998) (1998) !**nonfree** (img/no[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249mnfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Network Algorithmics,: An Interdisciplinary Approach to Designing Fast Networked Devices** (#-network-algorithmics-an-interdisciplinary-approach-to-designing-fast-networked-devices-2004) (2004) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Computation Structures (MIT Electrical Engineering and Computer Science)** (#-computation-structures-mit-electrical-engineering-and-computer-science-1989) (1989) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection** (#-surreptitious-software-obfuscation-watermarking-and-tamperproofing-for-software-protection-2009) (2009) !**nonfree** (img/nonfree.p[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249mng)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection** (#-surreptitious-software-obfuscation-watermarking-and-tamperproofing-for-software-protection-2009) (2009) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Secure Programming HOWTO** (#secure-programming-howto-2015) (2015)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Security Engineering - Second Edition** (#security-engineering-second-edition-2008) (2008)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Security Engineering - Third Edition** (#security-engineering-third-edition-2020) (2020)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Bulletproof SSL and TLS** (#-bulletproof-ssl-and-tls-2014) (2014) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Holistic Info-Sec for Web Developers (Fascicle 0)** (#holistic-info-sec-for-web-developers-fascicle-0-2016) (2016)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Holistic Info-Sec for Web Developers (Fascicle 1)** (#holistic-info-sec-for-web-developers-fascicle-1)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
@@ -67,6 +65,7 @@
|
||||
[48;5;235m[38;5;249m * **OWASP NodeGoat** (#owasp-nodegoat)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Securing The Stack** (#securing-the-stack)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **OWASP ServerlessGoat** (#owasp-serverlessgoat)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **SecDim** (#secdim)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Blogs** (#blogs)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Crypto Fails** (#crypto-fails)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **NCC Group - Blog** (#ncc-group-blog)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
@@ -88,7 +87,7 @@
|
||||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mC[0m[38;5;12m (#c)[39m
|
||||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-1)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **SEI CERT C Coding Standard** (#sei-cert-c-coding-standard-2006) (2006)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **Defensive Coding: A Guide to Improving Software Security by the Fedora Security Team** (#defensive-coding-a-guide-to-improving-software-security-by-the-fedora-security-team-2022) (2022)[49m[39m
|
||||
[48;5;235m[38;5;249m * **Defensive Coding: A Guide to Improving Software Security by the Fedora Security Team** (#defensive-coding-a-guide-to-improving-software-security-by-the-fedora-security-team-2025) (2025)[49m[39m
|
||||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mC++[0m[38;5;12m (#c-1)[39m
|
||||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-2)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m * **SEI CERT C++ Coding Standard** (#sei-cert-c-coding-standard-2006-1) (2006)[49m[39m
|
||||
@@ -159,7 +158,7 @@
|
||||
[48;5;235m[38;5;249m * **Secure Ruby Development Guide** (#secure-ruby-development-guide-2014) (2014)[49m[39m
|
||||
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mGeneral[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mGeneral[0m
|
||||
|
||||
[38;2;255;187;0m[4mArticles[0m
|
||||
|
||||
@@ -185,7 +184,7 @@
|
||||
|
||||
[38;5;14m[1mReleased[0m[38;5;12m: June 21, 2015[39m
|
||||
|
||||
[38;5;12mRunning[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mbusiness[39m[38;5;12m [39m[38;5;12mrequires[39m[38;5;12m [39m[38;5;12mbeing[39m[38;5;12m [39m[38;5;12mcost-conscious[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mminimizing[39m[38;5;12m [39m[38;5;12munnecessary[39m[38;5;12m [39m[38;5;12mspending.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mbenefits[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mensuring[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12minvisible[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mcompanies,[39m[38;5;12m [39m[38;5;12mso[39m[38;5;12m [39m[38;5;12moften[39m[38;5;12m [39m[38;5;12mtimes[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mneglect[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12minvest[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msoftware[39m
