A simple Node.js Express REST app with some OWASP vulnerabilities.
☆22Aug 13, 2024Updated last year
Alternatives and similar repositories for node-api-goat
Users that are interested in node-api-goat are comparing it to the libraries listed below
Sorting:
- Intentionaly very vulnerable API with bonus bad coding practices☆51Nov 15, 2025Updated 4 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆46Feb 2, 2023Updated 3 years ago
- ☆84May 1, 2023Updated 2 years ago
- Vulnerable API☆418Mar 4, 2023Updated 3 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Study notes for CompTIA Linux+ Certificate☆24Dec 22, 2023Updated 2 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Mar 11, 2026Updated last week
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated last year
- Enumerate wordpress users in 1 second.☆15Jan 23, 2018Updated 8 years ago
- Penetration Testing Lab☆28Jul 17, 2014Updated 11 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,182Nov 25, 2024Updated last year
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- bugBounty Scripts☆11Feb 3, 2023Updated 3 years ago
- Master-in-Devops-Engineering-MDE-Session-Notes☆13Jul 28, 2025Updated 7 months ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- A collection of Docker and Kubernetes resources☆18Nov 14, 2022Updated 3 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Updated this week
- completely ridiculous API (crAPI)☆1,451Mar 5, 2026Updated 2 weeks ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- Mass IP Grabbbing From Bing | Mr.MaGnoM☆12Jun 6, 2018Updated 7 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 9 months ago
- 🔍 Improve your files enumeration with specific extensions!☆17Jan 11, 2022Updated 4 years ago
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 8 months ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- LLM-Powered Code Security Scanning☆21Apr 2, 2025Updated 11 months ago
- BiomDI - Software Tools supporting Standard Biometric Data Interchange Formats (Mirrored from http://www.nist.gov/itl/iad/ig/biomdi.cfm)☆12Jul 24, 2014Updated 11 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆27Jul 15, 2024Updated last year
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- ScaleGraph is an X10 billion scale graph analysis library.☆21Jan 14, 2016Updated 10 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- GitHub repository for the API Security for White Hat Hackers book☆15May 31, 2024Updated last year