This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.
☆56Aug 21, 2025Updated 7 months ago
Alternatives and similar repositories for VulnerableApp4APISecurity
Users that are interested in VulnerableApp4APISecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 18, 2025Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- ☆15Jul 13, 2023Updated 2 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- Some of my rough notes for Docker threat detection☆50Aug 26, 2023Updated 2 years ago
- Reports from various areas of information security☆271Apr 13, 2024Updated last year
- ☆38Nov 9, 2025Updated 4 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆244Jan 23, 2025Updated last year
- Decompilation research of Banjo-Kazooie for the xbox 360☆17Mar 7, 2026Updated 2 weeks ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 4 months ago
- A Rust crate for parsing Windows user minidumps.☆41May 1, 2024Updated last year
- ☆69Sep 15, 2023Updated 2 years ago
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆48Aug 23, 2023Updated 2 years ago
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆41Updated this week
- Siber Güvenlik alanında kendini geliştirmek isteyenler için her türlü kaynağı bulunduran repo.☆25Sep 1, 2025Updated 6 months ago
- ☆41Sep 9, 2023Updated 2 years ago
- ☆17Jun 15, 2025Updated 9 months ago
- ☆19Mar 31, 2022Updated 3 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- FockCache - Minimalized Test Cache Poisoning☆111Feb 3, 2020Updated 6 years ago
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆16Oct 8, 2025Updated 5 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated 11 months ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Siber güvenlik ve daha fazlası!☆22Apr 10, 2023Updated 2 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago