747 lines
86 KiB
Plaintext
747 lines
86 KiB
Plaintext
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome AppSec [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||
|
||
[38;5;12mA curated list of resources for learning about application security. Contains books,[39m
|
||
[38;5;12mwebsites, blog posts, and self-assessment quizzes.[39m
|
||
|
||
[38;5;12mMaintained by [39m[38;5;14m[1mParagon Initiative Enterprises[0m[38;5;12m (https://paragonie.com) with[39m
|
||
[38;5;12mcontributions from the application security and developer communities. We also[39m
|
||
[38;5;12mhave [39m[38;5;14m[1mother community projects[0m[38;5;12m (https://paragonie.com/projects) which might be[39m
|
||
[38;5;12museful for tomorrow's application security experts.[39m
|
||
|
||
[38;5;12mIf you are an absolute beginner to the topic of software security, you may benefit[39m
|
||
[38;5;12mfrom reading [39m[38;5;14m[1mA Gentle Introduction to Application Security[0m[38;5;12m (https://paragonie.com/blog/2015/08/gentle-introduction-application-security).[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mContributing[0m
|
||
|
||
[38;5;14m[1mPlease refer to the contributing guide for details[0m[38;5;12m (CONTRIBUTING.md).[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mApplication Security Learning Resources[0m
|
||
|
||
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGeneral[0m[38;5;12m (#general)[39m
|
||
[48;5;235m[38;5;249m* **Articles** (#articles)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **How to Safely Generate a Random Number** (#how-to-safely-generate-a-random-number-2014) (2014)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Salted Password Hashing - Doing it Right** (#salted-password-hashing-doing-it-right-2014) (2014)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **A good idea with bad usage: /dev/urandom** (#a-good-idea-with-bad-usage-devurandom-2014) (2014)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Why Invest in Application Security?** (#why-invest-in-application-security-2015) (2015)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Be wary of one-time pads and other crypto unicorns** (#be-wary-of-one-time-pads-and-other-crypto-unicorns-2015) (2015)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m* **Books** (#books)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Web Application Hacker's Handbook** (#-web-application-hackers-handbook-2011) (2011) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Cryptography Engineering** (#-cryptography-engineering-2010) (2010) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Securing DevOps** (#-securing-devops-2018) (2018) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Gray Hat Python: Programming for Hackers and Reverse Engineers** (#-gray-hat-python-programming-for-hackers-and-reverse-engineers-2009) (2009) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities** (#-the-art-of-software-security-assessment-identifying-and-preventing-software-vulnerabilities-2006) (2006) !*[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m*nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **C Interfaces and Implementations: Techniques for Creating Reusable Software** (#-c-interfaces-and-implementations-techniques-for-creating-reusable-software-1996) (1996) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Reversing: Secrets of Reverse Engineering** (#-reversing-secrets-of-reverse-engineering-2005) (2005) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **JavaScript: The Good parts** (#-javascript-the-good-parts-2008) (2008) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Windows Internals: Including Windows Server 2008 and Windows Vista, Fifth Edition ** (#-windows-internals-including-windows-server-2008-and-windows-vista-fifth-edition-2007) (2007) !**nonfree** (img/nonfre[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249me.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **The Mac Hacker's Handbook** (#-the-mac-hackers-handbook-2009) (2009) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler** (#-the-ida-pro-book-the-unofficial-guide-to-the-worlds-most-popular-disassembler-2008) (2008) !**nonfree** (img/nonfree.png[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Internetworking with TCP/IP Vol. II: ANSI C Version: Design, Implementation, and Internals (3rd Edition)** (#-internetworking-with-tcpip-vol-ii-ansi-c-version-design-implementation-and-internals-3rd-editio[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249mn-1998) (1998) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Network Algorithmics,: An Interdisciplinary Approach to Designing Fast Networked Devices** (#-network-algorithmics-an-interdisciplinary-approach-to-designing-fast-networked-devices-2004) (2004) !**nonfree*[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m* (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Computation Structures (MIT Electrical Engineering and Computer Science)** (#-computation-structures-mit-electrical-engineering-and-computer-science-1989) (1989) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection** (#-surreptitious-software-obfuscation-watermarking-and-tamperproofing-for-software-protection-2009) (2009) !*[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m*nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Secure Programming HOWTO** (#secure-programming-howto-2015) (2015)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Security Engineering - Second Edition** (#security-engineering-second-edition-2008) (2008)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Bulletproof SSL and TLS** (#-bulletproof-ssl-and-tls-2014) (2014) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Holistic Info-Sec for Web Developers (Fascicle 0)** (#holistic-info-sec-for-web-developers-fascicle-0-2016) (2016)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Holistic Info-Sec for Web Developers (Fascicle 1)** (#holistic-info-sec-for-web-developers-fascicle-1)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m* **Classes** (#classes)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Offensive Computer Security (CIS 4930) FSU** (#offensive-computer-security-cis-4930-fsu)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Hack Night** (#hack-night)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m* **Websites** (#websites)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Hack This Site!** (#hack-this-site)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Enigma Group** (#enigma-group)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Web App Sec Quiz** (#web-app-sec-quiz)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **SecurePasswords.info** (#securepasswords-info)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Security News Feeds Cheat-Sheet** (#security-news-feeds-cheat-sheet)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Open Security Training** (#open-security-training)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **MicroCorruption** (#microcorruption)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **The Matasano Crypto Challenges** (#the-matasano-crypto-challenges)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **PentesterLab** (#pentesterlab)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Juice Shop** (#juice-shop)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Supercar Showdown** (#supercar-showdown)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **OWASP NodeGoat** (#owasp-nodegoat)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Securing The Stack** (#securing-the-stack)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **OWASP ServerlessGoat** (#owasp-serverlessgoat)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Blogs** (#blogs)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Crypto Fails** (#crypto-fails)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **NCC Group - Blog** (#ncc-group-blog)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Scott Helme** (#scott-helme)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Cossack Labs blog** (#cossack-labs-blog-2018) (2018)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Wiki pages** (#wiki-pages)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **OWASP Top Ten Project** (#owasp-top-ten-project)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Tools** (#tools)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Qualys SSL Labs** (#qualys-ssl-labs)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **securityheaders.io** (#securityheaders-io)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **report-uri.io** (#report-uri-io)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **clickjacker.io** (#clickjacker-io)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAWS Lambda[0m[38;5;12m (#aws-lambda)[39m
