erev0s / VAmPILinks
Vulnerable REST API with OWASP top 10 vulnerabilities for security testing
☆1,158Updated last year
Alternatives and similar repositories for VAmPI
Users that are interested in VAmPI are comparing it to the libraries listed below
Sorting:
- completely ridiculous API (crAPI)☆1,407Updated this week
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,321Updated last year
- Twitter vulnerable snippets☆1,088Updated 10 months ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆500Updated this week
- Burp Suite Certified Practitioner Exam Study☆1,281Updated last month
- ☆720Updated this week
- A OWASP Based Checklist With 500+ Test Cases☆841Updated 3 years ago
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆857Updated 3 months ago
- ☆1,117Updated 2 years ago
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆551Updated this week
- A small collection of vulnerable code snippets☆780Updated last year
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆878Updated 2 weeks ago
- Sticky notes for pentesting, bug bounty, CTF.☆769Updated 5 months ago
- ☆420Updated 3 years ago
- PeTeReport is an open-source application vulnerability reporting tool.☆533Updated last year
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆887Updated 2 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,429Updated last year
- A list of open source web security scanners☆1,275Updated 8 months ago
- Azure and AWS Attacks☆1,107Updated 3 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,961Updated 7 months ago
- ☆624Updated 3 weeks ago
- ☆751Updated 3 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆315Updated 5 months ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,060Updated last week
- ☆1,820Updated this week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆971Updated 2 years ago
- Asset inventory of over 800 public bug bounty programs.☆1,507Updated 11 months ago
- ProjectDiscovery's Open Source Tool Manager☆1,038Updated last week
- A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms…☆848Updated last month
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆543Updated 3 years ago