Skip to content
#

best-practices-for-securing-web-applications

Here is 1 public repository matching this topic...

The project explores three major web application vulnerabilities—SQL Injection (SQLi), Cross-Site Scripting (XSS), and Command Injection—by leveraging Nikto and other offensive security tools within a controlled penetration testing environment.

  • Updated Feb 6, 2025

Improve this page

Add a description, image, and links to the best-practices-for-securing-web-applications topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the best-practices-for-securing-web-applications topic, visit your repo's landing page and select "manage topics."

Learn more