|
||||
[38;5;12mRunning[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mbusiness[39m[38;5;12m [39m[38;5;12mrequires[39m[38;5;12m [39m[38;5;12mbeing[39m[38;5;12m [39m[38;5;12mcost-conscious[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mminimizing[39m[38;5;12m [39m[38;5;12munnecessary[39m[38;5;12m [39m[38;5;12mspending.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mbenefits[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mensuring[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12minvisible[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mcompanies,[39m[38;5;12m [39m[38;5;12mso[39m[38;5;12m [39m[38;5;12moften[39m[38;5;12m [39m[38;5;12mtimes[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mneglect[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12minvest[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m
|
||||
[38;5;12mdevelopment[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcost-saving[39m[38;5;12m [39m[38;5;12mmeasure.[39m[38;5;12m [39m[38;5;12mWhat[39m[38;5;12m [39m[38;5;12mthese[39m[38;5;12m [39m[38;5;12mcompanies[39m[38;5;12m [39m[38;5;12mdon't[39m[38;5;12m [39m[38;5;12mrealize[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m[38;5;12mcost[39m[38;5;12m [39m[38;5;12m(both[39m[38;5;12m [39m[38;5;12mfinancial[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbrand[39m[38;5;12m [39m[38;5;12mreputation)[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mpreventable[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mcompromise[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mincur.[39m
|
||||
|
||||
[38;5;14m[1mThe average data breach costs millions of dollars in damage.[0m
|
||||
@@ -216,8 +215,8 @@
|
||||
|
||||
[38;5;14m[1mReleased[0m[38;5;12m: March 1, 2018[39m
|
||||
|
||||
[38;5;12mSecuring[39m[38;5;12m [39m[38;5;12mDevOps[39m[38;5;12m [39m[38;5;12mexplores[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtechniques[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDevOps[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mapplied[39m[38;5;12m [39m[38;5;12mtogether[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mmake[39m[38;5;12m [39m[38;5;12mcloud[39m[38;5;12m [39m[38;5;12mservices[39m[38;5;12m [39m[38;5;12msafer.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mintroductory[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12mreviews[39m[38;5;12m [39m[38;5;12mstate[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mart[39m[38;5;12m [39m[38;5;12mpractices[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msecuring[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplications[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m
|
||||
[38;5;12minfrastructure,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mteaches[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mtechniques[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mintegrate[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mdirectly[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mproduct.[39m
|
||||
[38;5;12mSecuring[39m[38;5;12m [39m[38;5;12mDevOps[39m[38;5;12m [39m[38;5;12mexplores[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtechniques[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDevOps[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mapplied[39m[38;5;12m [39m[38;5;12mtogether[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mmake[39m[38;5;12m [39m[38;5;12mcloud[39m[38;5;12m [39m[38;5;12mservices[39m[38;5;12m [39m[38;5;12msafer.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mintroductory[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12mreviews[39m[38;5;12m [39m[38;5;12mstate[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mart[39m[38;5;12m [39m[38;5;12mpractices[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msecuring[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplications[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12minfrastructure,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mteaches[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mtechniques[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mintegrate[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mdirectly[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mproduct.[39m
|
||||
|
||||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mGray Hat Python: Programming for Hackers and Reverse Engineers[0m[38;2;255;187;0m[4m (http://www.amazon.com/Gray-Hat-Python-Programming-Engineers/dp/1593271921) (2009)[0m
|
||||
|
||||
@@ -297,9 +296,9 @@
|
||||
|
||||
|
||||
|
||||
[38;5;14m[1m[4mSecurity Engineering - Second Edition[0m[38;2;255;187;0m[4m (https://www.cl.cam.ac.uk/~rja14/book.html) (2008)[0m
