Forem

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Modern AppSec Needs Location-Aware Security Testing
Cover image for Why Modern AppSec Needs Location-Aware Security Testing

Why Modern AppSec Needs Location-Aware Security Testing

Comments
4 min read
🧭 Dominando el OWASP Top 10 (Edición 2025): El Plano de Seguridad para la Próxima Generación
Cover image for 🧭 Dominando el OWASP Top 10 (Edición 2025): El Plano de Seguridad para la Próxima Generación

🧭 Dominando el OWASP Top 10 (Edición 2025): El Plano de Seguridad para la Próxima Generación

Comments
4 min read
Fundamentos de AppSec: Protegiendo el Corazón de tus Aplicaciones
Cover image for Fundamentos de AppSec: Protegiendo el Corazón de tus Aplicaciones

Fundamentos de AppSec: Protegiendo el Corazón de tus Aplicaciones

Comments
4 min read
🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque
Cover image for 🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque

🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque

Comments
3 min read
I launched an automated App & API security platform. What would make you rely on it continuously?

I launched an automated App & API security platform. What would make you rely on it continuously?

Comments
1 min read
Secure file upload validation in .NET: A layered approach
Cover image for Secure file upload validation in .NET: A layered approach

Secure file upload validation in .NET: A layered approach

1
Comments
8 min read
Week 4 Scripting Exercise: Analyze HTTP Response Headers

Week 4 Scripting Exercise: Analyze HTTP Response Headers

Comments 1
9 min read
VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

Comments
8 min read
SQL Injection Audit Challenge Week 1
Cover image for SQL Injection Audit Challenge Week 1

SQL Injection Audit Challenge Week 1

Comments
27 min read
OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)
Cover image for OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)

OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)

Comments
51 min read
OWASP Top 10 2025 Quiz: Week 1 (51 Questions)

OWASP Top 10 2025 Quiz: Week 1 (51 Questions)

Comments
25 min read
JWT Token Validator Challenge
Cover image for JWT Token Validator Challenge

JWT Token Validator Challenge

2
Comments
8 min read
Password Generator Challenge
Cover image for Password Generator Challenge

Password Generator Challenge

5
Comments 3
7 min read
API Request Limiter Challenge

API Request Limiter Challenge

Comments
10 min read
Unpacking Application Security: A Comprehensive Threat Modeling Guide

Unpacking Application Security: A Comprehensive Threat Modeling Guide

1
Comments
12 min read
Applying Bandit SAST Tool to Secure Python Applications

Applying Bandit SAST Tool to Secure Python Applications

1
Comments 1
3 min read
🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

1
Comments
4 min read
Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)
Cover image for Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

1
Comments
4 min read
My Firebase Webapp almost got pwned by a bot. Then another bot saved it.
Cover image for My Firebase Webapp almost got pwned by a bot. Then another bot saved it.

My Firebase Webapp almost got pwned by a bot. Then another bot saved it.

Comments
1 min read
OWASP Cornucopia Companion Edition
Cover image for OWASP Cornucopia Companion Edition

OWASP Cornucopia Companion Edition

3
Comments
2 min read
Configuration Management: 12 factor, Factor III

Configuration Management: 12 factor, Factor III

Comments
3 min read
What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know
Cover image for What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know

What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know

1
Comments 1
4 min read
No need to fear the clouds. Play OWASP Cumulus!
Cover image for No need to fear the clouds. Play OWASP Cumulus!

No need to fear the clouds. Play OWASP Cumulus!

2
Comments 1
4 min read
Does the AI do the threat modeling of your software?
Cover image for Does the AI do the threat modeling of your software?

Does the AI do the threat modeling of your software?

Comments
3 min read
🔵 Chapter 02 – Ruby Language Fundamentals (Line by Line for Absolute Beginners)

🔵 Chapter 02 – Ruby Language Fundamentals (Line by Line for Absolute Beginners)

Comments
2 min read
loading...