|
||
[48;5;235m[38;5;249m* **Tools** (#tools-1)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **PureSec FunctionShield** (#puresec-functionshield)[49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAndroid[0m[38;5;12m (#android)[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **SEI CERT Android Secure Coding Standard** (#sei-cert-android-secure-coding-standard-2015) (2015)[49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mC[0m[38;5;12m (#c)[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-1)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **SEI CERT C Coding Standard** (#sei-cert-c-coding-standard-2006) (2006)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Defensive Coding: A Guide to Improving Software Security by the Fedora Security Team** (#defensive-coding-a-guide-to-improving-software-security-by-the-fedora-security-team-2022) (2022)[49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mC++[0m[38;5;12m (#c-1)[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-2)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **SEI CERT C++ Coding Standard** (#sei-cert-c-coding-standard-2006-1) (2006)[49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mC Sharp[0m[38;5;12m (#c-sharp)[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-3)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Security Driven .NET** (#-security-driven-net-2015) (2015) !**nonfree** (img/nonfree.png)[49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mClojure[0m[38;5;12m (#clojure)[39m
|
||
[48;5;235m[38;5;249m* **Repositories** (#repositories)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Clojure OWASP** (#clojure-owasp-2020) (2020)[49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGo[0m[38;5;12m (#go)[39m
|
||
[48;5;235m[38;5;249m* **Articles** (#articles-1)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Memory Security in Go - spacetime.dev** (#memory-security-in-go-spacetime-dev-2017) (2017)[49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mJava[0m[38;5;12m (#java)[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-4)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **SEI CERT Java Coding Standard** (#sei-cert-java-coding-standard-2007) (2007)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Secure Coding Guidelines for Java SE** (#secure-coding-guidelines-for-java-se-2014) (2014)[49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNode.js[0m[38;5;12m (#node-js)[39m
|
||
[48;5;235m[38;5;249m* **Articles** (#articles-2)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Node.js Security Checklist - Rising Stack Blog** (#node-js-security-checklist-rising-stack-blog-2015) (2015)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Awesome Electron.js hacking & pentesting resources** (#awesome-electron-js-hacking-pentesting-resources-2020) (2020)[49m[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-5)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Essential Node.js Security** (#-essential-node-js-security-2017) (2017) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m* **Training** (#training)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Security Training by ^Lift Security** (#-security-training-by-lift-security) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Security Training from BinaryMist** (#-security-training-from-binarymist) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPHP[0m[38;5;12m (#php)[39m
|
||
[48;5;235m[38;5;249m* **Articles** (#articles-3)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **It's All About Time** (#its-all-about-time-2014) (2014)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Secure Authentication in PHP with Long-Term Persistence** (#secure-authentication-in-php-with-long-term-persistence-2015) (2015)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **20 Point List For Preventing Cross-Site Scripting In PHP** (#20-point-list-for-preventing-cross-site-scripting-in-php-2013) (2013)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **25 PHP Security Best Practices For Sys Admins** (#25-php-security-best-practices-for-sys-admins-2011) (2011)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **PHP data encryption primer** (#php-data-encryption-primer-2014) (2014)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Preventing SQL Injection in PHP Applications - the Easy and Definitive Guide** (#preventing-sql-injection-in-php-applications-the-easy-and-definitive-guide-2014) (2014)[49m[39m
|
||
[48;5;235m[38;5;249m * **You Wouldn't Base64 a Password - Cryptography Decoded** (#you-wouldnt-base64-a-password-cryptography-decoded-2015) (2015)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **A Guide to Secure Data Encryption in PHP Applications** (#a-guide-to-secure-data-encryption-in-php-applications-2015) (2015)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **The 2018 Guide to Building Secure PHP Software** (#the-2018-guide-to-building-secure-php-software-2017) (2017)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-6)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Securing PHP: Core Concepts** (#-securing-php-core-concepts) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Using Libsodium in PHP Projects** (#using-libsodium-in-php-projects)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m* **Useful libraries** (#useful-libraries)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **defuse/php-encryption** (#defusephp-encryption)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **ircmaxell/password_compat** (#ircmaxellpassword-compat)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **ircmaxell/RandomLib** (#ircmaxellrandomlib)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **thephpleague/oauth2-server** (#thephpleagueoauth2-server)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **paragonie/random_compat** (#paragonierandom-compat)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **psecio/gatekeeper** (#pseciogatekeeper)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **openwall/phpass** (#openwallphpass)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m* **Websites** (#websites-1)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **websec.io** (#websec-io)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Blogs** (#blogs-1)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Paragon Initiative Enterprises Blog** (#paragon-initiative-enterprises-blog)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **ircmaxell's blog** (#ircmaxells-blog)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Pádraic Brady's Blog** (#p%C3%A1draic-bradys-blog)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Mailing lists** (#mailing-lists)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Securing PHP Weekly** (#securing-php-weekly)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPerl[0m[38;5;12m (#perl)[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-7)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **SEI CERT Perl Coding Standard** (#sei-cert-perl-coding-standard-2011) (2011)[49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPython[0m[38;5;12m (#python)[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-8)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Python chapter of Fedora Defensive Coding Guide** (#python-chapter-of-fedora-defensive-coding-guide)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Black Hat Python: Python Programming for Hackers and Pentesters** (#-black-hat-python-python-programming-for-hackers-and-pentesters) !**nonfree** (img/nonfree.png)[49m[39m
