A very vulnerable implementation of a GraphQL API.
☆61Nov 12, 2021Updated 4 years ago
Alternatives and similar repositories for vulnerable-graphql-api
Users that are interested in vulnerable-graphql-api are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- Intentionaly very vulnerable API with bonus bad coding practices☆52Nov 15, 2025Updated 4 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆46Feb 2, 2023Updated 3 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated 2 years ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vulnerable API☆423Mar 4, 2023Updated 3 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Mar 29, 2026Updated 2 weeks ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆67Sep 18, 2021Updated 4 years ago
- Web Application Firewall (WAF) Detector☆35Mar 13, 2023Updated 3 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 8 months ago
- ☆84May 1, 2023Updated 2 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,200Apr 7, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆133Dec 22, 2022Updated 3 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆17Mar 27, 2026Updated 2 weeks ago
- finds hidden parameters☆23Aug 12, 2023Updated 2 years ago
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- Sample Flutter application for Android☆11Jun 8, 2019Updated 6 years ago
- An HTTP request smuggling scanner designed to work at scale☆25Oct 2, 2022Updated 3 years ago
- ☆14Apr 25, 2024Updated last year
- Research on GraphQL from an AppSec point of view.☆417May 24, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,676May 24, 2025Updated 10 months ago
- ☆38Aug 27, 2022Updated 3 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated 2 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- ☆22Mar 1, 2022Updated 4 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Jun 22, 2023Updated 2 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- completely ridiculous API (crAPI)☆1,472Apr 2, 2026Updated last week