Overview
This page curates high-quality resources for deepening your understanding of web application security, ethical hacking, and secure development practices.Documentation
Official security standards and guidelines
Practice Labs
Hands-on vulnerability testing environments
Tools
Security testing and analysis tools
Official Security Standards
OWASP Resources
Core Documentation
Core Documentation
OWASP Top 10
- OWASP Top 10 2021 - Most critical web security risks
- OWASP Top 10 API Security 2023 - API-specific risks
- OWASP Mobile Top 10 - Mobile application security
- Web Security Testing Guide (WSTG) - Comprehensive testing methodology
- Application Security Verification Standard (ASVS) - Security requirements framework
- Software Assurance Maturity Model (SAMM) - Organizational security maturity
- Cheat Sheet Series - Quick reference for secure coding
- Proactive Controls - Top 10 security techniques
- Secure Coding Practices - Quick reference guide
OWASP Tools & Projects
OWASP Tools & Projects
Security Testing Tools
- ZAP (Zed Attack Proxy) - Web application security scanner
- Dependency-Check - Vulnerable component detection
- Amass - Attack surface mapping
- WebGoat - Deliberately insecure application
- Juice Shop - Modern vulnerable web app
- DVWA - Damn Vulnerable Web Application
- NodeGoat - Vulnerable Node.js application
MITRE Resources
CWE
Common Weakness EnumerationComprehensive dictionary of software weaknesses
- 900+ weakness types
- Hierarchical categorization
- Mitigation strategies
CAPEC
Common Attack PatternsDatabase of attack patterns and techniques
- Attack execution flows
- Prerequisites and indicators
- Mitigation approaches
CVE
Common VulnerabilitiesPublic database of security vulnerabilities
- Real-world CVE examples
- Vendor advisories
- Patch information
ATT&CK
Adversarial TacticsKnowledge base of attacker techniques
- Enterprise, Mobile, ICS matrices
- Threat actor profiles
- Detection strategies
Industry Standards
| Standard | Organization | Focus Area | Link |
|---|---|---|---|
| PCI DSS | PCI Security Standards Council | Payment card security | pcisecuritystandards.org |
| NIST CSF | NIST | Cybersecurity framework | nist.gov/cyberframework |
| ISO 27001 | ISO | Information security management | iso.org |
| CIS Controls | Center for Internet Security | Security best practices | cisecurity.org |
| GDPR | European Union | Data protection | gdpr.eu |
Practice Platforms & CTF
Vulnerable Applications
Beginner-Friendly Labs
Beginner-Friendly Labs
OWASP Projects
- Juice Shop - Modern SPA with 100+ challenges
- WebGoat - Interactive lessons with validation
- Security Shepherd - Gamified learning platform
- DVWA - Three difficulty levels
- bWAPP - 100+ web vulnerabilities
- Mutillidae - OWASP Top 10 coverage
- VulnHub - Downloadable vulnerable VMs
- HackTheBox Retired Machines - Web app challenges
- PortSwigger Web Security Academy - Free interactive labs
Advanced Practice
Advanced Practice
Capture The Flag (CTF) Platforms
- HackTheBox - Active and retired machines
- TryHackMe - Guided learning paths
- PentesterLab - Web penetration testing
- Root-Me - 400+ challenges
- OverTheWire - Wargames for learning
- HackerOne CTF - Real-world scenarios
- Bugcrowd University - Learning resources
- Intigriti Challenge - Monthly XSS challenges
Security Tools
Web Application Scanners
OWASP ZAP
Free & Open Source
- Automated vulnerability scanning
- Manual testing proxy
- API testing support
- Browser integration
Burp Suite
Industry Standard
- Intercepting proxy
- Advanced scanner (Pro)
- Extensive extensions
- Collaboration features
Nikto
Web Server Scanner
- 6,700+ dangerous files/CGIs
- Server configuration issues
- Outdated software detection
- Command-line interface
sqlmap
SQL Injection Tool
- Automated SQL injection
- Database fingerprinting
- Data extraction
- Out-of-band techniques
Specialized Testing Tools
Injection & XSS Testing
Injection & XSS Testing
SQL Injection
- sqlmap - Automated SQL injection
- jSQL Injection - GUI-based SQLi tool
- NoSQLMap - NoSQL injection
- XSStrike - Advanced XSS detection
- DOMPurify - XSS sanitizer
- XSS Hunter - Blind XSS discovery
- Commix - Command injection exploitation
- tplmap - Server-side template injection
Authentication & Session Testing
Authentication & Session Testing
Password Attacks
- Hydra - Network login cracker
- John the Ripper - Password hash cracker
- Hashcat - GPU-accelerated cracking
- CeWL - Custom wordlist generator
- Cookie Editor - Browser extension
- EditThisCookie - Cookie manager
- Session Buddy - Session management
API & Mobile Testing
API & Mobile Testing
API Testing
- Postman - API development and testing
- Insomnia - REST client
- GraphQL Voyager - GraphQL exploration
- Arjun - HTTP parameter discovery
Learning Resources
Books
Essential Reading
Essential Reading
Web Application Security
- The Web Application Hacker’s Handbook (2nd Ed) - Stuttard & Pinto
- Real-World Bug Hunting - Peter Yaworski
- Breaking into Information Security - Bryson Payne
- Web Security for Developers - Malcolm McDonald
- The Tangled Web - Michal Zalewski
- Secure by Design - Johnsson, Deogun, Sawano
- Iron-Clad Java - Manico & Detlefsen
- Defensive Security Handbook - Jacobs & Rudis
- The Hacker Playbook 3 - Peter Kim
- Penetration Testing - Georgia Weidman
- Metasploit: The Penetration Tester’s Guide - Kennedy et al.