|
||
[48;5;235m[38;5;249m * **Violent Python** (#-violent-python) !**nonfree** (img/nonfree.png)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m* **Websites** (#websites-2)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **OWASP Python Security Wiki** (#owasp-python-security-wiki-2014) (2014)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRuby[0m[38;5;12m (#ruby)[39m
|
||
[48;5;235m[38;5;249m* **Books and ebooks** (#books-and-ebooks-9)[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||
[48;5;235m[38;5;249m * **Secure Ruby Development Guide** (#secure-ruby-development-guide-2014) (2014)[49m[39m
|
||
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mGeneral[0m
|
||
|
||
[38;2;255;187;0m[4mArticles[0m
|
||
|
||
[38;5;14m[1m[4mHow to Safely Generate a Random Number[0m[38;2;255;187;0m[4m (http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: February 25, 2014[39m
|
||
|
||
[38;5;12mAdvice on cryptographically secure pseudo-random number generators.[39m
|
||
|
||
[38;5;14m[1m[4mSalted Password Hashing - Doing it Right[0m[38;2;255;187;0m[4m (https://crackstation.net/hashing-security.htm) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: August 6, 2014[39m
|
||
|
||
[38;5;12mA post on [39m[38;5;14m[1mCrackstation[0m[38;5;12m (https://crackstation.net), a project by [39m[38;5;14m[1mDefuse Security[0m[38;5;12m (https://defuse.ca)[39m
|
||
|
||
[38;5;14m[1m[4mA good idea with bad usage: /dev/urandom[0m[38;2;255;187;0m[4m (http://insanecoding.blogspot.co.uk/2014/05/a-good-idea-with-bad-usage-devurandom.html) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: May 3, 2014[39m
|
||
|
||
[38;5;12mMentions many ways to make [39m[48;5;235m[38;5;249m/dev/urandom[49m[39m[38;5;12m fail on Linux/BSD.[39m
|
||
|
||
[38;5;14m[1m[4mWhy Invest in Application Security?[0m[38;2;255;187;0m[4m (https://paragonie.com/white-paper/2015-why-invest-application-security) (2015)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: June 21, 2015[39m
|
||
|
||
[38;5;12mRunning[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mbusiness[39m[38;5;12m [39m[38;5;12mrequires[39m[38;5;12m [39m[38;5;12mbeing[39m[38;5;12m [39m[38;5;12mcost-conscious[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mminimizing[39m[38;5;12m [39m[38;5;12munnecessary[39m[38;5;12m [39m[38;5;12mspending.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mbenefits[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mensuring[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12minvisible[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mcompanies,[39m[38;5;12m [39m[38;5;12mso[39m[38;5;12m [39m[38;5;12moften[39m[38;5;12m [39m[38;5;12mtimes[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mneglect[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m
|
||
[38;5;12minvest[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mdevelopment[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcost-saving[39m[38;5;12m [39m[38;5;12mmeasure.[39m[38;5;12m [39m[38;5;12mWhat[39m[38;5;12m [39m[38;5;12mthese[39m[38;5;12m [39m[38;5;12mcompanies[39m[38;5;12m [39m[38;5;12mdon't[39m[38;5;12m [39m[38;5;12mrealize[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m[38;5;12mcost[39m[38;5;12m [39m[38;5;12m(both[39m[38;5;12m [39m[38;5;12mfinancial[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbrand[39m[38;5;12m [39m[38;5;12mreputation)[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mpreventable[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mcompromise[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mincur.[39m
|
||
|
||
[38;5;14m[1mThe average data breach costs millions of dollars in damage.[0m
|
||
|
||
[38;5;12mInvesting more time and personnel to develop secure software is, for most companies, worth it to minimize this unnecessary risk to their bottom line.[39m
|
||
|
||
[38;5;14m[1m[4mBe wary of one-time pads and other crypto unicorns[0m[38;2;255;187;0m[4m (https://freedom-to-tinker.com/blog/jbonneau/be-wary-of-one-time-pads-and-other-crypto-unicorns/) (2015)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: March 25, 2015[39m
|
||
|
||
[38;5;12mA [39m[38;5;14m[1mmust-read[0m[38;5;12m for anyone looking to build their own cryptography features.[39m
|
||
|
||
[38;2;255;187;0m[4mBooks[0m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mWeb Application Hacker's Handbook[0m[38;2;255;187;0m[4m (http://mdsec.net/wahh) (2011)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: September 27, 2011[39m
|
||
|
||
[38;5;12mGreat introduction to Web Application Security; though slightly dated.[39m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mCryptography Engineering[0m[38;2;255;187;0m[4m (http://www.amazon.com/Cryptography-Engineering-Principles-Practical-Applications/dp/0470474246) (2010)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: March 15, 2010[39m
|
||
|
||
[38;5;12mDevelops a sense of professional paranoia while presenting crypto design techniques.[39m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mSecuring DevOps[0m[38;2;255;187;0m[4m (https://www.manning.com/books/securing-devops?a_aid=securingdevops&a_bid=1353bcd8) (2018)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: March 1, 2018[39m
|
||
|
||
[38;5;12mSecuring[39m[38;5;12m [39m[38;5;12mDevOps[39m[38;5;12m [39m[38;5;12mexplores[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtechniques[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDevOps[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mapplied[39m[38;5;12m [39m[38;5;12mtogether[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mmake[39m[38;5;12m [39m[38;5;12mcloud[39m[38;5;12m [39m[38;5;12mservices[39m[38;5;12m [39m[38;5;12msafer.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mintroductory[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12mreviews[39m[38;5;12m [39m[38;5;12mstate[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mart[39m[38;5;12m [39m[38;5;12mpractices[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msecuring[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m
|
||
