Broken Access Controlarrow-up-right
Broken Authenticationarrow-up-right
Cross Site Scripting (XSS)arrow-up-right
Injectionarrow-up-right
Insecure Deserializationarrow-up-right
Insufficient Logging Monitoringarrow-up-right
Security Misconfigurationarrow-up-right
Sensitive Data Exposurearrow-up-right
Using Components With Known Vulnerabilitiesarrow-up-right
XML External Entities (XXE)arrow-up-right
Advisorarrow-up-right
DependencyCheckarrow-up-right
NPM Auditarrow-up-right
NPM Audit HTMLarrow-up-right
Gitleaksarrow-up-right
Infisicalarrow-up-right
Retire.jsarrow-up-right
Burp Suitearrow-up-right
CSRL Testerarrow-up-right
HCaptchaarrow-up-right
Nikto2arrow-up-right
Observatory Mozillaarrow-up-right
OWASP Zaparrow-up-right
Security Headersarrow-up-right
social-engineer-toolkit (SET)arrow-up-right
SSL Trustarrow-up-right
TypingDNAarrow-up-right
Virus Totalarrow-up-right
zphisherarrow-up-right
Firefox Monitorarrow-up-right
Haveibeenpwnedarrow-up-right
OWASParrow-up-right
Crackersarrow-up-right
Hackersarrow-up-right
Anchorearrow-up-right
Blumiraarrow-up-right
BridgeCrewarrow-up-right
Dopplerarrow-up-right
Ottoarrow-up-right
Prisma Cloudarrow-up-right
Snykarrow-up-right
SonarQubearrow-up-right
Sonar Qube SASTarrow-up-right
Sysdigarrow-up-right
Last updated 10 months ago