PacktPublishing / Pentesting-APIsLinks
Pentesting APIs, Published by Packt
☆14Updated last year
Alternatives and similar repositories for Pentesting-APIs
Users that are interested in Pentesting-APIs are comparing it to the libraries listed below
Sorting:
- Bash Shell Scripting for Pentesters, published by Packt☆41Updated 3 months ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆24Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- Challenge Python☆19Updated 2 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆24Updated 7 months ago
- hackxpert labs☆17Updated 3 years ago
- ☆24Updated 9 months ago
- Damn Vulnerable Rails app☆13Updated 13 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆59Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆101Updated 4 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 9 months ago
- ☆22Updated last year
- ☆65Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Updated last week
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- Offensive Security Python. Collection of python scripts that I created/pirated/curated to help me understand CyberSecurity. I find it hel…☆52Updated 4 months ago
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆100Updated 10 months ago
- ☆57Updated 2 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆45Updated 4 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated last year
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆21Updated 9 months ago
- OSCP Study Guide☆41Updated 3 years ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- ☆35Updated 7 months ago
- ☆29Updated 4 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 5 months ago