wiki.owasp.org

Backlink analytics and domain authority

Backlinks
All Dofollow Nofollow UGC DR ▾ Ref. domains ▾
+ Add filter
50 backlinks All New Lost
Referring page DR Ref. domains Linked domains Anchor and target URL
T-SQL-:-Hardcoded-encryption-key
https://derscanner.com/vulnerability-database/T-SQL-:-Hardcoded-encryption-key
derscanner.com
57 5 13
OWASP: Use of hard-coded cryptographic key
https://wiki.owasp.org/index.php/Use_of_hard-coded_cryptographic_key
NOFOLLOW
Joomscan: trouver des vulnérabilités sur un site Joomlareplyreply
https://www.funinformatique.com/joomscan-comment-detecter-les-failles-dun-site-joomla
funinformatique.com
15 25 383
Joomscan Security Scanner
https://wiki.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project
DOFOLLOW
fuzzbunch-tool
https://sec.skill.or.kr/hacking/fuzzbunch-tool
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
fuzzbunch-tool
https://sec.skill.or.kr/hacking/fuzzbunch-tool
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
Oauth2 · Api · Help · GitLab
https://eforce1.feld.cvut.cz/gitlab/help/api/oauth2.md
eforce1.feld.cvut.cz
0 11
CSRF attacks
https://wiki.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
NOFOLLOW
Go-:-DOS-attack-possible
https://derscanner.com/vulnerability-database/Go-:-DOS-attack-possible
derscanner.com
57 5 13
OWASP: Application Denial of Service
https://wiki.owasp.org/index.php/Application_Denial_of_Service
NOFOLLOW
Classes mixins pour objet unique | Documentation de Django | Django
docs.djangoproject.com
79 747 299
référence directe d’objet non sécurisé
https://wiki.owasp.org/index.php/Top_10_2013-A4-Insecure_Direct_Object_References
DOFOLLOW
Fuzzing web applications | Fluid Attacks
https://fluidattacks.com/blog/fuzzing-web-applications
fluidattacks.com
71 36 751
Some examples from OWASP
https://wiki.owasp.org/index.php/OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors
DOFOLLOW
VBA-:-Hardcoded-encryption-key
https://derscanner.com/vulnerability-database/VBA-:-Hardcoded-encryption-key
derscanner.com
57 5 13
OWASP: Use of hard-coded cryptographic key
https://wiki.owasp.org/index.php/Use_of_hard-coded_cryptographic_key
NOFOLLOW
T-SQL-:-DOS-attack-possible
https://derscanner.com/vulnerability-database/T-SQL-:-DOS-attack-possible
derscanner.com
57 5 13
OWASP: Application Denial of Service
https://wiki.owasp.org/index.php/Application_Denial_of_Service
NOFOLLOW
wireless-iot
https://sec.skill.or.kr/hacking/wireless-iot
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
wireless-iot
https://sec.skill.or.kr/hacking/wireless-iot
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
general – terminal23.net
https://www.terminal23.net/category/general
terminal23.net
39 5 375
https://wiki.owasp.org/index.php/Category:OWASP_Code_Review_Project
https://wiki.owasp.org/index.php/Category:OWASP_Code_Review_Project
DOFOLLOW
Config-files-:-Restrictions-removed:-DOS-attack-possible
https://derscanner.com/vulnerability-database/Config-files-:-Restrictions-removed:-DOS-attack-possible
derscanner.com
57 5 13
OWASP: Application Denial of Service
https://wiki.owasp.org/index.php/Application_Denial_of_Service
NOFOLLOW
Graduate School
https://catalog.cuanschutz.edu/cu-anschutz/schools-colleges-programs/graduate-school
catalog.cuanschutz.edu
59 1 36
(no anchor)
https://wiki.owasp.org/index.php/Category:Access_Control
DOFOLLOW
A08 ソフトウェアとデータの整合性の不具合 - OWASP Top 10:2021
https://owasp.org/Top10/2021/ja/A08_2021-Software_and_Data_Integrity_Failures
owasp.org
82 2,924 502
OWASP Cheat Sheet: Deserialization
https://wiki.owasp.org/index.php/Deserialization_Cheat_Sheet
DOFOLLOW
kadavra-automatic-lfe-exploit
https://sec.skill.or.kr/hacking/kadavra-automatic-lfe-exploit
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
kadavra-automatic-lfe-exploit
https://sec.skill.or.kr/hacking/kadavra-automatic-lfe-exploit
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
Kotlin-:-Undocumented-feature:-time-bomb
