AppSec is all about protecting your application from the adversaries such as SAST, SCA, Secure Code Review, Security Architecture etc. Attacking an app can fall under web or app pentest
- Agile Application Security - Highly Recommended
- The Web Application Hacker's Handbook
- Threat Modeling: Designing for Security or
- Threat Modeling: A practical guide for development teams
- The Tangled Web
- Web Security for Developers: Real Threats, Practical Defense
- Web Application Security: Exploitation and Countermeasures for Modern Web Applications
- Application Security Program Handbook: A Guide for Software Engineers and Team Leaders
- Enterprise Security Architect
- https://application.security/ Try its free gamified challenges on API, Web, Cloud, front-end.
- Secure Code Warrior
- HackEDU
- OWASP Juice Shop
- Pentester Lab
- Github Security Lab
- Google Gruyere
- Django.nv
- DVWA
It will include tools for SAST, SCA, OAST, Threat Modeling, Secure Code Review, secrets management etc
Open source
- Sonarqube
- Bandit
- Brakeman
- FindSecBugs
- Semgrep
- CodeQL
Paid 7. Checkmarx 8. Veracode 9. Snyk 10. Coverity
- OWASP Dependency Check
- Retire.js
- CycloneDX
- Snyk
- CheckMarx CxSCA
- JFrog XRay
- GitLeaks
- TruffleHog
- Talisman
- Shhgit
- Repo-supervisor
- Hashicorp Vault
- Cyberark Conjur
- OWASP ThreatDragon
- SDElements
- IriusRisk
- Threagile
- ThreatModeler
- Microsoft Threat Modeling tool
- STRIDE GPT
- ThreatSpec
- PyTM
- CISSP - Certified Information Systems Security Professional
- CSSLP Certified Secure Software Lifecycle Professional
- ISSAP – Information Systems Security Architecture Professional
- CASE (Certified Application Security Engineer) Java or CASE .Net
- CompTIA CASP+ (Application Security Professionals Plus)
- Scaling your AppSec Program with semgrep
- TOP 10 THINGS TO KNOW ABOUT SECURITY AS A SOFTWARE ARCHITECT
- System Design for Security
- Top 25 software security errors
- Security prioritization
- CWE top 25 2023 list
- Open Policy Agent (OPA) documentation
- semgrep documentation
- MITRE ATT&CK and Defender (MAD) Program
- A dive into web application authentication
- Taint Analysis or Taint Checking
- log4j vulnerability walkthrough
- Zero day exploitation of confluence
- Cryptography Module in Python
- Secure Coding with Python
- Security concerns in modules and function - github owasp
- Hacking Python Application
- Secure Design Principles