jorritfolmer / vulnerable-apiLinks
Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops
☆44Updated last year
Alternatives and similar repositories for vulnerable-api
Users that are interested in vulnerable-api are comparing it to the libraries listed below
Sorting:
- ☆72Updated 5 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆88Updated this week
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆98Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 6 months ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- ☆66Updated 3 years ago
- Find subdomains and takeovers.☆86Updated 3 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆44Updated 4 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆131Updated 4 years ago
- ☆27Updated 5 years ago
- ☆76Updated 5 years ago
- ASN reconnaissance script☆131Updated last year
- ☆60Updated last year
- Clientside vulnerability / reflected xss fuzzer☆149Updated 2 years ago
- xss development frameworks, with the goal of making payload writing easier.☆153Updated last year
- Detectify Crowdsource Challenge☆72Updated 3 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- ☆54Updated 11 months ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- Script to test open Akamai ARL vulnerability.☆70Updated 4 years ago
- GraphQL security workshop labs☆118Updated this week
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆99Updated 4 years ago
- DNS and Target HTTP History Local Storage and Search☆63Updated 4 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago