A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
β327Aug 13, 2025Updated 7 months ago
Alternatives and similar repositories for capital
Users that are interested in capital are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β142Feb 26, 2026Updated last month
- An extension to use Semgrep inside Burp Suite.β88May 23, 2025Updated 10 months ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practisβ¦β1,676May 24, 2025Updated 10 months ago
- completely ridiculous API (crAPI)β1,460Mar 5, 2026Updated last month
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testingβ1,197Nov 25, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Vulnerable app with examples showing how to not use secretsβ1,422Updated this week
- Proactive, Open source API security β API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom teβ¦β1,457Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalationβ110Feb 16, 2024Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,808May 22, 2024Updated last year
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.β237Jan 10, 2024Updated 2 years ago
- Burp Suite Certified Practitioner Exam Studyβ1,360Mar 12, 2026Updated 3 weeks ago
- Black box fuzzer for web applicationsβ437Jul 20, 2025Updated 8 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructureβ2,000May 20, 2025Updated 10 months ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.β1,332Jan 10, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- β229Dec 18, 2025Updated 3 months ago
- β17May 16, 2022Updated 3 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secretsβ1,538Mar 8, 2026Updated last month
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.β1,162Updated this week
- Kraken, a modular multi-language webshell coded by @secu_x11β549Feb 10, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.β2,335Mar 24, 2026Updated 2 weeks ago
- Awesome secure by default libraries to help you eliminate bug classes!β702Dec 6, 2025Updated 4 months ago
- 2022 CTF public releaseβ23Jun 15, 2022Updated 3 years ago
- A GraphQL enumeration and extraction toolβ134Jan 29, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Secrets scanner that understands codeβ192Nov 2, 2023Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applicationsβ1,336Aug 7, 2025Updated 8 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β1,067Mar 24, 2026Updated 2 weeks ago
- Unleash the power of cloudβ816Nov 19, 2024Updated last year
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.β647Nov 21, 2019Updated 6 years ago
- A very simple AEM detector written in rust.π¦β20Jun 27, 2023Updated 2 years ago
- π§° Multi Tool Kubernetes Pentest Imageβ256Mar 30, 2026Updated last week
- β84May 1, 2023Updated 2 years ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.β1,380Aug 6, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.β326Nov 12, 2025Updated 4 months ago
- AzureGoat : A Damn Vulnerable Azure Infrastructureβ923Oct 30, 2024Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Securityβ72May 20, 2025Updated 10 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that β¦β256Aug 31, 2022Updated 3 years ago
- β384May 17, 2023Updated 2 years ago
- Twitter vulnerable snippetsβ1,134Feb 11, 2026Updated last month
- β16Jul 17, 2024Updated last year