Atulpriya SharmaforCodeRabbit Blogcoderabbit-blog.hashnode.dev·Dec 16, 2024How to Automate OWASP Security Reviews in Your Pull Requests?The increasing reliance on web applications has made security a paramount concern for organizations worldwide. As they become more integrated, robust security is crucial. Recent reports indicate a rise in AI-driven attacks, with over 500,000 inciden...owasp
Jamessilent-byte.hashnode.dev·Dec 12, 2024Certified AppSec Practitioner (CAP) Exam: A Comprehensive OverviewI just passed the Certified AppSec Practitioner (CAP) exam, and I'm excited to share my experience, and resource used to prepare and important topics!. Something I Wanna Say: I believe the most exciting way to prepare for this exam is to dive into e...47 readsSecops Certification Reviews & Resourcesappsec
RookieCoderrookiecoder21.hashnode.dev·Dec 11, 2024🔐 SSL Pinning in Flutter: Your App’s Private BouncerImagine your app as an exclusive VIP party. Data flows in and out like guests at the door. But what if someone sneaks in wearing a fake ID? That’s where SSL Pinning comes in—it’s the bouncer that checks credentials, kicks out imposters, and ensures y...52 readsSSL
jamarirjamarir.hashnode.dev·Dec 1, 2024[OWASP MASTG] Android - DIVA (Damn Insecure and Vulnerable App)Just another Lab Setup / ADB / JADX / Apktool / Frida / Logcat / Native Lib / Insecure Storage / Input Validation / Access Control Write-up. Github page. Web page. APK link. OWASP page. DIVA (Damn insecure and vulnerable App) is an [Android] App int...65 readsMobileCTF
Bittu Sharmabittublog.hashnode.dev·Dec 1, 2024Starting Out with OWASP Dependency Check: Securing Your SoftwareOWASP Dependency Check is a software composition analysis (SCA) tool that identifies project dependencies with known vulnerabilities. It helps developers and security professionals identify and mitigate potential risks associated with using vulnerabl...owasp
Shaik Mustafadevopsprojects77.hashnode.dev·Nov 23, 2024Containerizing the application using Docker by implementing CI/CD tool Jenkins 🚀In this project, we leverage Jenkins to create a robust CI/CD pipeline that integrates tools like Docker, Trivy, SonarQube, and OWASP Dependency Check to deliver secure and high-quality software. Tools used: GitHub Jenkins Docker OWASP Trivy So...92 likes·391 readstvivy
Ali Iqbaljenkins-route.hashnode.dev·Nov 23, 2024Jenkins Mega ProjectBuilding a project having state of art technologies with 6 different stages and code having more the 15 components. Data Flow Diagram Tech stack used in this project: GitHub (Code) Docker (Containerization) Jenkins (CI) OWASP (Dependency check)...Jenkins
Daawar Panditdawar.hashnode.dev·Nov 3, 2024DevSecOps Pipeline Project: Deploy Netflix Clone on Kubernetes with MonitoringOverview: This project involves deploying a Netflix clone application on Kubernetes, focusing on strong DevSecOps practices. The CI/CD pipeline uses Docker and Jenkins and includes SonarQube for checking code quality, Trivy and Dependency-Check for s...18 likes·3.0K readsDevops
J3bitokjebitok.hashnode.dev·Nov 2, 2024Web Hacking: OWASP Top 10 - 2021 (TryHackMe)In this article, I will write a write-up for OWASP Top 10 - 2021 that covers Broken Access Control, IDOR Challenge, Cryptographic Failures with Support Materials and Challenges, Injection, Command Injection, Insecure Design, Secure Misconfiguration, ...88 readsowasp
Programmer Teloprogrammertelo.hashnode.dev·Oct 17, 2024How to Install BWAP on WSL 2 Ubuntu with DockerIf you're interested in practicing web application security testing, bWAPP (Buggy Web Application) is a fantastic tool. In this guide, I’ll walk you through setting up bWAPP on WSL 2 Ubuntu using Docker, assuming you've already installed WSL 2 and Ub...Cyber Securityowasp