[38;5;12mapplications[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12minfrastructure,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mteaches[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mtechniques[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mintegrate[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mdirectly[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mproduct.[39m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mGray Hat Python: Programming for Hackers and Reverse Engineers[0m[38;2;255;187;0m[4m (http://www.amazon.com/Gray-Hat-Python-Programming-Engineers/dp/1593271921) (2009)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: May 3, 2009[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m [0m[38;2;255;187;0m[4m(img/nonfree.png)[0m[38;2;255;187;0m[4m [0m[38;5;14m[1m[4mThe[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mArt[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mof[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mSoftware[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mSecurity[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mAssessment:[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mIdentifying[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mand[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mPreventing[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mSoftware[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mVulnerabilities[0m[38;2;255;187;0m[4m [0m[38;2;255;187;0m[4m(http://www.amazon.com/The-Software-Security-Assessment-Vulnerabilities/dp/0321444426/)[0m[38;2;255;187;0m[4m [0m
|
||
[38;2;255;187;0m[4m(2006)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: November 30, 2006[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mC Interfaces and Implementations: Techniques for Creating Reusable Software[0m[38;2;255;187;0m[4m (http://www.amazon.com/Interfaces-Implementations-Techniques-Creating-Reusable/dp/0201498413/) (1996)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: August 30, 1996[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mReversing: Secrets of Reverse Engineering[0m[38;2;255;187;0m[4m (http://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817) (2005)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: April 15, 2005[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mJavaScript: The Good parts[0m[38;2;255;187;0m[4m (http://www.amazon.com/JavaScript-Good-Parts-Douglas-Crockford/dp/0596517742) (2008)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: May 1, 2008[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mWindows Internals: Including Windows Server 2008 and Windows Vista, Fifth Edition [0m[38;2;255;187;0m[4m (http://www.amazon.com/Windows%C2%AE-Internals-Including-Developer-Reference/dp/0735625301) (2007)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: June 17, 2007[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mThe Mac Hacker's Handbook[0m[38;2;255;187;0m[4m (http://www.amazon.com/The-Hackers-Handbook-Charlie-Miller/dp/0470395362) (2009)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: March 3, 2009[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mThe IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler[0m[38;2;255;187;0m[4m (http://www.amazon.com/The-IDA-Pro-Book-Disassembler/dp/1593271786) (2008)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: August 22, 2008[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m [0m[38;2;255;187;0m[4m(img/nonfree.png)[0m[38;2;255;187;0m[4m [0m[38;5;14m[1m[4mInternetworking[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mwith[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mTCP/IP[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mVol.[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mII:[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mANSI[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mC[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mVersion:[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mDesign,[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mImplementation,[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mand[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mInternals[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4m(3rd[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mEdition)[0m[38;2;255;187;0m[4m [0m
|
||
[38;2;255;187;0m[4m(http://www.amazon.com/Internetworking-TCP-Vol-Implementation-Internals/dp/0139738436)[0m[38;2;255;187;0m[4m [0m[38;2;255;187;0m[4m(1998)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: June 25, 1998[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m [0m[38;2;255;187;0m[4m(img/nonfree.png)[0m[38;2;255;187;0m[4m [0m[38;5;14m[1m[4mNetwork[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mAlgorithmics,:[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mAn[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mInterdisciplinary[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mApproach[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mto[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mDesigning[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mFast[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mNetworked[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mDevices[0m[38;2;255;187;0m[4m [0m
|
||
[38;2;255;187;0m[4m(http://www.amazon.com/Network-Algorithmics-Interdisciplinary-Designing-Networking/dp/0120884771)[0m[38;2;255;187;0m[4m [0m[38;2;255;187;0m[4m(2004)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: December 29, 2004[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mComputation Structures (MIT Electrical Engineering and Computer Science)[0m[38;2;255;187;0m[4m (http://www.amazon.com/Computation-Structures-Electrical-Engineering-Computer/dp/0262231395) (1989)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: December 13, 1989[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m [0m[38;2;255;187;0m[4m(img/nonfree.png)[0m[38;2;255;187;0m[4m [0m[38;5;14m[1m[4mSurreptitious[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mSoftware:[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mObfuscation,[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mWatermarking,[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mand[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mTamperproofing[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mfor[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mSoftware[0m[38;5;14m[1m[4m [0m[38;5;14m[1m[4mProtection[0m[38;2;255;187;0m[4m [0m
|
||
[38;2;255;187;0m[4m(http://www.amazon.com/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing/dp/0321549252)[0m[38;2;255;187;0m[4m [0m[38;2;255;187;0m[4m(2009)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: August 3, 2009[39m
|
||
|
||
|
||
|
||
[38;5;14m[1m[4mSecure Programming HOWTO[0m[38;2;255;187;0m[4m (http://www.dwheeler.com/secure-programs/) (2015)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: March 1, 2015[39m
|
||
|
||
|
||
|
||
[38;5;14m[1m[4mSecurity Engineering - Second Edition[0m[38;2;255;187;0m[4m (https://www.cl.cam.ac.uk/~rja14/book.html) (2008)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: April 14, 2008[39m
|
||
|
||
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mBulletproof SSL and TLS[0m[38;2;255;187;0m[4m (https://www.feistyduck.com/books/bulletproof-ssl-and-tls/) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: August 1, 2014[39m
|
||
|
||
|
||
|
||
[38;5;14m[1m[4mHolistic Info-Sec for Web Developers (Fascicle 0)[0m[38;2;255;187;0m[4m (https://leanpub.com/holistic-infosec-for-web-developers) (2016)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: September 17, 2016[39m
|
||
|
||
[38;5;12mThe[39m[38;5;12m [39m[38;5;12mfirst[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mthree[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12mseries[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12mbroad[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12min-depth[39m[38;5;12m [39m[38;5;12mcoverage[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12marchitects[39m[38;5;12m [39m[38;5;12mneed[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mknow[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcreate[39m[38;5;12m [39m[38;5;12mrobust,[39m[38;5;12m [39m[38;5;12mreliable,[39m[38;5;12m [39m[38;5;12mmaintainable[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msoftware,[39m[38;5;12m [39m[38;5;12mnetworks[39m