|
||||
[38;5;14m[1m[4mSecurity Engineering - Third Edition[0m[38;2;255;187;0m[4m (https://www.cl.cam.ac.uk/~rja14/book.html) (2020)[0m
|
||||
|
||||
[38;5;14m[1mReleased[0m[38;5;12m: April 14, 2008[39m
|
||||
[38;5;14m[1mReleased[0m[38;5;12m: November 1, 2020[39m
|
||||
|
||||
|
||||
|
||||
@@ -313,13 +312,13 @@
|
||||
|
||||
[38;5;14m[1mReleased[0m[38;5;12m: September 17, 2016[39m
|
||||
|
||||
[38;5;12mThe[39m[38;5;12m [39m[38;5;12mfirst[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mthree[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12mseries[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12mbroad[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12min-depth[39m[38;5;12m [39m[38;5;12mcoverage[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12marchitects[39m[38;5;12m [39m[38;5;12mneed[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mknow[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcreate[39m[38;5;12m [39m[38;5;12mrobust,[39m[38;5;12m [39m[38;5;12mreliable,[39m[38;5;12m [39m[38;5;12mmaintainable[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msoftware,[39m[38;5;12m [39m[38;5;12mnetworks[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mother,[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m
|
||||
[38;5;12mdelivered[39m[38;5;12m [39m[38;5;12mcontinuously,[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mtime,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mno[39m[38;5;12m [39m[38;5;12mnasty[39m[38;5;12m [39m[38;5;12msurprises.[39m
|
||||
[38;5;12mThe[39m[38;5;12m [39m[38;5;12mfirst[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mthree[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12mseries[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12mbroad[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12min-depth[39m[38;5;12m [39m[38;5;12mcoverage[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12marchitects[39m[38;5;12m [39m[38;5;12mneed[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mknow[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcreate[39m[38;5;12m [39m[38;5;12mrobust,[39m[38;5;12m [39m[38;5;12mreliable,[39m[38;5;12m [39m[38;5;12mmaintainable[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msoftware,[39m[38;5;12m [39m[38;5;12mnetworks[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mother,[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mdelivered[39m[38;5;12m [39m
|
||||
[38;5;12mcontinuously,[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mtime,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mno[39m[38;5;12m [39m[38;5;12mnasty[39m[38;5;12m [39m[38;5;12msurprises.[39m
|
||||
|
||||
[38;5;14m[1m[4mHolistic Info-Sec for Web Developers (Fascicle 1)[0m[38;2;255;187;0m[4m (https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications)[0m
|
||||
|
||||
[38;5;12mThe[39m[38;5;12m [39m[38;5;12msecond[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mthree[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12mseries[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12mbroad[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12min-depth[39m[38;5;12m [39m[38;5;12mcoverage[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12marchitects[39m[38;5;12m [39m[38;5;12mneed[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mknow[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcreate[39m[38;5;12m [39m[38;5;12mrobust,[39m[38;5;12m [39m[38;5;12mreliable,[39m[38;5;12m [39m[38;5;12mmaintainable[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msoftware,[39m[38;5;12m [39m[38;5;12mVPS,[39m[38;5;12m [39m[38;5;12mnetworks,[39m[38;5;12m [39m[38;5;12mcloud[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m
|
||||
[38;5;12mapplications,[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mdelivered[39m[38;5;12m [39m[38;5;12mcontinuously,[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mtime,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mno[39m[38;5;12m [39m[38;5;12mnasty[39m[38;5;12m [39m[38;5;12msurprises.[39m
|
||||
[38;5;12mThe[39m[38;5;12m [39m[38;5;12msecond[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mthree[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12mseries[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12mbroad[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12min-depth[39m[38;5;12m [39m[38;5;12mcoverage[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12marchitects[39m[38;5;12m [39m[38;5;12mneed[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mknow[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcreate[39m[38;5;12m [39m[38;5;12mrobust,[39m[38;5;12m [39m[38;5;12mreliable,[39m[38;5;12m [39m[38;5;12mmaintainable[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msoftware,[39m[38;5;12m [39m[38;5;12mVPS,[39m[38;5;12m [39m[38;5;12mnetworks,[39m[38;5;12m [39m[38;5;12mcloud[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplications,[39m
