jorritfolmer / vulnerable-apiLinks
Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops
☆44Updated last year
Alternatives and similar repositories for vulnerable-api
Users that are interested in vulnerable-api are comparing it to the libraries listed below
Sorting:
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- ☆72Updated 5 years ago
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆17Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- ☆54Updated last year
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated 2 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 3 years ago
- Detectify Crowdsource Challenge☆72Updated 3 years ago
- Find subdomains and takeovers.☆87Updated 3 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆90Updated 3 weeks ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago
- AWS S3 open bucket poc automated script.☆57Updated 4 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 7 months ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆101Updated 3 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- Target practice for ffuf☆70Updated 4 years ago
- ☆23Updated 4 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 5 years ago
- ☆44Updated 4 years ago
- ☆24Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- ☆27Updated 5 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆52Updated 4 years ago
- GraphQL security workshop labs☆118Updated last week
- HTTP parameter discovery suite.☆65Updated 5 years ago