kaakaww / vuln-graphql-api
A very vulnerable implementation of a GraphQL API.
☆15Updated 2 months ago
Alternatives and similar repositories for vuln-graphql-api:
Users that are interested in vuln-graphql-api are comparing it to the libraries listed below
- Fork of https://github.com/PortSwigger/param-miner for header smuggling research☆12Updated 3 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 10 months ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆40Updated this week
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆15Updated 2 years ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- javaspringvulny - a Spring Boot web application built wrong on purpose☆19Updated 2 weeks ago
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- code reviews to practice☆16Updated 3 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆29Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 8 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 2 months ago
- ZAP Management Scripts☆23Updated this week
- a tool to audit the istio service mesh☆173Updated 3 years ago
- A fast port scanner written in go with a focus on reliability and simplicity.☆16Updated 4 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- A project to visualize the software supply chain☆39Updated last year
- ☆12Updated 3 years ago
- ☆31Updated 2 years ago
- ☆23Updated last year
- 📖 A repo of configuration examples for StackHawk's Hawkscan!☆16Updated 2 months ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Serverless Workshop☆16Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆66Updated 6 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆51Updated 5 months ago
- WAF bypass PoC☆46Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆25Updated last year
- Pull secrets from an AWS environment