|
||||
[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mdelivered[39m[38;5;12m [39m[38;5;12mcontinuously,[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mtime,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mno[39m[38;5;12m [39m[38;5;12mnasty[39m[38;5;12m [39m[38;5;12msurprises.[39m
|
||||
|
||||
[38;2;255;187;0m[4mClasses[0m
|
||||
|
||||
@@ -331,8 +330,8 @@
|
||||
|
||||
[38;5;14m[1m[4mHack Night[0m[38;2;255;187;0m[4m (https://github.com/isislab/Hack-Night)[0m
|
||||
|
||||
[38;5;12mDeveloped[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmaterials[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mNYU[39m[38;5;12m [39m[38;5;12mPoly's[39m[38;5;12m [39m[38;5;12mold[39m[38;5;12m [39m[38;5;12mPenetration[39m[38;5;12m [39m[38;5;12mTesting[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mVulnerability[39m[38;5;12m [39m[38;5;12mAnalysis[39m[38;5;12m [39m[38;5;12mcourse,[39m[38;5;12m [39m[38;5;12mHack[39m[38;5;12m [39m[38;5;12mNight[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msobering[39m[38;5;12m [39m[38;5;12mintroduction[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12moffensive[39m[38;5;12m [39m[38;5;12msecurity.[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mlot[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcomplex[39m[38;5;12m [39m[38;5;12mtechnical[39m[38;5;12m [39m[38;5;12mcontent[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mcovered[39m[38;5;12m [39m[38;5;12mvery[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mstudents[39m[38;5;12m [39m
|
||||
[38;5;12mare[39m[38;5;12m [39m[38;5;12mintroduced[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mwide[39m[38;5;12m [39m[38;5;12mvariety[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcomplex[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mimmersive[39m[38;5;12m [39m[38;5;12mtopics[39m[38;5;12m [39m[38;5;12mover[39m[38;5;12m [39m[38;5;12mthirteen[39m[38;5;12m [39m[38;5;12mweeks.[39m
|
||||
[38;5;12mDeveloped[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmaterials[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mNYU[39m[38;5;12m [39m[38;5;12mPoly's[39m[38;5;12m [39m[38;5;12mold[39m[38;5;12m [39m[38;5;12mPenetration[39m[38;5;12m [39m[38;5;12mTesting[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mVulnerability[39m[38;5;12m [39m[38;5;12mAnalysis[39m[38;5;12m [39m[38;5;12mcourse,[39m[38;5;12m [39m[38;5;12mHack[39m[38;5;12m [39m[38;5;12mNight[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msobering[39m[38;5;12m [39m[38;5;12mintroduction[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12moffensive[39m[38;5;12m [39m[38;5;12msecurity.[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mlot[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcomplex[39m[38;5;12m [39m[38;5;12mtechnical[39m[38;5;12m [39m[38;5;12mcontent[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mcovered[39m[38;5;12m [39m[38;5;12mvery[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mstudents[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m
|
||||
[38;5;12mintroduced[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mwide[39m[38;5;12m [39m[38;5;12mvariety[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcomplex[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mimmersive[39m[38;5;12m [39m[38;5;12mtopics[39m[38;5;12m [39m[38;5;12mover[39m[38;5;12m [39m[38;5;12mthirteen[39m[38;5;12m [39m[38;5;12mweeks.[39m
|
||||
|
||||
[38;2;255;187;0m[4mWebsites[0m
|
||||
|
||||
@@ -391,8 +390,13 @@
|
||||
|
||||
[38;5;14m[1m[4mOWASP ServerlessGoat[0m[38;2;255;187;0m[4m (https://www.owasp.org/index.php/OWASP_Serverless_Goat)[0m
|
||||
|
||||
[38;5;12mOWASP[39m[38;5;12m [39m[38;5;12mServerlessGoat[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mdeliberately[39m[38;5;12m [39m[38;5;12minsecure[39m[38;5;12m [39m[38;5;12mrealistic[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12mLambda[39m[38;5;12m [39m[38;5;12mserverless[39m[38;5;12m [39m[38;5;12mapplication,[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mOWASP[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcreated[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mPureSec[0m[38;5;12m [39m[38;5;12m(https://www.puresec.io/).[39m[38;5;12m [39m[38;5;12mYou[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12minstall[39m[38;5;12m [39m[38;5;12mWebGoat,[39m[38;5;12m [39m[38;5;12mlearn[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mvulnerabilities,[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m
|
||||
