-
Updated
Feb 15, 2021 - Python
appsec
Here are 137 public repositories matching this topic...
-
Updated
Feb 13, 2021 - Python
-
Updated
Feb 11, 2021 - JavaScript
-
Updated
Oct 6, 2020 - Python
-
Updated
Feb 4, 2021 - Ruby
-
Updated
Jul 19, 2020 - Shell
What's the issue?
Overwritten test scenario, can be summarized and link to payload lists from other repos
How do we solve it?
Chop down the content to the required and needed information, link to payload lists instead of enumerating all possible usernames and passwords, provide further guidance on how to test.
If no one is up to handle it, I can take care of it
-
Updated
Jun 11, 2019
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number
-
Updated
Feb 16, 2021 - HTML
Authentication via Azure/aad-pod-identity for keyvault access could be a good feature to avoid use of clientId/ clientSecret in chart values. Don't you think ?
-
Updated
Feb 16, 2021 - Java
-
Updated
Feb 7, 2021
https://github.com/OWASP/www-community/blob/master/pages/CRV2_AppThreatModeling.md
Contains a bunch of HTML based tables that need attention. They did not auto-migrate well and at a certain point break the rendering of the majority of the page.
-
Updated
Oct 16, 2019 - Go
-
Updated
Feb 16, 2021 - HTML
-
Updated
Feb 9, 2021 - Dockerfile
-
Updated
Aug 7, 2020
It will be a fun exercise to make scan work for mono repos such as https://github.com/swapnil-linux/spring-boot-examples
In theory, this can be achieved using a bit of bash with the new scan AppImage.
If HTTP sites (is not HTTPS ones) use the Access-Control-Allow-Origin header then the site will typically not work.
ZAP should automatically fix this header.
https://stackoverflow.com/questions/61940616/how-do-i-work-with-http-sites-using-the-hud-in-owasps-zap-proxy
-
Updated
Feb 16, 2021 - Scala
-
Updated
Oct 1, 2020
-
Updated
Feb 1, 2021 - Python
-
Updated
Dec 5, 2020 - Python
-
Updated
Sep 23, 2020
-
Updated
Nov 23, 2020 - Java
-
Updated
Feb 1, 2021 - Java
-
Updated
Jun 11, 2019 - PHP
-
Updated
Mar 24, 2019 - Python
Improve this page
Add a description, image, and links to the appsec topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the appsec topic, visit your repo's landing page and select "manage topics."
Describe the bug
I have been testing some test endpoints, where an xml file is returned. These tests get alert "A WSDL File has been detected.". I have been looking through the source code and found that Content-Type ".wsdl", "text/xml" or "application/wsdl+xml will trigger an alert (\zap\extension\soap\WSDLFilePassiveScanRule.java line 60-62). Some of the WSDL files will probably use text/xm