https://derscanner.com/vulnerability-database/Kotlin-:-Undocumented-feature:-time-bomb
derscanner.com
57 5 13
OWASP: Logic/Time Bomb
https://wiki.owasp.org/index.php/Logic/time_bomb
NOFOLLOW
Confluence OAuth 2.0 provider API
https://developer.atlassian.com/server/confluence/confluence-oauth2-provider-api
developer.atlassian.com
77 297 54
CSRF attacks.css-1wits42{display:inline-block;-webkit-flex-shrink:0;-ms-flex-negative:0;flex-shrink:0;line-height:1;width:16px;height:16px;}.css-1wits42 >svg{overflow:hidden;pointer-events:none;max-width:100%;max-height:100%;color:var(--icon-primary-color);fill:var(--icon-secondary-color);vertical-align:bottom;}.css-1wits42 >svg stop{stop-color:currentColor;}@media screen and (forced-colors: active){.css-1wits42 >svg{-webkit-filter:grayscale(1);filter:grayscale(1);--icon-primary-color:CanvasText;--icon-seco
https://wiki.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
DOFOLLOW
Visual-Basic-6-:-Undocumented-feature:-time-bomb
https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Undocumented-feature:-time-bomb
derscanner.com
57 5 13
OWASP: Logic/Time Bomb
https://wiki.owasp.org/index.php/Logic/time_bomb
NOFOLLOW
bypassing-browser-security
https://sec.skill.or.kr/black-hat/bypassing-browser-security
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
bypassing-browser-security
https://sec.skill.or.kr/black-hat/bypassing-browser-security
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
5 Critical Steps for Effective IoT Security - IoTSecure
https://www.iotsecure.io/2021/03/5-critical-steps-for-effective-iot-security
iotsecure.io
11 1 29
challenging, but according to the OWASP top 10 controls for IoT,
https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project
DOFOLLOW
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
82 2,924 502
download
https://wiki.owasp.org/images/a/ac/OWASP_SCP_Quick_Reference_Guide_v2.doc
DOFOLLOW
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
82 2,924 502
Project Presentation
https://wiki.owasp.org/images/f/fd/Secure_Coding_Practices_Quick_Ref_6.ppt
DOFOLLOW
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
82 2,924 502
Archive XLS Feedback Spreadsheet
https://wiki.owasp.org/images/6/64/SCP-QRG_Revisions_History.xls
DOFOLLOW
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
82 2,924 502
download
https://wiki.owasp.org/images/c/c8/OWASP_SCP_Quick_Reference_Guide_SPA.doc
DOFOLLOW
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
82 2,924 502
download
http://wiki.owasp.org/images/0/0b/OWASP_SCP_Quick_Reference_Guide_v1-1b.doc
DOFOLLOW
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
82 2,924 502
download
https://wiki.owasp.org/images/1/10/OWASP_SCP_Quick_Reference_Guide_v1.doc
DOFOLLOW
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
82 2,924 502
Slide deck
https://wiki.owasp.org/images/5/54/Secure_Coding_Practices_Quick_Ref_5.ppt
DOFOLLOW
T-SQL-:-Undocumented-feature:-time-bomb
https://derscanner.com/vulnerability-database/T-SQL-:-Undocumented-feature:-time-bomb
derscanner.com
57 5 13
OWASP: Logic/Time Bomb
https://wiki.owasp.org/index.php/Logic/time_bomb
NOFOLLOW
SQL Injection: Desvendando Fraquezas e Fortalecendo a Segurança
https://evernow.com.br/sql-injection-desvendando-fraquezas-e-fortalecendo-a-seguranca
evernow.com.br
0 10
OWASP Top 10
https://wiki.owasp.org/images/0/06/OWASP_Top_10-2017-pt_pt.pdf
DOFOLLOW
pauloasilva.com
https://pauloasilva.com/
pauloasilva.com
47 2 21
English
https://wiki.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf
DOFOLLOW
pauloasilva.com
https://pauloasilva.com/
pauloasilva.com
47 2 21
OWASP Secure Coding Practices - Quick Reference Guide
https://wiki.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide
DOFOLLOW
pauloasilva.com
https://pauloasilva.com/
pauloasilva.com
47 2 21
Português (Portugal)
https://wiki.owasp.org/images/6/6d/OWASP_SCP_v1.3_pt-PT.pdf
DOFOLLOW
wifi-hacking
https://sec.skill.or.kr/hacking/wifi-hacking
