A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
β328Aug 13, 2025Updated 8 months ago
Alternatives and similar repositories for capital
Users that are interested in capital are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β142Feb 26, 2026Updated 2 months ago
- An extension to use Semgrep inside Burp Suite.β88May 23, 2025Updated 11 months ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practisβ¦β1,678May 24, 2025Updated 11 months ago
- completely ridiculous API (crAPI)β1,487Apr 2, 2026Updated 3 weeks ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testingβ1,206Apr 7, 2026Updated 3 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Vulnerable app with examples showing how to not use secretsβ1,430Updated this week
- Proactive, Open source API security β API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom teβ¦β1,469Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalationβ110Feb 16, 2024Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,821May 22, 2024Updated last year
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.β238Jan 10, 2024Updated 2 years ago
- Burp Suite Certified Practitioner Exam Studyβ1,374Mar 12, 2026Updated last month
- Black box fuzzer for web applicationsβ437Jul 20, 2025Updated 9 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructureβ2,006May 20, 2025Updated 11 months ago
- β233Updated this week
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.β1,332Jan 10, 2025Updated last year
- β17May 16, 2022Updated 3 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secretsβ1,543Mar 8, 2026Updated last month
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.β1,181Updated this week
- Kraken, a modular multi-language webshell coded by @secu_x11β550Feb 10, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.β2,363Apr 21, 2026Updated last week
- Awesome secure by default libraries to help you eliminate bug classes!β703Dec 6, 2025Updated 4 months ago
- 2022 CTF public releaseβ23Jun 15, 2022Updated 3 years ago
- A GraphQL enumeration and extraction toolβ133Jan 29, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Secrets scanner that understands codeβ191Nov 2, 2023Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applicationsβ1,339Aug 7, 2025Updated 8 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β1,074Mar 24, 2026Updated last month
- Unleash the power of cloudβ817Nov 19, 2024Updated last year
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.β650Nov 21, 2019Updated 6 years ago
- A very simple AEM detector written in rust.π¦β20Jun 27, 2023Updated 2 years ago
- π§° Multi Tool Kubernetes Pentest Imageβ259Mar 30, 2026Updated 3 weeks ago
- β85May 1, 2023Updated 2 years ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.β1,410Aug 6, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.β329Nov 12, 2025Updated 5 months ago
- AzureGoat : A Damn Vulnerable Azure Infrastructureβ928Oct 30, 2024Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Securityβ72May 20, 2025Updated 11 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that β¦β256Aug 31, 2022Updated 3 years ago
- β383May 17, 2023Updated 2 years ago
- β16Jul 17, 2024Updated last year
- Twitter vulnerable snippetsβ1,146Feb 11, 2026Updated 2 months ago