- RTFM: Red Team Field Manual - Ben Clark
- Serious Cryptography - Jean-Philippe Aumasson
- Cryptography Engineering - Ferguson, Schneier, Kohno
Online Courses
Structured Learning Paths
Structured Learning Paths
Free Courses
- PortSwigger Web Security Academy - Comprehensive free labs
- OWASP Top 10 Course - Application Security Inc.
- Stanford CS 253 - Web Security
- Cybrary - Various security courses
- Offensive Security - OSCP, OSWE certifications
- SANS Cyber Aces - Tutorials and challenges
- Pluralsight Security Path - Video courses
- Udemy Security Courses - Various topics
- MIT 6.858 Computer Systems Security
- UC Berkeley CS 161 - Computer Security
Video Content
YouTube Channels & Conference Talks
YouTube Channels & Conference Talks
YouTube Channels
- LiveOverflow - CTF walkthroughs and security
- John Hammond - Hacking tutorials
- IppSec - HackTheBox walkthroughs
- STÖK - Bug bounty content
- Nahamsec - Web security and recon
- The Cyber Mentor - Ethical hacking
- DEF CON - Largest hacker conference
- Black Hat - Security research
- OWASP Global - Application security
- BSides - Community-driven events
Communities & Forums
Subreddits
- r/netsec - Network security news
- r/websecurity - Web app security
- r/AskNetsec - Security questions
- r/bugbounty - Bug bounty hunters
Discord & Slack
Communities
- OWASP Slack
- Bug Bounty Forum Discord
- HackTheBox Discord
- TryHackMe Discord
Twitter/X
Security Researchers
- @OWASP
- @naglinagli
- @hakluke
- @bugcrowd
Forums
Discussion Boards
Blogs & News
Security Blogs
Individual Researchers
Individual Researchers
- PortSwigger Research - Advanced web security research
- Google Project Zero - 0-day research
- Troy Hunt - Have I Been Pwned creator
- Krebs on Security - Investigative journalism
- Schneier on Security - Cryptography and security
- Daniel Miessler - Security, tech, and meaning
Company & Organization Blogs
Company & Organization Blogs
- OWASP Blog - Project updates and articles
- HackerOne Hacktivity - Disclosed vulnerabilities
- Bugcrowd Blog - Bug bounty insights
- Imperva Blog - Application security
- Cloudflare Blog - Internet security
- GitHub Security Lab - Open source security
News Aggregators
| Resource | Description | Link |
|---|---|---|
| The Hacker News | Latest cybersecurity news | thehackernews.com |
| Dark Reading | Enterprise security news | darkreading.com |
| Threatpost | Security news and analysis | threatpost.com |
| Bleeping Computer | Tech news and security | bleepingcomputer.com |
| /r/netsec | Community-curated security | reddit.com/r/netsec |
Python Security Libraries
Relevant to This Project
Certifications
Entry to Intermediate
Entry to Intermediate
Vendor-Neutral
- CompTIA Security+ - Foundation security concepts
- CEH (Certified Ethical Hacker) - EC-Council
- GIAC GSEC - SANS Security Essentials
- eWPT (eLearnSecurity Web Penetration Tester)
- GWAPT (GIAC Web Application Penetration Tester)
Advanced & Specialist
Advanced & Specialist
Offensive Security
- OSCP (Offensive Security Certified Professional) - Highly respected
- OSWE (Offensive Security Web Expert) - Advanced web testing
- OSCE (Offensive Security Certified Expert)
- CISSP (Certified Information Systems Security Professional)
- CSSLP (Certified Secure Software Lifecycle Professional)
- GIAC GWAPT - Advanced web app penetration testing
Security Newsletters
Stay updated with weekly/monthly digests:- tl;dr sec - AppSec and cloud security
- Risky Business - Security news podcast and newsletter
- API Security Weekly - API-specific security
- Web Security Newsletter - Web vulnerabilities
- OWASP Connector - Project updates
Responsible Disclosure
Disclosure Resources:Related Documentation Pages
OWASP Top 10
See how this project maps to OWASP categories
CWE References
Detailed CWE mappings for each vulnerability
Vulnerabilities
Start learning with SQL Injection
This resource list is continuously updated. Bookmark this page and check back regularly for new tools, platforms, and learning materials.