[38;5;12mthem,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mremediate[39m[38;5;12m [39m[38;5;12meach[39m[38;5;12m [39m[38;5;12missue.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mproject[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12mdocumentation[39m[38;5;12m [39m[38;5;12mexplaining[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12missues[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mremediated[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mbest-practices.[39m
|
||||
[38;5;12mOWASP[39m[38;5;12m [39m[38;5;12mServerlessGoat[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mdeliberately[39m[38;5;12m [39m[38;5;12minsecure[39m[38;5;12m [39m[38;5;12mrealistic[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12mLambda[39m[38;5;12m [39m[38;5;12mserverless[39m[38;5;12m [39m[38;5;12mapplication,[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mOWASP[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcreated[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mPureSec[0m[38;5;12m [39m[38;5;12m(https://www.puresec.io/).[39m[38;5;12m [39m[38;5;12mYou[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12minstall[39m[38;5;12m [39m[38;5;12mWebGoat,[39m[38;5;12m [39m[38;5;12mlearn[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mvulnerabilities,[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mthem,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mhow[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mremediate[39m[38;5;12m [39m[38;5;12meach[39m[38;5;12m [39m[38;5;12missue.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mproject[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12mdocumentation[39m[38;5;12m [39m[38;5;12mexplaining[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12missues[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mremediated[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mbest-practices.[39m
|
||||
|
||||
[38;5;14m[1m[4mSecDim[0m[38;2;255;187;0m[4m (https://secdim.com)[0m
|
||||
|
||||
[38;5;12mSecDim[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mappsec[39m[38;5;12m [39m[38;5;12medutainment[39m[38;5;12m [39m[38;5;12mplatform,[39m[38;5;12m [39m[38;5;14m[1mLearn[0m[38;5;12m [39m[38;5;12m(https://learn.secdim.com)[39m[38;5;12m [39m[38;5;12mappsec[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12mgit[39m[38;5;12m [39m[38;5;12mbased[39m[38;5;12m [39m[38;5;12mlabs.[39m[38;5;12m [39m[38;5;12mThink[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mgot[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mtakes[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbuild[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12mapp?[39m[38;5;12m [39m[38;5;14m[1mChallenge[0m[38;5;14m[1m [0m[38;5;14m[1myourself[0m[38;5;12m [39m[38;5;12m(https://play.secdim.com)[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mappsec[39m[38;5;12m [39m[38;5;12mgames![39m[38;5;12m [39m[38;5;12mFix[39m[38;5;12m [39m[38;5;12mbugs,[39m[38;5;12m [39m[38;5;12mget[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mscore[39m[38;5;12m [39m
|
||||
[38;5;12mand[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mname[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mleaderboards.[39m
|
||||
|
||||
[38;2;255;187;0m[4mBlogs[0m
|
||||
|
||||
@@ -438,7 +442,7 @@
|
||||
|
||||
[38;5;12mTest and learn Clickjacking. Make clickjacking PoC, take screenshot and share link. You can test HTTPS, HTTP, intranet & internal sites.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAWS Lambda[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAWS Lambda[0m
|
||||
|
||||
[38;2;255;187;0m[4mTools[0m
|
||||
|
||||
@@ -446,7 +450,7 @@
|
||||
|
||||
[38;5;12mFunctionShield is a 100% free AWS Lambda security and Google Cloud Functions security library that equips developers with the ability to easily enforce strict security controls on serverless runtimes.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAndroid[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAndroid[0m
|
||||
|
||||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||||
|
||||
@@ -456,7 +460,7 @@
|
||||
|
||||
[38;5;12mA community-maintained Wiki detailing secure coding standards for Android development.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mC[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mC[0m
|
||||
|
||||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||||
|
||||
@@ -466,13 +470,13 @@
|
||||
|
||||
[38;5;12mA community-maintained Wiki detailing secure coding standards for C programming.[39m
|
||||
|
||||
[38;5;14m[1m[4mDefensive Coding: A Guide to Improving Software Security by the Fedora Security Team[0m[38;2;255;187;0m[4m (https://docs.fedoraproject.org/en-US/Fedora_Security_Team/1/html/Defensive_Coding/index.html) (2022)[0m
|
||||
[38;5;14m[1m[4mDefensive Coding: A Guide to Improving Software Security by the Fedora Security Team[0m[38;2;255;187;0m[4m (https://docs.fedoraproject.org/en-US/Fedora_Security_Team/1/html/Defensive_Coding/index.html) (2025)[0m