|
||
[38;5;12mand[39m[38;5;12m [39m[38;5;12mother,[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mdelivered[39m[38;5;12m [39m[38;5;12mcontinuously,[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mtime,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mno[39m[38;5;12m [39m[38;5;12mnasty[39m[38;5;12m [39m[38;5;12msurprises.[39m
|
||
|
||
[38;5;14m[1m[4mHolistic Info-Sec for Web Developers (Fascicle 1)[0m[38;2;255;187;0m[4m (https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications)[0m
|
||
|
||
[38;5;12mThe[39m[38;5;12m [39m[38;5;12msecond[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mthree[39m[38;5;12m [39m[38;5;12mpart[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12mseries[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12mbroad[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12min-depth[39m[38;5;12m [39m[38;5;12mcoverage[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12marchitects[39m[38;5;12m [39m[38;5;12mneed[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mknow[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcreate[39m[38;5;12m [39m[38;5;12mrobust,[39m[38;5;12m [39m[38;5;12mreliable,[39m[38;5;12m [39m[38;5;12mmaintainable[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msoftware,[39m[38;5;12m [39m[38;5;12mVPS,[39m[38;5;12m [39m
|
||
[38;5;12mnetworks,[39m[38;5;12m [39m[38;5;12mcloud[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplications,[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mdelivered[39m[38;5;12m [39m[38;5;12mcontinuously,[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mtime,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mno[39m[38;5;12m [39m[38;5;12mnasty[39m[38;5;12m [39m[38;5;12msurprises.[39m
|
||
|
||
[38;2;255;187;0m[4mClasses[0m
|
||
|
||
[38;5;14m[1m[4mOffensive Computer Security (CIS 4930) FSU[0m[38;2;255;187;0m[4m (https://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/)[0m
|
||
|
||
[38;5;12mA vulnerability research and exploit development class by Owen Redwood of Florida State University. [39m
|
||
|
||
[38;5;14m[1mBe sure to check out the [0m[38;5;12mlectures[39m[38;5;14m[1m (https://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html)![0m
|
||
|
||
[38;5;14m[1m[4mHack Night[0m[38;2;255;187;0m[4m (https://github.com/isislab/Hack-Night)[0m
|
||
|
||
[38;5;12mDeveloped[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmaterials[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mNYU[39m[38;5;12m [39m[38;5;12mPoly's[39m[38;5;12m [39m[38;5;12mold[39m[38;5;12m [39m[38;5;12mPenetration[39m[38;5;12m [39m[38;5;12mTesting[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mVulnerability[39m[38;5;12m [39m[38;5;12mAnalysis[39m[38;5;12m [39m[38;5;12mcourse,[39m[38;5;12m [39m[38;5;12mHack[39m[38;5;12m [39m[38;5;12mNight[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msobering[39m[38;5;12m [39m[38;5;12mintroduction[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12moffensive[39m[38;5;12m [39m[38;5;12msecurity.[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mlot[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcomplex[39m[38;5;12m [39m[38;5;12mtechnical[39m[38;5;12m [39m[38;5;12mcontent[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mcovered[39m[38;5;12m [39m
|
||
[38;5;12mvery[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mstudents[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mintroduced[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mwide[39m[38;5;12m [39m[38;5;12mvariety[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcomplex[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mimmersive[39m[38;5;12m [39m[38;5;12mtopics[39m[38;5;12m [39m[38;5;12mover[39m[38;5;12m [39m[38;5;12mthirteen[39m[38;5;12m [39m[38;5;12mweeks.[39m
|
||
|
||
[38;2;255;187;0m[4mWebsites[0m
|
||
|
||
[38;5;14m[1m[4mHack This Site![0m[38;2;255;187;0m[4m (http://www.hackthissite.org)[0m
|
||
|
||
[38;5;12mLearn about application security by attempting to hack this website.[39m
|
||
|
||
[38;5;14m[1m[4mEnigma Group[0m[38;2;255;187;0m[4m (http://www.enigmagroup.org)[0m
|
||
|
||
[38;5;12mWhere hackers and security experts come to train.[39m
|
||
|
||
[38;5;14m[1m[4mWeb App Sec Quiz[0m[38;2;255;187;0m[4m (https://timoh6.github.io/WebAppSecQuiz/)[0m
|
||
|
||
[38;5;12mSelf-assessment quiz for web application security[39m
|
||
|
||
[38;5;14m[1m[4mSecurePasswords.info[0m[38;2;255;187;0m[4m (https://securepasswords.info)[0m
|
||
|
||
[38;5;12mSecure passwords in several languages/frameworks.[39m
|
||
|
||
[38;5;14m[1m[4mSecurity News Feeds Cheat-Sheet[0m[38;2;255;187;0m[4m (http://lzone.de/cheat-sheet/Security-News-Feeds)[0m
|
||
|
||
[38;5;12mA list of security news sources.[39m
|
||
|
||
[38;5;14m[1m[4mOpen Security Training[0m[38;2;255;187;0m[4m (http://opensecuritytraining.info/)[0m
|
||
|
||
[38;5;12mVideo courses on low-level x86 programming, hacking, and forensics.[39m
|
||
|
||
[38;5;14m[1m[4mMicroCorruption[0m[38;2;255;187;0m[4m (https://microcorruption.com/login)[0m
|
||
|
||
[38;5;12mCapture The Flag - Learn Assembly and Embedded Device Security[39m
|
||
|
||
[38;5;14m[1m[4mThe Matasano Crypto Challenges[0m[38;2;255;187;0m[4m (http://cryptopals.com)[0m
|
||
|
||
[38;5;12mA[39m[38;5;12m [39m[38;5;12mseries[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mprogramming[39m[38;5;12m [39m[38;5;12mexercises[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mteaching[39m[38;5;12m [39m[38;5;12moneself[39m[38;5;12m [39m[38;5;12mcryptography[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mMatasano[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;12m [39m[38;5;12m(http://matasano.com).[39m[38;5;12m [39m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1mintroduction[0m[38;5;12m [39m[38;5;12m(https://blog.pinboard.in/2013/04/the_matasano_crypto_challenges)[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mMaciej[39m[38;5;12m [39m
|
||
[38;5;12mCeglowski[39m[38;5;12m [39m[38;5;12mexplains[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mwell.[39m
|
||
|
||
[38;5;14m[1m[4mPentesterLab[0m[38;2;255;187;0m[4m (https://pentesterlab.com)[0m
|
||
|
||
[38;5;12mPentesterLab provides [39m[38;5;14m[1mfree Hands-On exercises[0m[38;5;12m (https://pentesterlab.com/exercises/) and a [39m[38;5;14m[1mbootcamp[0m[38;5;12m (https://pentesterlab.com/bootcamp/) to get started.[39m
|
||
|
||
[38;5;14m[1m[4mJuice Shop[0m[38;2;255;187;0m[4m (https://bkimminich.github.io/juice-shop)[0m
|
||
|
||
[38;5;12mAn intentionally insecure Javascript Web Application.[39m
|
||
|
||
[38;5;14m[1m[4mSupercar Showdown[0m[38;2;255;187;0m[4m (http://hackyourselffirst.troyhunt.com/)[0m
|
||
|
||
[38;5;12mHow to go on the offence before online attackers do.[39m
|
||
|
||
[38;5;14m[1m[4mOWASP NodeGoat[0m[38;2;255;187;0m[4m (https://github.com/owasp/nodegoat)[0m
|
||
|
||
[38;5;12mPurposly[39m[38;5;12m [39m[38;5;12mvulnerable[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mOWASP[39m[38;5;12m [39m[38;5;12mTop[39m[38;5;12m [39m[38;5;12m10[39m[38;5;12m [39m[38;5;12mNode.JS[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplication,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;14m[1mtutorials[0m[38;5;12m [39m[38;5;12m(https://nodegoat.herokuapp.com/tutorial),[39m[38;5;12m [39m[38;5;14m[1msecurity[0m[38;5;14m[1m [0m[38;5;14m[1mregression[0m[38;5;14m[1m [0m[38;5;14m[1mtesting[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mOWASP[0m[38;5;14m[1m [0m[38;5;14m[1mZap[0m[38;5;14m[1m [0m[38;5;14m[1mAPI[0m[38;5;12m [39m
|
||
