A very vulnerable implementation of a GraphQL API.
☆61Nov 12, 2021Updated 4 years ago
Alternatives and similar repositories for vulnerable-graphql-api
Users that are interested in vulnerable-graphql-api are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- Intentionaly very vulnerable API with bonus bad coding practices☆51Nov 15, 2025Updated 4 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆46Feb 2, 2023Updated 3 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated last year
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Vulnerable API☆419Mar 4, 2023Updated 3 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Mar 11, 2026Updated 2 weeks ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆67Sep 18, 2021Updated 4 years ago
- Web Application Firewall (WAF) Detector☆35Mar 13, 2023Updated 3 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- ☆84May 1, 2023Updated 2 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,192Nov 25, 2024Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆133Dec 22, 2022Updated 3 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- ☆16Oct 8, 2025Updated 5 months ago
- A very vulnerable implementation of a GraphQL API.☆17Mar 13, 2026Updated last week
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- finds hidden parameters☆23Aug 12, 2023Updated 2 years ago
- Sample Flutter application for Android☆10Jun 8, 2019Updated 6 years ago
- An HTTP request smuggling scanner designed to work at scale☆25Oct 2, 2022Updated 3 years ago
- ☆13Apr 25, 2024Updated last year
- Research on GraphQL from an AppSec point of view.☆418May 24, 2023Updated 2 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 10 months ago
- ☆38Aug 27, 2022Updated 3 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated last year
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated last month
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- ☆22Mar 1, 2022Updated 4 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Jun 22, 2023Updated 2 years ago
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆25Jul 21, 2022Updated 3 years ago
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago