kmmanoj96 / vulnerable-apisLinks
vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-api
☆14Updated 3 years ago
Alternatives and similar repositories for vulnerable-apis
Users that are interested in vulnerable-apis are comparing it to the libraries listed below
Sorting:
- ☆18Updated 4 years ago
- Awesome Hacking☆20Updated 6 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- ☆11Updated last year
- Standardizing Security Titles☆13Updated 2 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago
- ☆21Updated 6 months ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Updated 3 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- ☆12Updated 4 years ago
- Source for public Cobalt external product documentation☆14Updated this week
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Updated 4 years ago
- ☆15Updated 3 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆15Updated 9 years ago
- Automated Recon Framework☆24Updated 4 years ago
- ☆11Updated 8 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- a collection of bash script and python to automate ZAP Security Tests☆11Updated 4 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- This repo contains workshop material delivered at #nullcon2020☆15Updated 5 years ago
- Sniper. Passive Secrets Hunting.🚬☆12Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 5 years ago
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 5 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago