Checkmarx / capitalLinks
A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
☆300Updated 2 weeks ago
Alternatives and similar repositories for capital
Users that are interested in capital are comparing it to the libraries listed below
Sorting:
- Websec interview questions by tib3rius answered☆311Updated last year
- A Broken Application - Very Vulnerable!☆167Updated last week
- ☆190Updated 2 years ago
- Security Auditor Utility for GraphQL APIs☆488Updated 6 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆285Updated 3 years ago
- GraphQL threat framework used by security professionals to research security gaps in GraphQL implementations☆319Updated last month
- Watch the latest awesome security talks around the globe☆278Updated 6 months ago
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆166Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆428Updated 7 months ago
- Awesome information for WebSockets security research☆275Updated 3 years ago
- ☆314Updated last month
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated this week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆222Updated 2 months ago
- This repo contains the code for my secure code review challenges☆156Updated last week
- A curated list of Awesome Security Challenges.☆195Updated 9 months ago
- OWASP Code Review Guide Web Repository☆139Updated 3 years ago
- ☆83Updated 2 years ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆237Updated last year
- GraphQL automated security testing toolkit☆324Updated last year
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆219Updated 3 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…