jorritfolmer / vulnerable-apiLinks
Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops
☆44Updated last year
Alternatives and similar repositories for vulnerable-api
Users that are interested in vulnerable-api are comparing it to the libraries listed below
Sorting:
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated 2 years ago
- ☆72Updated 5 years ago
- ☆54Updated last year
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- ☆76Updated 5 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆90Updated 3 weeks ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 7 months ago
- ASN reconnaissance script☆131Updated 2 years ago
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- ☆17Updated 4 years ago
- ☆60Updated last year
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- ☆44Updated 4 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Updated 3 years ago
- Recon Custom WordList Ganerator☆58Updated 5 years ago
- Burp Suite Extension to monitor new scope☆17Updated 4 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Updated 5 years ago
- Clientside vulnerability / reflected xss fuzzer☆149Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- DNS and Target HTTP History Local Storage and Search☆63Updated 4 years ago
- Find subdomains and takeovers.☆87Updated 3 years ago
- Misc bounty and vulndisc things☆85Updated 5 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago
- Detectify Crowdsource Challenge☆72Updated 3 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆82Updated 3 years ago
- Script to test open Akamai ARL vulnerability.☆70Updated 4 years ago