An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionable examples, and real-world scenarios for beginners and advanced security testers.
The repository is organized based on OWASP Testing Guide categories. Click on any section below to access the files directly.
Category | Description | Access |
---|---|---|
01 WSTG-INFO |
Information gathering and reconnaissance testing. | View Files |
02 WSTG-CONF |
Configuration and deployment management testing. | View Files |
03 WSTG-IDNT |
Testing for identity management flaws. | View Files |
04 WSTG-ATHN |
Authentication security testing. | View Files |
05 WSTG-ATHZ |
Authorization and access control testing. | View Files |
06 WSTG-SESS |
Session management testing. | View Files |
07 WSTG-INPV |
Input validation testing for injection vulnerabilities. | View Files |
08 WSTG-ERRH |
Error handling and logging security testing. | View Files |
09 WSTG-CRYP |
Cryptography testing for data protection mechanisms. | View Files |
10 WSTG-BUSLOGIC |
Business logic security testing. | View Files |
11 WSTG-CLIENT |
Client-side security testing for browser-based vulnerabilities. | View Files |
12 WSTG-APIT |
API testing for RESTful and GraphQL security vulnerabilities. | View Files |
13 Application-Function-Checklists |
Secure testing of critical app functionalities systematically. | View Files |
-
Clone the Repository:
git clone https://github.com/C0NQR0R/Enhanced-OWASP-TestingGuide-v4.2.git
-
Access Files Online:
- Use the clickable links in this README to navigate to the specific files directly from the repository.
-
Apply and Contribute:
- Explore the test cases, actionable examples, and enhanced scenarios.
- Contribute back by improving existing cases or adding new vulnerabilities.
- Enhanced Testing Guide: Includes tips, tricks, and insights for every attack vector.
- New Vulnerabilities: Highlights test cases for issues not listed in the OWASP guide.
- Real-World Scenarios: Actionable examples to address real-world challenges.
- Modular Structure: Organized by OWASP categories for easy navigation.
We welcome contributions to enhance the repository. To contribute:
- Fork the repository.
- Create a new branch for your changes.
- Submit a pull request with a detailed explanation of your updates.
Let’s work together to secure applications!