Secure Coding Handbook

Welcome to the Secure Coding Handbook! Here, you will find everything that I have found on secure coding: best practices, analyzing, and, of course, patching code-related vulnerabilities. All of the enumerated attacks and defensive techniques are strictly related to web applications. (for now :) )

Handbook structure:

Resourceschevron-rightClient sidechevron-rightServer Sidechevron-rightAPIchevron-rightAuxiliarychevron-rightSoliditychevron-right

Spotted a bug?

Making mistakes is human nature, fortunately. Please note that I am by no means an expert and should you find something that is totally erroneous or deviated from the subject, please create an issue herearrow-up-right.

Want to contribute?

Sure thing! Message me on Twitter @VladToiearrow-up-right, or simply write a pull request in the Secure-Coding-Handbookarrow-up-right repository.

You can also buy me a Pizza so I wouldn't have to cook it myself, and write more guides in that time =D

Last updated