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
wifi-hacking
https://sec.skill.or.kr/hacking/wifi-hacking
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
C-or-C++-:-XML-external-entity-(XXE-injection)
https://derscanner.com/vulnerability-database/C-or-C%2B%2B-:-XML-external-entity-(XXE-injection)
derscanner.com
57 5 13
OWASP: Testing for XML Injection
https://wiki.owasp.org/index.php/Testing_for_XML_Injection_(OTG-INPVAL-008)
NOFOLLOW
Firefox 보안 지침 - 웹 보안 | MDNMDN
https://developer.mozilla.org/ko/docs/Web/Security/Firefox_Security_Guidelines
developer.mozilla.org
86 10,995 1,121
OWASP 보안 코딩 원칙
https://wiki.owasp.org/index.php/Secure_Coding_Principles
DOFOLLOW
Insecure Direct Object Reference (IDOR) Vulnerabilities in Brief
https://www.invicti.com/blog/web-security/insecure-direct-object-reference-vulnerabilities-idor
invicti.com
73 79 342
A4 Insecure Direct Object Reference
https://wiki.owasp.org/index.php/Top_10_2007-A4
DOFOLLOW
Insecure Direct Object Reference (IDOR) Vulnerabilities in Brief
https://www.invicti.com/blog/web-security/insecure-direct-object-reference-vulnerabilities-idor
invicti.com
73 79 342
A5 Broken Access Control
https://wiki.owasp.org/index.php/Top_10-2017_A5-Broken_Access_Control
DOFOLLOW
单对象混入 | Django 文档 | Django
https://docs.djangoproject.com/zh-hans/4.0/ref/class-based-views/mixins-single-object
docs.djangoproject.com
79 747 299
不安全的直接对象引用
https://wiki.owasp.org/index.php/Top_10_2013-A4-Insecure_Direct_Object_References
DOFOLLOW
ABAP-:-Hardcoded-encryption-key
https://derscanner.com/vulnerability-database/ABAP-:-Hardcoded-encryption-key
derscanner.com
57 5 13
OWASP: Use of hard-coded cryptographic key
https://wiki.owasp.org/index.php/Use_of_hard-coded_cryptographic_key
NOFOLLOW
JavaScript-:-Easily-guessed-database-name
https://derscanner.com/vulnerability-database/JavaScript-:-Easily-guessed-database-name
derscanner.com
57 5 13
OWASP: Database security
https://wiki.owasp.org/index.php/Configuration
NOFOLLOW
emv
https://sec.skill.or.kr/black-hat/emv
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
emv
https://sec.skill.or.kr/black-hat/emv
sec.skill.or.kr
0 26
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
OWASP Top Ten Web Application Security Risks | OWASP Foundation
https://owasp.org/www-project-top-ten?ref=blog.e-saurio.com
owasp.org
82 2,924 502
OWASP Top 10 2013 - Hebrew
https://wiki.owasp.org/index.php/OWASP_Top10_Hebrew
DOFOLLOW
Next page →
Frequently Asked Questions
How many backlinks does wiki.owasp.org have?
The backlinks page for wiki.owasp.org shows all individual inbound links discovered in our crawl of the web. Each backlink represents a hyperlink on another website that points to a page on wiki.owasp.org. Use the filters to narrow results by dofollow/nofollow status, domain rating, or anchor text.
What is a backlink?
A backlink is a hyperlink on one website that points to a page on a different website. Backlinks are one of the most important ranking factors in search engine algorithms because they act as votes of confidence from other sites. The more high-quality backlinks a domain has, the more authority search engines assign to it.
Are the backlinks to wiki.owasp.org dofollow or nofollow?
Backlinks to wiki.owasp.org include both dofollow and nofollow links. Dofollow links pass link equity (ranking power) to the target site, while nofollow links include a rel="nofollow" attribute that tells search engines not to pass authority. Both types contribute to a natural backlink profile, but dofollow links carry more SEO weight. You can filter by link type using the rel filter above the table.
How often is backlink data updated?
Backlink data is updated monthly when our web crawler completes a new cycle. Our pipeline processes billions of web pages to discover new backlinks, track lost links, and update domain authority scores. The freshness of data depends on when our crawler last visited the referring pages.