Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops
☆47Feb 16, 2024Updated 2 years ago
Alternatives and similar repositories for vulnerable-api
Users that are interested in vulnerable-api are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Feb 7, 2024Updated 2 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- ☆17May 20, 2021Updated 4 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- A very vulnerable implementation of a GraphQL API.☆17Mar 13, 2026Updated last week
- Vulnerable API☆419Mar 4, 2023Updated 3 years ago
- Framework to automate Bug Bounty Reconnaissance☆43Jan 4, 2021Updated 5 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 7 months ago
- ☆13Jul 27, 2020Updated 5 years ago
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Mar 11, 2026Updated 2 weeks ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- SMTP Open Relay Exploitation☆16Nov 23, 2020Updated 5 years ago
- Notes I make for anything related to security.☆13Nov 3, 2022Updated 3 years ago
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- Practice hacking JWT tokens☆115Sep 8, 2022Updated 3 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- Automatically exported from code.google.com/p/protostar-solutions☆13Mar 26, 2015Updated 10 years ago
- A simple web app with a XXE vulnerability.☆232Nov 10, 2021Updated 4 years ago
- ☆34Feb 15, 2021Updated 5 years ago
- ☆59Apr 8, 2021Updated 4 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Lab for learning JWT.☆34Jan 19, 2023Updated 3 years ago
- ☆13Jan 28, 2024Updated 2 years ago
- A playground to test various prompt injection techniques and bypasses.☆21Mar 31, 2023Updated 2 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 5 years ago
- ☆21Feb 25, 2022Updated 4 years ago
- This is where I share code/material shown in my videos☆76Jun 17, 2023Updated 2 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Useful books, links, blogs, etc.☆14Jan 29, 2018Updated 8 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- Simple fuzzer for OpenAPI 3 specification based APIs☆23Feb 16, 2023Updated 3 years ago
- A powerful capture and injection tool for the Android platform☆12May 4, 2020Updated 5 years ago
- Scripts to automate RECON process☆11Aug 31, 2025Updated 6 months ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- ☆10Dec 8, 2022Updated 3 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago