This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.
☆56Aug 21, 2025Updated 6 months ago
Alternatives and similar repositories for VulnerableApp4APISecurity
Users that are interested in VulnerableApp4APISecurity are comparing it to the libraries listed below
Sorting:
- ☆12Mar 18, 2025Updated 11 months ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆244Jan 23, 2025Updated last year
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Some of my rough notes for Docker threat detection☆49Aug 26, 2023Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Reports from various areas of information security☆271Apr 13, 2024Updated last year
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- ☆57Dec 13, 2024Updated last year
- ☆23Jun 30, 2021Updated 4 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- ☆29May 16, 2023Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Open-source antivirus project.☆31Nov 5, 2016Updated 9 years ago
- CVE-2022-41852 Proof of Concept (unofficial)☆75Oct 20, 2022Updated 3 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Exploits for some linux binaries :)☆36Nov 2, 2025Updated 4 months ago
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- 100-Days-of-Hacking☆133Aug 24, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- ☆69Sep 15, 2023Updated 2 years ago