The Big List of Naughty Strings : The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
How to systematically secure anything : Security engineering is the discipline of building secure systems.
Its lessons are not just applicable to computer security. In fact this repo aims to...
The SaaS CTO Security Checklist : This is a basic checklist that all SaaS CTOs (and anyone else) can use to harden their security. Security shouldn’t feel like a chore. Select your sta...
SQL Injection Cheat Sheet : Samples are provided to allow reader to get basic idea of a potential SQL Injection attack and almost every section includes a brief information about...
API Security Checklist : Checklist of the most important security countermeasures when designing, testing, and releasing your API.
Exploit database separated by exploit type (local, remote, DoS, Poc, etc.)