|
||||
|
||||
[38;5;14m[1mReleased[0m[38;5;12m: May 23, 2022[39m
|
||||
[38;5;14m[1mReleased[0m[38;5;12m: February 22, 2025[39m
|
||||
|
||||
[38;5;12mProvides guidelines for improving software security through secure coding. Covers common programming languages and libraries, and focuses on concrete recommendations.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mC++[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mC++[0m
|
||||
|
||||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||||
|
||||
@@ -482,7 +486,7 @@
|
||||
|
||||
[38;5;12mA community-maintained Wiki detailing secure coding standards for C++ programming.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mC Sharp[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mC Sharp[0m
|
||||
|
||||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||||
|
||||
@@ -492,7 +496,7 @@
|
||||
|
||||
[38;5;12mAn introduction to developing secure applications targeting version 4.5 of the .NET Framework, specifically covering cryptography and security engineering topics.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mClojure[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mClojure[0m
|
||||
|
||||
[38;2;255;187;0m[4mRepositories[0m
|
||||
|
||||
@@ -502,7 +506,7 @@
|
||||
|
||||
[38;5;12mRepository with Clojure examples of OWASP top 10 vulnerabilities.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mGo[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mGo[0m
|
||||
|
||||
[38;2;255;187;0m[4mArticles[0m
|
||||
|
||||
@@ -512,7 +516,7 @@
|
||||
|
||||
[38;5;12mA guide to managing sensitive data in memory.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mJava[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mJava[0m
|
||||
|
||||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||||
|
||||
@@ -528,7 +532,7 @@
|
||||
|
||||
[38;5;12mSecure Java programming guidelines straight from Oracle.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mNode.js[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mNode.js[0m
|
||||
|
||||
[38;2;255;187;0m[4mArticles[0m
|
||||
|
||||
@@ -560,10 +564,10 @@
|
||||
|
||||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mSecurity Training from BinaryMist[0m[38;2;255;187;0m[4m (https://blog.binarymist.net/presentations-publications/)[0m
|
||||
|
||||
[38;5;12mWe[39m[38;5;12m [39m[38;5;12mrun[39m[38;5;12m [39m[38;5;12mmany[39m[38;5;12m [39m[38;5;12mtypes[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12minfo-sec[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mtraining,[39m[38;5;12m [39m[38;5;12mcovering[39m[38;5;12m [39m[38;5;12mPhysical,[39m[38;5;12m [39m[38;5;12mPeople,[39m[38;5;12m [39m[38;5;12mVPS,[39m[38;5;12m [39m[38;5;12mNetwors,[39m[38;5;12m [39m[38;5;12mCloud,[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mApplications.[39m[38;5;12m [39m[38;5;12mMost[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcontent[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12msourced[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;14m[1mbook[0m[38;5;14m[1m [0m[38;5;14m[1mseries[0m[38;5;12m [39m[38;5;12m(https://leanpub.com/b/holisticinfosecforwebdevelopers)[39m[38;5;12m [39m[38;5;12mKim[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m
|
||||
[38;5;12mworking[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12myears.[39m[38;5;12m [39m[38;5;12mMore[39m[38;5;12m [39m[38;5;12minfo[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mfound[39m[38;5;12m [39m[38;5;14m[1mhere[0m[38;5;12m [39m[38;5;12m(https://binarymist.io/#services)[39m
|
||||
[38;5;12mWe[39m[38;5;12m [39m[38;5;12mrun[39m[38;5;12m [39m[38;5;12mmany[39m[38;5;12m [39m[38;5;12mtypes[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12minfo-sec[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mtraining,[39m[38;5;12m [39m[38;5;12mcovering[39m[38;5;12m [39m[38;5;12mPhysical,[39m[38;5;12m [39m[38;5;12mPeople,[39m[38;5;12m [39m[38;5;12mVPS,[39m[38;5;12m [39m[38;5;12mNetwors,[39m[38;5;12m [39m[38;5;12mCloud,[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mApplications.[39m[38;5;12m [39m[38;5;12mMost[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcontent[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12msourced[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;14m[1mbook[0m[38;5;14m[1m [0m[38;5;14m[1mseries[0m[38;5;12m [39m[38;5;12m(https://leanpub.com/b/holisticinfosecforwebdevelopers)[39m[38;5;12m [39m[38;5;12mKim[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m[38;5;12mworking[39m[38;5;12m [39m[38;5;12mon[39m
|
||||