[38;5;12m(https://github.com/OWASP/NodeGoat/wiki/NodeGoat-Security-Regression-tests-with-ZAP-API),[39m[38;5;12m [39m[38;5;14m[1mdocker[0m[38;5;14m[1m [0m[38;5;14m[1mimage[0m[38;5;12m [39m[38;5;12m(https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker).[39m[38;5;12m [39m[38;5;12mWith[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12moptions[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mget[39m[38;5;12m [39m[38;5;12mup[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||
[38;5;12mrunning[39m[38;5;12m [39m[38;5;12mfast.[39m
|
||
|
||
[38;5;14m[1m[4mSecuring The Stack[0m[38;2;255;187;0m[4m (https://securingthestack.com)[0m
|
||
|
||
[38;5;12mBi-Weekly Appsec Tutorials[39m
|
||
|
||
[38;5;14m[1m[4mOWASP ServerlessGoat[0m[38;2;255;187;0m[4m (https://www.owasp.org/index.php/OWASP_Serverless_Goat)[0m
|
||
|
||
[38;5;12mOWASP[39m[38;5;12m [39m[38;5;12mServerlessGoat[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mdeliberately[39m[38;5;12m [39m[38;5;12minsecure[39m[38;5;12m [39m[38;5;12mrealistic[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12mLambda[39m[38;5;12m [39m[38;5;12mserverless[39m[38;5;12m [39m[38;5;12mapplication,[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mOWASP[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcreated[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mPureSec[0m[38;5;12m [39m[38;5;12m(https://www.puresec.io/).[39m[38;5;12m [39m[38;5;12mYou[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12minstall[39m[38;5;12m [39m[38;5;12mWebGoat,[39m[38;5;12m [39m[38;5;12mlearn[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m
|
||
[38;5;12mvulnerabilities,[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mthem,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mremediate[39m[38;5;12m [39m[38;5;12meach[39m[38;5;12m [39m[38;5;12missue.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mproject[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12mdocumentation[39m[38;5;12m [39m[38;5;12mexplaining[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12missues[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mremediated[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mbest-practices.[39m
|
||
|
||
[38;2;255;187;0m[4mBlogs[0m
|
||
|
||
[38;5;14m[1m[4mCrypto Fails[0m[38;2;255;187;0m[4m (http://cryptofails.com)[0m
|
||
|
||
[38;5;12mShowcasing bad cryptography[39m
|
||
|
||
[38;5;14m[1m[4mNCC Group - Blog[0m[38;2;255;187;0m[4m (https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/)[0m
|
||
|
||
[38;5;12mThe blog of NCC Group, formerly Matasano, iSEC Partners, and NGS Secure.[39m
|
||
|
||
[38;5;14m[1m[4mScott Helme[0m[38;2;255;187;0m[4m (https://scotthelme.co.uk)[0m
|
||
|
||
[38;5;12mLearn about security and performance.[39m
|
||
|
||
[38;5;14m[1m[4mCossack Labs blog[0m[38;2;255;187;0m[4m (https://www.cossacklabs.com/blog-archive/) (2018)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: July 30, 2018[39m
|
||
|
||
[38;5;12mBlog of cryptographic company that makes open-source libraries and tools, and describes practical data security approaches for applications and infrastructures.[39m
|
||
|
||
[38;2;255;187;0m[4mWiki pages[0m
|
||
|
||
[38;5;14m[1m[4mOWASP Top Ten Project[0m[38;2;255;187;0m[4m (https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project)[0m
|
||
|
||
[38;5;12mThe top ten most common and critical security vulnerabilities found in web applications.[39m
|
||
|
||
[38;2;255;187;0m[4mTools[0m
|
||
|
||
[38;5;14m[1m[4mQualys SSL Labs[0m[38;2;255;187;0m[4m (https://www.ssllabs.com/)[0m
|
||
|
||
[38;5;12mThe infamous suite of SSL and TLS tools.[39m
|
||
|
||
[38;5;14m[1m[4msecurityheaders.io[0m[38;2;255;187;0m[4m (https://securityheaders.io/)[0m
|
||
|
||
[38;5;12mQuickly and easily assess the security of your HTTP response headers.[39m
|
||
|
||
[38;5;14m[1m[4mreport-uri.io[0m[38;2;255;187;0m[4m (https://report-uri.io)[0m
|
||
|
||
[38;5;12mA free CSP and HPKP reporting service.[39m
|
||
|
||
[38;5;14m[1m[4mclickjacker.io[0m[38;2;255;187;0m[4m (https://clickjacker.io)[0m
|
||
|
||
[38;5;12mTest and learn Clickjacking. Make clickjacking PoC, take screenshot and share link. You can test HTTPS, HTTP, intranet & internal sites.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAWS Lambda[0m
|
||
|
||
[38;2;255;187;0m[4mTools[0m
|
||
|
||
[38;5;14m[1m[4mPureSec FunctionShield[0m[38;2;255;187;0m[4m (https://www.puresec.io/function-shield)[0m
|
||
|
||
[38;5;12mFunctionShield is a 100% free AWS Lambda security and Google Cloud Functions security library that equips developers with the ability to easily enforce strict security controls on serverless runtimes.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAndroid[0m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;5;14m[1m[4mSEI CERT Android Secure Coding Standard[0m[38;2;255;187;0m[4m (https://www.securecoding.cert.org/confluence/display/android/Android+Secure+Coding+Standard) (2015)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: February 24, 2015[39m
|
||
|
||
[38;5;12mA community-maintained Wiki detailing secure coding standards for Android development.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mC[0m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;5;14m[1m[4mSEI CERT C Coding Standard[0m[38;2;255;187;0m[4m (https://www.securecoding.cert.org/confluence/display/c/SEI+CERT+C+Coding+Standard) (2006)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: May 24, 2006[39m
|
||
|
||
[38;5;12mA community-maintained Wiki detailing secure coding standards for C programming.[39m
|
||
|
||
[38;5;14m[1m[4mDefensive Coding: A Guide to Improving Software Security by the Fedora Security Team[0m[38;2;255;187;0m[4m (https://docs.fedoraproject.org/en-US/Fedora_Security_Team/1/html/Defensive_Coding/index.html) (2022)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: May 23, 2022[39m
|
||
|
||
[38;5;12mProvides guidelines for improving software security through secure coding. Covers common programming languages and libraries, and focuses on concrete recommendations.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mC++[0m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;5;14m[1m[4mSEI CERT C++ Coding Standard[0m[38;2;255;187;0m[4m (https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=637) (2006)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: July 18, 2006[39m
|
||
|
||
[38;5;12mA community-maintained Wiki detailing secure coding standards for C++ programming.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mC Sharp[0m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mSecurity Driven .NET[0m[38;2;255;187;0m[4m (http://securitydriven.net/) (2015)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: July 14, 2015[39m
|
||
|
||
[38;5;12mAn introduction to developing secure applications targeting version 4.5 of the .NET Framework, specifically covering cryptography and security engineering topics.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mClojure[0m
|
||
|
||
[38;2;255;187;0m[4mRepositories[0m
|
||
|
||
[38;5;14m[1m[4mClojure OWASP[0m[38;2;255;187;0m[4m (https://github.com/nubank/clj-owasp) (2020)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: May 5, 2020[39m
|
||
|
||
[38;5;12mRepository with Clojure examples of OWASP top 10 vulnerabilities.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mGo[0m
|
||
|
||
[38;2;255;187;0m[4mArticles[0m
|
||
|
||
[38;5;14m[1m[4mMemory Security in Go - spacetime.dev[0m[38;2;255;187;0m[4m (https://spacetime.dev/memory-security-go) (2017)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: August 3, 2017[39m
|
||
|
||
[38;5;12mA guide to managing sensitive data in memory.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mJava[0m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;5;14m[1m[4mSEI CERT Java Coding Standard[0m[38;2;255;187;0m[4m (https://www.securecoding.cert.org/confluence/display/java/SEI+CERT+Oracle+Coding+Standard+for+Java) (2007)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: January 12, 2007[39m
