
WSTG - v4.2 | OWASP Foundation
WSTG - v4.2 on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
OWASP Web Security Testing Guide
The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and security professionals. The WSTG is a …
MASTG - OWASP Developer Guide
The OWASP Mobile Application Security Testing Guide is a comprehensive manual for mobile application security testing and reverse engineering. It describes the technical processes used …
WSTG - Latest - OWASP Foundation
This section describes the OWASP web application security testing methodology and explains how to test for evidence of vulnerabilities within the application due to deficiencies with …
OWASP Foundation, the Open Source Foundation for Application …
Nov 19, 2025 · OWASP Foundation, the Open Source Foundation for Application Security on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to …
ASVS - OWASP Developer Guide
ASVS The Application Security Verification Standard (ASVS) is a long established OWASP flagship project, and is widely used as a guide during the verification of web applications. It …
OWASP Application Security Curriculum
Now that your teams have an awareness of what they should be building for security we need to educate them in how they should build to successfully pass the OWASP standard for …
OWASP Mobile Application Security
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile application security testing. A fundamental learning resource for both beginners and …
The Mobile Application Security Verification Standard - OWASP
It's important to have a good understanding of mobile app security concepts, as well as the relevant tools and techniques used for mobile app security testing and assessment.
Vulnerability Scanning Tools | OWASP Foundation
Web Application Vulnerability Scanners are automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as Cross-site scripting, SQL Injection, …