OWASP Foundation is a non-profit organization focused on improving the security of software. It provides a wide range of resources, including documentation, cheat sheets, and training, to help developers and security professionals improve the security of their applications. The organization is driven by volunteers and offers a variety of resources, including the Top Ten, ASVS, and cheat sheets, to help individuals improve the security of their applications. OWASP also hosts conferences and training events, such as the Global AppSec conference, to bring together security professionals and provide a platform for knowledge sharing and networking. The organization's mission is to make the internet a safer place by providing free and open-source resources to the global community.
FEATURES
ALTERNATIVES
Advanced vulnerability assessment tool for gaining visibility and preventing cyber attacks.
Audits JavaScript projects for known vulnerabilities and outdated package versions using OSS Index v3 REST API.
Vulnerable Android application for learning security concepts.
A GitHub App that monitors GitHub organizations or repositories for adherence to security best practices and detects policy violations.
A list of vulnerable applications for testing and learning
A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.
XGuardian XARA Security Scanner for OSX with URL scheme, Bundle ID, and keychain hijack checks.
Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.