jorritfolmer / vulnerable-apiLinks
Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops
☆43Updated last year
Alternatives and similar repositories for vulnerable-api
Users that are interested in vulnerable-api are comparing it to the libraries listed below
Sorting:
- BurpSuite using the document and some extensions☆70Updated 5 years ago
- ☆71Updated 4 years ago
- ☆17Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- Find subdomains and takeovers.☆85Updated 2 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆98Updated 3 years ago
- ☆76Updated 4 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- GraphQL security workshop labs☆113Updated last month
- ☆44Updated 3 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- ☆27Updated 5 years ago
- Detectify Crowdsource Challenge☆69Updated 3 years ago
- ☆53Updated 7 months ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆92Updated last month
- Misc bounty and vulndisc things☆86Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Updated 4 years ago
- ASN reconnaissance script☆130Updated last year
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated 11 months ago
- DNS and Target HTTP History Local Storage and Search☆64Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- ☆67Updated 2 years ago
- Recon Custom WordList Ganerator☆58Updated 5 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆99Updated 4 years ago