|
||
|
||
[38;5;12mA community-maintained Wiki detailing secure coding standards for Java programming.[39m
|
||
|
||
[38;5;14m[1m[4mSecure Coding Guidelines for Java SE[0m[38;2;255;187;0m[4m (http://www.oracle.com/technetwork/java/seccodeguide-139067.html) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: April 2, 2014[39m
|
||
|
||
[38;5;12mSecure Java programming guidelines straight from Oracle.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mNode.js[0m
|
||
|
||
[38;2;255;187;0m[4mArticles[0m
|
||
|
||
[38;5;14m[1m[4mNode.js Security Checklist - Rising Stack Blog[0m[38;2;255;187;0m[4m (https://blog.risingstack.com/node-js-security-checklist/) (2015)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: October 13, 2015[39m
|
||
|
||
[38;5;12mCovers a lot of useful information for developing secure Node.js applications.[39m
|
||
|
||
[38;5;14m[1m[4mAwesome Electron.js hacking & pentesting resources[0m[38;2;255;187;0m[4m (https://github.com/doyensec/awesome-electronjs-hacking) (2020)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: June 17, 2020[39m
|
||
|
||
[38;5;12mA curated list of resources to secure Electron.js-based applications.[39m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mEssential Node.js Security[0m[38;2;255;187;0m[4m (https://leanpub.com/nodejssecurity) (2017)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: July 19, 2017[39m
|
||
|
||
[38;5;12mHands-on and abundant with source code for a practical guide to Securing Node.js web applications.[39m
|
||
|
||
[38;2;255;187;0m[4mTraining[0m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mSecurity Training by ^Lift Security[0m[38;2;255;187;0m[4m (https://liftsecurity.io/training)[0m
|
||
|
||
[38;5;12mLearn from the team that spearheaded the [39m[38;5;14m[1mNode Security Project[0m[38;5;12m (https://nodesecurity.io)[39m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mSecurity Training from BinaryMist[0m[38;2;255;187;0m[4m (https://blog.binarymist.net/presentations-publications/)[0m
|
||
|
||
[38;5;12mWe[39m[38;5;12m [39m[38;5;12mrun[39m[38;5;12m [39m[38;5;12mmany[39m[38;5;12m [39m[38;5;12mtypes[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12minfo-sec[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mtraining,[39m[38;5;12m [39m[38;5;12mcovering[39m[38;5;12m [39m[38;5;12mPhysical,[39m[38;5;12m [39m[38;5;12mPeople,[39m[38;5;12m [39m[38;5;12mVPS,[39m[38;5;12m [39m[38;5;12mNetwors,[39m[38;5;12m [39m[38;5;12mCloud,[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mApplications.[39m[38;5;12m [39m[38;5;12mMost[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcontent[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12msourced[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;14m[1mbook[0m[38;5;14m[1m [0m[38;5;14m[1mseries[0m[38;5;12m [39m
|
||
[38;5;12m(https://leanpub.com/b/holisticinfosecforwebdevelopers)[39m[38;5;12m [39m[38;5;12mKim[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m[38;5;12mworking[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12myears.[39m[38;5;12m [39m[38;5;12mMore[39m[38;5;12m [39m[38;5;12minfo[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mfound[39m[38;5;12m [39m[38;5;14m[1mhere[0m[38;5;12m [39m[38;5;12m(https://binarymist.io/#services)[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPHP[0m
|
||
|
||
[38;2;255;187;0m[4mArticles[0m
|
||
|
||
[38;5;14m[1m[4mIt's All About Time[0m[38;2;255;187;0m[4m (http://blog.ircmaxell.com/2014/11/its-all-about-time.html) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: November 28, 2014[39m
|
||
|
||
[38;5;12mA gentle introduction to timing attacks in PHP applications[39m
|
||
|
||
[38;5;14m[1m[4mSecure Authentication in PHP with Long-Term Persistence[0m[38;2;255;187;0m[4m (https://paragonie.com/blog/2015/04/secure-authentication-php-with-long-term-persistence) (2015)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: April 21, 2015[39m
|
||
|
||
[38;5;12mDiscusses password policies, password storage, "remember me" cookies, and account recovery.[39m
|
||
|
||
[38;5;14m[1m[4m20 Point List For Preventing Cross-Site Scripting In PHP[0m[38;2;255;187;0m[4m (http://blog.astrumfutura.com/2013/04/20-point-list-for-preventing-cross-site-scripting-in-php) (2013)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: April 22, 2013[39m
|
||
|
||
[38;5;12mPadriac Brady's advice on building software that isn't vulnerable to XSS[39m
|
||
|
||
[38;5;14m[1m[4m25 PHP Security Best Practices For Sys Admins[0m[38;2;255;187;0m[4m (http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html) (2011)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: November 23, 2011[39m
|
||
|
||
[38;5;12mThough this article is a few years old, much of its advice is still relevant as we veer around the corner towards PHP 7.[39m
|
||
|
||
[38;5;14m[1m[4mPHP data encryption primer[0m[38;2;255;187;0m[4m (https://timoh6.github.io/2014/06/16/PHP-data-encryption-cheatsheet.html) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: June 16, 2014[39m
|
||
|
||
[38;5;12m@timoh6 explains implementing data encryption in PHP[39m
|
||
|
||
[38;5;14m[1m[4mPreventing SQL Injection in PHP Applications - the Easy and Definitive Guide[0m[38;2;255;187;0m[4m (https://paragonie.com/blog/2015/05/preventing-sql-injection-in-php-applications-easy-and-definitive-guide) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: May 26, 2014[39m
|
||
|
||
[38;5;14m[1mTL;DR[0m[38;5;12m - don't escape, use prepared statements instead![39m
|
||
|
||
[38;5;14m[1m[4mYou Wouldn't Base64 a Password - Cryptography Decoded[0m[38;2;255;187;0m[4m (https://paragonie.com/blog/2015/08/you-wouldnt-base64-a-password-cryptography-decoded) (2015)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: August 7, 2015[39m
|
||
|
||
[38;5;12mA human-readable overview of commonly misused cryptography terms and fundamental concepts, with example code in PHP.[39m
|
||
|
||
[38;5;12mIf you're confused about cryptography terms, start here.[39m
|
||
|
||
[38;5;14m[1m[4mA Guide to Secure Data Encryption in PHP Applications[0m[38;2;255;187;0m[4m (https://paragonie.com/white-paper/2015-secure-php-data-encryption) (2015)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: August 2, 2015[39m
|
||
|
||
[38;5;12mDiscusses[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mimportance[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mend-to-end[39m[38;5;12m [39m[38;5;12mnetwork-layer[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12m(HTTPS)[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mwell[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mrest,[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[38;5;12mintroduces[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12mcryptography[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m
|
||
[38;5;12mcases,[39m[38;5;12m [39m[38;5;12mwhether[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;14m[1mlibsodium[0m[38;5;12m [39m[38;5;12m(https://pecl.php.net/package/libsodium),[39m[38;5;12m [39m[38;5;14m[1mDefuse[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity's[0m[38;5;14m[1m [0m[38;5;14m[1msecure[0m[38;5;14m[1m [0m[38;5;14m[1mPHP[0m[38;5;14m[1m [0m[38;5;14m[1mencryption[0m[38;5;14m[1m [0m[38;5;14m[1mlibrary[0m[38;5;12m [39m[38;5;12m(https://github.com/defuse/php-encryption),[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mOpenSSL.[39m
|
||
|
||
[38;5;14m[1m[4mThe 2018 Guide to Building Secure PHP Software[0m[38;2;255;187;0m[4m (https://paragonie.com/blog/2017/12/2018-guide-building-secure-php-software) (2017)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: December 12, 2017[39m
|
||
|
||
