kmmanoj96 / vulnerable-apisLinks
vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-api
☆13Updated 4 years ago
Alternatives and similar repositories for vulnerable-apis
Users that are interested in vulnerable-apis are comparing it to the libraries listed below
Sorting:
- ☆10Updated 2 years ago
- ☆18Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- Bypassing AWS WAF using a single ';'☆39Updated 7 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 3 months ago
- Detecting SNI based censorship using Iterative Network Tracing☆14Updated 4 years ago
- A static website template for security pages.☆53Updated 5 months ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Updated 2 years ago
- Awesome Hacking☆20Updated 7 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and histo…☆248Updated 3 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12Updated 3 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Updated 5 years ago
- My write ups - Capture the flag challanges☆19Updated 3 years ago
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆47Updated 11 months ago
- Explanation of All the Payloads Used in Pentester Academy's JS for Pentester Course☆16Updated 5 years ago
- ☆20Updated 3 years ago
- Automated Recon Framework☆24Updated 5 years ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 7 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 3 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 7 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago
- DNS caching for humans☆94Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- OWASP ZAP addon for finding vulnerabilities in JWT Implementations☆37Updated 9 months ago
- Open Source Vulnerability Disclosure Program☆24Updated 4 years ago
- multiple password 'asher using Python’s hashlib☆15Updated 4 years ago