arainho / awesome-api-securityLinks
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
☆3,330Updated 2 months ago
Alternatives and similar repositories for awesome-api-security
Users that are interested in awesome-api-security are comparing it to the libraries listed below
Sorting:
- A collection of awesome one-liner scripts especially for bug bounty tips.☆2,876Updated 11 months ago
- Mind-Maps of Several Things☆2,562Updated 2 years ago
- Ressources for bug bounty hunting☆1,835Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆6,480Updated last week
- Top disclosed reports from HackerOne☆4,630Updated 2 weeks ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,775Updated last year
- API Security Project aims to present unique attack & defense methods in API Security field☆1,390Updated last year
- Contextual Content Discovery Tool☆2,891Updated last year
- All about bug bounty (bypasses, payloads, and etc)☆6,333Updated last year
- ☆1,739Updated last month
- A curated list of various bug bounty tools☆5,118Updated last month
- Tools & Interesting Things for RedTeam Ops☆2,206Updated 2 weeks ago
- This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.☆1,664Updated 3 years ago
- An OOB interaction gathering server and client library☆3,823Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,905Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,214Updated 4 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,421Updated last month
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,372Updated this week
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,362Updated 7 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,201Updated 7 months ago
- Rockyou for web fuzzing☆2,838Updated last month
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,580Updated 10 months ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,639Updated 3 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,002Updated 7 months ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,507Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆4,484Updated 5 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,246Updated 9 months ago
- Awesome Vulnerable Applications☆1,204Updated 10 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,196Updated last year
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,138Updated last month