[38;5;12mfor[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12myears.[39m[38;5;12m [39m[38;5;12mMore[39m[38;5;12m [39m[38;5;12minfo[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mfound[39m[38;5;12m [39m[38;5;14m[1mhere[0m[38;5;12m [39m[38;5;12m(https://binarymist.io/#services)[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPHP[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPHP[0m
|
||||
|
||||
[38;2;255;187;0m[4mArticles[0m
|
||||
|
||||
@@ -615,8 +619,8 @@
|
||||
|
||||
[38;5;14m[1mReleased[0m[38;5;12m: August 2, 2015[39m
|
||||
|
||||
[38;5;12mDiscusses[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mimportance[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mend-to-end[39m[38;5;12m [39m[38;5;12mnetwork-layer[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12m(HTTPS)[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mwell[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mrest,[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[38;5;12mintroduces[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12mcryptography[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mcases,[39m[38;5;12m [39m[38;5;12mwhether[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m
|
||||
[38;5;14m[1mlibsodium[0m[38;5;12m [39m[38;5;12m(https://pecl.php.net/package/libsodium),[39m[38;5;12m [39m[38;5;14m[1mDefuse[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity's[0m[38;5;14m[1m [0m[38;5;14m[1msecure[0m[38;5;14m[1m [0m[38;5;14m[1mPHP[0m[38;5;14m[1m [0m[38;5;14m[1mencryption[0m[38;5;14m[1m [0m[38;5;14m[1mlibrary[0m[38;5;12m [39m[38;5;12m(https://github.com/defuse/php-encryption),[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mOpenSSL.[39m
|
||||
[38;5;12mDiscusses[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mimportance[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mend-to-end[39m[38;5;12m [39m[38;5;12mnetwork-layer[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12m(HTTPS)[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mwell[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mrest,[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[38;5;12mintroduces[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12mcryptography[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mcases,[39m[38;5;12m [39m[38;5;12mwhether[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;14m[1mlibsodium[0m[38;5;12m [39m
|
||||
[38;5;12m(https://pecl.php.net/package/libsodium),[39m[38;5;12m [39m[38;5;14m[1mDefuse[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity's[0m[38;5;14m[1m [0m[38;5;14m[1msecure[0m[38;5;14m[1m [0m[38;5;14m[1mPHP[0m[38;5;14m[1m [0m[38;5;14m[1mencryption[0m[38;5;14m[1m [0m[38;5;14m[1mlibrary[0m[38;5;12m [39m[38;5;12m(https://github.com/defuse/php-encryption),[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mOpenSSL.[39m
|
||||
|
||||
[38;5;14m[1m[4mThe 2018 Guide to Building Secure PHP Software[0m[38;2;255;187;0m[4m (https://paragonie.com/blog/2017/12/2018-guide-building-secure-php-software) (2017)[0m
|
||||
|
||||
@@ -691,7 +695,7 @@
|
||||
|
||||
[38;5;12mA weekly newsletter about PHP, security, and the community.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPerl[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPerl[0m
|
||||
|
||||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||||
|
||||
@@ -701,11 +705,11 @@
|
||||
|
||||
[38;5;12mA community-maintained Wiki detailing secure coding standards for Perl programming.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPython[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPython[0m
|
||||
|
||||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||||
|
||||
[38;5;14m[1m[4mPython chapter of Fedora Defensive Coding Guide[0m[38;2;255;187;0m[4m (https://docs.fedoraproject.org/en-US/Fedora_Security_Team/1/html/Defensive_Coding/chap-Defensive_Coding-Python.html)[0m
|
||||
[38;5;14m[1m[4mPython chapter of Fedora Defensive Coding Guide[0m[38;2;255;187;0m[4m (https://docs.fedoraproject.org/en-US/defensive-coding/programming-languages/Python/)[0m
|
||||
|
||||
[38;5;12mLists standard library features that should be avoided, and references sections of other chapters that are Python-specific.[39m
|
||||
|
||||
@@ -725,7 +729,7 @@
|
||||
|
||||
[38;5;12mA wiki maintained by the OWASP Python Security project.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mRuby[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mRuby[0m
|
||||
|
||||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||||
|
||||
@@ -734,3 +738,5 @@
|
||||
[38;5;14m[1mReleased[0m[38;5;12m: March 10, 2014[39m
|
||||
|
||||
[38;5;12mA guide to secure Ruby development by the Fedora Security Team. Also available on [39m[38;5;14m[1mGithub[0m[38;5;12m (https://github.com/jrusnack/secure-ruby-development-guide).[39m
|
||||
|
||||
[38;5;12mappsec Github: https://github.com/paragonie/awesome-appsec[39m
|
||||
|
||||
Reference in New Issue
Block a user