[38;5;12mThis guide should serve as a complement to the e-book, [39m[38;5;14m[1mPHP: The Right Way[0m[38;5;12m (http://www.phptherightway.com), with a strong emphasis on security and not general PHP programmer topics (e.g. code style).[39m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mSecuring PHP: Core Concepts[0m[38;2;255;187;0m[4m (https://leanpub.com/securingphp-coreconcepts)[0m
|
||
|
||
[48;2;30;30;40m[38;5;13m[3mSecuring PHP: Core Concepts[0m[38;5;12m acts as a guide to some of the most common security terms and provides some examples of them in every day PHP.[39m
|
||
|
||
[38;5;14m[1m[4mUsing Libsodium in PHP Projects[0m[38;2;255;187;0m[4m (https://paragonie.com/book/pecl-libsodium)[0m
|
||
|
||
[38;5;12mYou[39m[38;5;12m [39m[38;5;12mshouldn't[39m[38;5;12m [39m[38;5;12mneed[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mPh.D[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mApplied[39m[38;5;12m [39m[38;5;12mCryptography[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbuild[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplication.[39m[38;5;12m [39m[38;5;12mEnter[39m[38;5;12m [39m[38;5;12mlibsodium,[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mallows[39m[38;5;12m [39m[38;5;12mdevelopers[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdevelop[39m[38;5;12m [39m[38;5;12mfast,[39m[38;5;12m [39m[38;5;12msecure,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mreliable[39m[38;5;12m [39m[38;5;12mapplications[39m[38;5;12m [39m[38;5;12mwithout[39m[38;5;12m [39m[38;5;12mneeding[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mknow[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m
|
||
[38;5;12mstream[39m[38;5;12m [39m[38;5;12mcipher[39m[38;5;12m [39m[38;5;12meven[39m[38;5;12m [39m[38;5;12mis.[39m
|
||
|
||
[38;2;255;187;0m[4mUseful libraries[0m
|
||
|
||
[38;5;14m[1m[4mdefuse/php-encryption[0m[38;2;255;187;0m[4m (https://github.com/defuse/php-encryption)[0m
|
||
|
||
[38;5;12mSymmetric-key encryption library for PHP applications. ([39m[38;5;14m[1mRecommended[0m[38;5;12m over rolling your own!)[39m
|
||
|
||
[38;5;14m[1m[4mircmaxell/password_compat[0m[38;2;255;187;0m[4m (https://github.com/ircmaxell/password_compat)[0m
|
||
|
||
[38;5;12mIf you're using PHP 5.3.7+ or 5.4, use this to hash passwords[39m
|
||
|
||
[38;5;14m[1m[4mircmaxell/RandomLib[0m[38;2;255;187;0m[4m (https://github.com/ircmaxell/RandomLib)[0m
|
||
|
||
[38;5;12mUseful for generating random strings or numbers[39m
|
||
|
||
[38;5;14m[1m[4mthephpleague/oauth2-server[0m[38;2;255;187;0m[4m (https://github.com/thephpleague/oauth2-server)[0m
|
||
|
||
[38;5;12mA secure OAuth2 server implementation[39m
|
||
|
||
[38;5;14m[1m[4mparagonie/random_compat[0m[38;2;255;187;0m[4m (https://github.com/paragonie/random_compat)[0m
|
||
|
||
[38;5;12mPHP 7 offers a new set of CSPRNG functions: [39m[48;5;235m[38;5;249mrandom_bytes()[49m[39m[38;5;12m and [39m[48;5;235m[38;5;249mrandom_int()[49m[39m[38;5;12m. This is a community effort to expose the same API in PHP 5 projects (forward compatibility layer). Permissively MIT licensed.[39m
|
||
|
||
[38;5;14m[1m[4mpsecio/gatekeeper[0m[38;2;255;187;0m[4m (https://github.com/psecio/gatekeeper)[0m
|
||
|
||
[38;5;12mA[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12mauthentication[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mauthorization[39m[38;5;12m [39m[38;5;12mlibrary[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mimplements[39m[38;5;12m [39m[38;5;12mRole-Based[39m[38;5;12m [39m[38;5;12mAccess[39m[38;5;12m [39m[38;5;12mControls[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mParagon[39m[38;5;12m [39m[38;5;12mInitiative[39m[38;5;12m [39m[38;5;12mEnterprises'[39m[38;5;12m [39m[38;5;12mrecommendaitons[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;14m[1msecure[0m[38;5;14m[1m [0m[38;5;14m[1m"remember[0m[38;5;14m[1m [0m[38;5;14m[1mme"[0m[38;5;14m[1m [0m[38;5;14m[1mcheckboxes[0m[38;5;12m [39m
|
||
[38;5;12m(https://paragonie.com/blog/2015/04/secure-authentication-php-with-long-term-persistence#title.2).[39m
|
||
|
||
[38;5;14m[1m[4mopenwall/phpass[0m[38;2;255;187;0m[4m (http://www.openwall.com/phpass/)[0m
|
||
|
||
[38;5;12mA portable public domain password hashing framework for use in PHP applications.[39m
|
||
|
||
[38;2;255;187;0m[4mWebsites[0m
|
||
|
||
[38;5;14m[1m[4mwebsec.io[0m[38;2;255;187;0m[4m (http://websec.io)[0m
|
||
|
||
[38;5;14m[1mwebsec.io[0m[38;5;12m is dedicated to educating developers about security with topics relating to general security fundamentals, emerging technologies and PHP-specific information[39m
|
||
|
||
[38;2;255;187;0m[4mBlogs[0m
|
||
|
||
[38;5;14m[1m[4mParagon Initiative Enterprises Blog[0m[38;2;255;187;0m[4m (https://paragonie.com/blog/)[0m
|
||
|
||
[38;5;12mThe blog of our technology and security consulting firm based in Orlando, FL[39m
|
||
|
||
[38;5;14m[1m[4mircmaxell's blog[0m[38;2;255;187;0m[4m (http://blog.ircmaxell.com)[0m
|
||
|
||
[38;5;12mA blog about PHP, Security, Performance and general web application development.[39m
|
||
|
||
[38;5;14m[1m[4mPádraic Brady's Blog[0m[38;2;255;187;0m[4m (http://blog.astrumfutura.com)[0m
|
||
|
||
[38;5;12mPádraic Brady is a Zend Framework security expert[39m
|
||
|
||
[38;2;255;187;0m[4mMailing lists[0m
|
||
|
||
[38;5;14m[1m[4mSecuring PHP Weekly[0m[38;2;255;187;0m[4m (http://securingphp.com)[0m
|
||
|
||
[38;5;12mA weekly newsletter about PHP, security, and the community.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPerl[0m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;5;14m[1m[4mSEI CERT Perl Coding Standard[0m[38;2;255;187;0m[4m (https://www.securecoding.cert.org/confluence/display/perl/SEI+CERT+Perl+Coding+Standard) (2011)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: January 10, 2011[39m
|
||
|
||
[38;5;12mA community-maintained Wiki detailing secure coding standards for Perl programming.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPython[0m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;5;14m[1m[4mPython chapter of Fedora Defensive Coding Guide[0m[38;2;255;187;0m[4m (https://docs.fedoraproject.org/en-US/Fedora_Security_Team/1/html/Defensive_Coding/chap-Defensive_Coding-Python.html)[0m
|
||
|
||
[38;5;12mLists standard library features that should be avoided, and references sections of other chapters that are Python-specific.[39m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mBlack Hat Python: Python Programming for Hackers and Pentesters[0m[38;2;255;187;0m[4m (https://www.nostarch.com/blackhatpython)[0m
|
||
|
||
[38;5;12mBlack Hat Python by Justin Seitz from NoStarch Press is a great book for the offensive security minds[39m
|
||
|
||
[38;2;255;187;0m[4m![0m[38;5;14m[1m[4mnonfree[0m[38;2;255;187;0m[4m (img/nonfree.png) [0m[38;5;14m[1m[4mViolent Python[0m[38;2;255;187;0m[4m (http://www.amazon.com/Violent-Python-Cookbook-Penetration-Engineers/dp/1597499579)[0m
|
||
|
||
[38;5;12mViolent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation.[39m
|
||
|
||
[38;2;255;187;0m[4mWebsites[0m
|
||
|
||
[38;5;14m[1m[4mOWASP Python Security Wiki[0m[38;2;255;187;0m[4m (https://github.com/ebranca/owasp-pysec/wiki) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: June 21, 2014[39m
|
||
|
||
[38;5;12mA wiki maintained by the OWASP Python Security project.[39m
|
||
|
||
[38;5;12m [39m[38;2;255;187;0m[1m[4mRuby[0m
|
||
|
||
[38;2;255;187;0m[4mBooks and ebooks[0m
|
||
|
||
[38;5;14m[1m[4mSecure Ruby Development Guide[0m[38;2;255;187;0m[4m (https://docs.fedoraproject.org/en-US/Fedora_Security_Team/1/html/Secure_Ruby_Development_Guide/index.html) (2014)[0m
|
||
|
||
[38;5;14m[1mReleased[0m[38;5;12m: March 10, 2014[39m
|
||
|
||
[38;5;12mA guide to secure Ruby development by the Fedora Security Team. Also available on [39m[38;5;14m[1mGithub[0m[38;5;12m (https://github.com/jrusnack/secure-ruby-development-guide).[39m
|