1 - ASVS-checklist-en.xlsx
1 - Injection.html
1 - Introduction OWASP top 10 2017
1 - OWASP-Application-Security-Verification-Standard-4.0.3-en.pdf
1 - OWASP-Top-10-2017-en.pdf
2 - Broken Authentication and Session management.html
2 - OWASP-course-v1.4.pdf
2 - UPDATED OWASP top 10 2021
2 - WAS.pdf
2 - owasp-course-resources-urls.zip
3 - A-novel-technique-to-prevent-SQL-injection-and-cross-site-scripting-attacks.pdf
3 - CrossSite Scripting XSS.html
3 - Defeating-SQL-Injection.pdf
3 - Injection
3 - OWASP-Top-10-2017-Release-Candidate1-English.pdf
3 - You-shall-not-pass-Mitigating-SQL-Injection-Attacks-on-Legacy-Web-Applications.pdf
4 - Broken Authentication and Session management
4 - Root-Cause-Analysis-of-Session-Management-and-Broken-Authentication-Vulnerabilities.docx
5 - CrossSite Scripting XSS
5 - Cross-Site-Scripting-Prevention-OWASP-Cheat-Sheet-Series.pdf
5 - Cross-site-scripting-links.docx
5 - OWASP has a cheatsheet that you can use to reduce the likelihood ofXSS attacks.txt
5 - Security Misconfiguration.html
6 - Broken Access Control
6 - Broken-Access-Control-OWASP-Foundation.pdf
6 - Broken-Access-Control-links.docx
6 - Sensitive data exposure.html
7 - CIS-Benchmarks.pdf
7 - Insufficient attack protection.html
7 - Security Misconfiguration
7 - Security-misconfiguration-links.docx
8 - CrossSite Request Forgery.html
8 - Sensitive Data Exposure
8 - Sensitive-data-exposure-links.docx
8 - robotex.zip
9 - Insufficient Attack Protection
9 - Insufficient-attact-protection-links.docx
9 - Threat-Modeling-OWASP-Cheat-Sheet-Series.pdf
9 - Using component with known vulnerabilities.html
10 - CrossSite Request Forgery CSRF
10 - Cross-Site-Request-Forgery-CSRF-OWASP-Foundation.pdf
10 - Robust-defenses-for-cross-site-request-forgery.pdf
10 - Underprotected APIs.html
11 - A06-Vulnerable-and-Outdated-Components-OWASP-Top-10-2021.pdf
11 - Using Components with Known Vulnerabilities
11 - Using-components-with-known-vulnerabilities-links.docx
11 - free-resource.zip
12 - AUTHENTICATION-AND-AUTHORIZATION-IN-MICROSERVICE-BASED-SYSTEMS-SURVEY-OF-ARCHITECTURE-PATTERNS.pdf
12 - SECURING-MICROSERVICES-AND-MICROSERVICE-ARCHITECTURES-A-SYSTEMATIC-MAPPING-STUDY.pdf
12 - Underprotected APIs
12 - Underprotected-APIs-links.docx
12 - microservices-API-security.pdf
12 - rest-en-api-security.zip