erev0s / VAmPILinks
Vulnerable REST API with OWASP top 10 vulnerabilities for security testing
☆1,014Updated 9 months ago
Alternatives and similar repositories for VAmPI
Users that are interested in VAmPI are comparing it to the libraries listed below
Sorting:
- completely ridiculous API (crAPI)☆1,328Updated last week
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆488Updated 11 months ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,293Updated 8 months ago
- Burp Suite Certified Practitioner Exam Study☆1,166Updated 3 weeks ago
- Twitter vulnerable snippets☆1,067Updated 5 months ago
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆852Updated last month
- ☆405Updated 3 years ago
- ☆690Updated last week
- A small collection of vulnerable code snippets☆760Updated 11 months ago
- ☆1,117Updated 2 years ago
- Azure and AWS Attacks☆1,106Updated 2 years ago
- ☆740Updated 3 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆301Updated last month
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆518Updated last week
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆524Updated this week
- PeTeReport is an open-source application vulnerability reporting tool.☆520Updated last year
- A OWASP Based Checklist With 500+ Test Cases☆787Updated 2 years ago
- Sticky notes for pentesting, bug bounty, CTF.☆726Updated last month
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆878Updated 2 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆540Updated 3 years ago
- Vulnerable app with examples showing how to not use secrets☆1,353Updated this week
- A list of open source web security scanners☆1,254Updated 4 months ago
- My cheatsheet notes to pentest AWS infrastructure☆688Updated 2 years ago
- ☆1,777Updated 3 months ago
- Awesome cloud enumerator☆1,042Updated 6 months ago
- Awesome Vulnerable Applications☆1,230Updated last year
- ☆529Updated 4 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆693Updated 5 months ago
- Tips on how to write exploit scripts (faster!)☆514Updated last year
- Attack surface detector that identifies endpoints by static analysis☆737Updated this week