A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
β325Aug 13, 2025Updated 7 months ago
Alternatives and similar repositories for capital
Users that are interested in capital are comparing it to the libraries listed below
Sorting:
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β142Feb 26, 2026Updated 3 weeks ago
- An extension to use Semgrep inside Burp Suite.β88May 23, 2025Updated 9 months ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practisβ¦β1,677May 24, 2025Updated 9 months ago
- completely ridiculous API (crAPI)β1,451Mar 5, 2026Updated 2 weeks ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testingβ1,182Nov 25, 2024Updated last year
- Vulnerable app with examples showing how to not use secretsβ1,404Updated this week
- Proactive, Open source API security β API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom teβ¦β1,456Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalationβ109Feb 16, 2024Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,782May 22, 2024Updated last year
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.β238Jan 10, 2024Updated 2 years ago
- Burp Suite Certified Practitioner Exam Studyβ1,349Mar 12, 2026Updated last week
- Black box fuzzer for web applicationsβ436Jul 20, 2025Updated 8 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructureβ1,984May 20, 2025Updated 10 months ago
- β229Dec 18, 2025Updated 3 months ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.β1,331Jan 10, 2025Updated last year
- β17May 16, 2022Updated 3 years ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.β1,134Updated this week
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secretsβ1,532Mar 8, 2026Updated last week
- Kraken, a modular multi-language webshell coded by @secu_x11β549Feb 10, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.β2,309Mar 10, 2026Updated last week
- Awesome secure by default libraries to help you eliminate bug classes!β701Dec 6, 2025Updated 3 months ago
- MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL encrypted connectβ¦β45Jan 28, 2024Updated 2 years ago
- A GraphQL enumeration and extraction toolβ133Jan 29, 2023Updated 3 years ago
- Secrets scanner that understands codeβ192Nov 2, 2023Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applicationsβ1,297Aug 7, 2025Updated 7 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β986Jan 12, 2024Updated 2 years ago
- Unleash the power of cloudβ816Nov 19, 2024Updated last year
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.β646Nov 21, 2019Updated 6 years ago
- A very simple AEM detector written in rust.π¦β20Jun 27, 2023Updated 2 years ago
- β84May 1, 2023Updated 2 years ago
- π§° Multi Tool Kubernetes Pentest Imageβ255Mar 3, 2026Updated 2 weeks ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.β1,363Aug 6, 2025Updated 7 months ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.β322Nov 12, 2025Updated 4 months ago
- AzureGoat : A Damn Vulnerable Azure Infrastructureβ918Oct 30, 2024Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Securityβ72May 20, 2025Updated 10 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that β¦β256Aug 31, 2022Updated 3 years ago
- β383May 17, 2023Updated 2 years ago
- Twitter vulnerable snippetsβ1,123Feb 11, 2026Updated last month
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assetsβ834Mar 28, 2025Updated 11 months ago