Skip to content

Latest commit

 

History

History
343 lines (279 loc) · 16.2 KB

CONTRIBUTOR-V1.md

File metadata and controls

343 lines (279 loc) · 16.2 KB

Contributors to the initial version of the project

If you want to modify something regarding the mention made to you (typo/link to your profile/etc), feel free to submit a PR with the expected content. Same approach if you think that we have forgotten someone.

Sorting applied on the name is an alphabetical one.

AJAX Security Cheat Sheet

  • Michael Eddington
  • Til Mas

Abuse Case Cheat Sheet

Access Control Cheat Sheet

Attack Surface Analysis Cheat Sheet

Authentication Cheat Sheet

  • Eoin Keary eoinkeary
  • Jim Manico - jim@owasp.org
  • Manuel Aude Morales
  • Pawel Krawczyk
  • Sven Neuhaus
  • Timo Goosen

Authorization Testing Automation Cheat Sheet

Bean Validation Cheat Sheet

C-Based Toolchain Hardening Cheat Sheet

C-Based Toolchain Hardening Cheat Sheet

Choosing and Using Security Questions Cheat Sheet

  • Kevin Wall - kevin.w.wall@gmail com

Clickjacking Defense Cheat Sheet

Content Security Policy Cheat Sheet

Credential Stuffing Prevention Cheat Sheet

  • Brad Causey

Cross-Site Request Forgery Prevention Cheat Sheet

Cross Site Scripting Prevention Cheat Sheet

Cryptographic Storage Cheat Sheet

DOM based XSS Prevention Cheat Sheet

Denial of Service Cheat Sheet

Deserialization Cheat Sheet

Docker Security Cheat Sheet

DotNet Security Cheat Sheet

Error Handling Cheat Sheet

Forgot Password Cheat Sheet

HTML5 Security Cheat Sheet

HTTP Strict Transport Security Cheat Sheet

  • Daniel Black
  • Jim Manico
  • Michael Coates
  • Pawel Krawczyk
  • Til Maas

Injection Prevention Cheat Sheet

Injection Prevention Cheat Sheet in Java

Input Validation Cheat Sheet

Insecure Direct Object Reference Prevention Cheat Sheet

JAAS Cheat Sheet

JSON Web Token Cheat Sheet for Java

Key Management Cheat Sheet

LDAP Injection Prevention Cheat Sheet

Logging Cheat Sheet

Mass Assignment Cheat Sheet

OS Command Injection Defense Cheat Sheet

PHP Configuration Cheat Sheet

Password Storage Cheat Sheet

Pinning Cheat Sheet

Protect FileUpload Against Malicious File

Query Parameterization Cheat Sheet

REST Assessment Cheat Sheet

REST Security Cheat Sheet

Ruby on Rails Cheatsheet

SAML Security Cheat Sheet

SQL Injection Prevention Cheat Sheet

Secure Cloud Architecture Cheat Sheet

Securing Cascading Style Sheets Cheat Sheet

Session Management Cheat Sheet

TLS Cipher String Cheat Sheet

Third Party Javascript Management Cheat Sheet

Threat Modeling Cheat Sheet

  • Ahmed Kanoma
  • Mohamed Alfateh

Transaction Authorization Cheat Sheet

  • Adam Lange
  • Adam Zachara, SecuRing
  • Andrzej Kleśnicki, Qualys
  • Francois-Eric Guyomarch, HID Global
  • James Holland, HID Global
  • Milan Khan, HID Global
  • Steven Wierckx, Toreon
  • Sven Thomassin, PwC BE - Technology Consulting
  • Sławomir Jasek, SecuRing
  • Wojciech Dworakowski - wojciech.dworakowski@securing.pl

Transport Layer Protection Cheat Sheet

Unvalidated Redirects and Forwards Cheat Sheet

User Privacy Protection Cheat Sheet

  • Mohammed ALDOUB

Virtual Patching Cheat Sheet

Vulnerability Disclosure Cheat Sheet

Vulnerable Dependency Management Cheat Sheet

Web Service Security Cheat Sheet

XML External Entity Prevention Cheat Sheet

XML Security Cheat Sheet