OWASP TOP 10 Presentation about OWASP Top 10. All the texts from the vulnerabilities were extracted from the official document. OWASP TOP 10 DOCUMENT What's OWASP OWASP (Open Web Application Security Project) is an organization that provides unbiased and practical, cost-effective information about computer and Internet applications. What's OWASP TOP 10 The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
All-in-one vulnerability intelligence platform for prioritizing remediation efforts and driving security strategies.
A LinkedIn reconnaissance tool for gathering information about companies and individuals on the platform.
LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.
Simple script to check a domain's email protections and identify vulnerabilities.
A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.
Automate Google Hacking Database scraping and searching with Pagodo, a tool for finding vulnerabilities and sensitive information.
An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
Dnscan is a DNS reconnaissance tool that performs DNS scans, DNS cache snooping, and DNS amplification attack detection.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.