A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
β331Aug 13, 2025Updated 9 months ago
Alternatives and similar repositories for capital
Users that are interested in capital are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β142May 3, 2026Updated 2 weeks ago
- An extension to use Semgrep inside Burp Suite.β89May 23, 2025Updated 11 months ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practisβ¦β1,682May 24, 2025Updated 11 months ago
- completely ridiculous API (crAPI)β1,503Apr 2, 2026Updated last month
- Vulnerable app with examples showing how to not use secretsβ1,432May 11, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testingβ1,218Apr 7, 2026Updated last month
- Proactive, Open source API security β API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom teβ¦β1,475Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalationβ110Feb 16, 2024Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,829May 22, 2024Updated last year
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.β238Jan 10, 2024Updated 2 years ago
- Burp Suite Certified Practitioner Exam Studyβ1,395Mar 12, 2026Updated 2 months ago
- Black box fuzzer for web applicationsβ438Jul 20, 2025Updated 9 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructureβ2,018May 20, 2025Updated 11 months ago
- β232Apr 24, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.β1,332Jan 10, 2025Updated last year
- β17May 16, 2022Updated 4 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secretsβ1,554Mar 8, 2026Updated 2 months ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.β1,194Updated this week
- Kraken, a modular multi-language webshell coded by @secu_x11β552Feb 10, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.β2,382Apr 21, 2026Updated 3 weeks ago
- Awesome secure by default libraries to help you eliminate bug classes!β706Dec 6, 2025Updated 5 months ago
- 2022 CTF public releaseβ23Jun 15, 2022Updated 3 years ago
- A GraphQL enumeration and extraction toolβ134Jan 29, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Secrets scanner that understands codeβ192Nov 2, 2023Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applicationsβ1,341Aug 7, 2025Updated 9 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β1,080Mar 24, 2026Updated last month
- Unleash the power of cloudβ817Nov 19, 2024Updated last year
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.β651Nov 21, 2019Updated 6 years ago
- A very simple AEM detector written in rust.π¦β20Jun 27, 2023Updated 2 years ago
- π§° Multi Tool Kubernetes Pentest Imageβ258Mar 30, 2026Updated last month
- β85May 1, 2023Updated 3 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.β328Nov 12, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.β1,476Aug 6, 2025Updated 9 months ago
- AzureGoat : A Damn Vulnerable Azure Infrastructureβ935Oct 30, 2024Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Securityβ71May 20, 2025Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that β¦β256Aug 31, 2022Updated 3 years ago
- β385May 17, 2023Updated 3 years ago
- β16Jul 17, 2024Updated last year
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assetsβ869Mar 28, 2025Updated last year