jorritfolmer / vulnerable-apiLinks
Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops
☆44Updated last year
Alternatives and similar repositories for vulnerable-api
Users that are interested in vulnerable-api are comparing it to the libraries listed below
Sorting:
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆72Updated 5 years ago
- ☆53Updated 8 months ago
- ☆17Updated 4 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- BurpSuite using the document and some extensions☆70Updated 5 years ago
- ☆76Updated 4 years ago
- ☆27Updated 5 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆66Updated last year
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 5 years ago
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 3 years ago
- ☆44Updated 3 years ago
- Find subdomains and takeovers.☆86Updated 2 years ago
- ☆22Updated 4 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated last year
- ASN reconnaissance script☆132Updated last year
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆59Updated 2 years ago
- Recon Custom WordList Ganerator☆58Updated 5 years ago
- ☆60Updated last year
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- Clientside vulnerability / reflected xss fuzzer☆149Updated 2 years ago
- GraphQL security workshop labs☆114Updated this week