kaakaww / vuln-graphql-apiLinks
A very vulnerable implementation of a GraphQL API.
β17Updated 3 weeks ago
Alternatives and similar repositories for vuln-graphql-api
Users that are interested in vuln-graphql-api are comparing it to the libraries listed below
Sorting:
- π A repo of configuration examples for StackHawk's Hawkscan!β17Updated 3 weeks ago
- ZAP Management Scriptsβ23Updated 2 weeks ago
- A Security Scanner for Goβ26Updated 6 years ago
- β27Updated last month
- β12Updated 4 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.β45Updated this week
- AWS container security survey 2020β11Updated 4 years ago
- Kubernetes Pwnage for allβ56Updated 5 years ago
- A walkthrough of security controls for a serverless architecture via a demo applicationβ11Updated 3 years ago
- β21Updated 7 years ago
- OWASP Foundation Web Respositoryβ37Updated last month
- β18Updated last year
- Scripts to demonstrate VPC Service Controls between tenant and shared projectsβ12Updated 6 years ago
- Offensive Terraform Websiteβ45Updated 5 years ago
- WAF bypass PoCβ49Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.β61Updated 4 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target containerβ106Updated 6 years ago
- Reconnaissance test in Kubernetes clustersβ21Updated 7 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runtiβ¦β57Updated 11 months ago
- Application Security Workflow Automation using Docker and Kubernetesβ23Updated 2 years ago
- Spring-Boot app for demonstrating security vulnaribilitiesβ13Updated 6 years ago
- software asset scanning orchestration systemβ29Updated last week
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning β¦β43Updated last month
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?β15Updated last year
- β27Updated 3 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraformβ11Updated 3 years ago
- Security scanning & static analysis toolβ93Updated last year
- β15Updated last month
- A small library to alter AWS API requests; Used for fuzzing researchβ22Updated 2 years ago
- Dependency vulnerability auditor for Rubyβ13Updated last year