This repository contains an example Python API that is vulnerable to several different web API attacks.
☆70Feb 7, 2024Updated 2 years ago
Alternatives and similar repositories for vulnerable-api
Users that are interested in vulnerable-api are comparing it to the libraries listed below
Sorting:
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆46Feb 16, 2024Updated 2 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago
- A simple place to learn XSS☆31Mar 20, 2021Updated 4 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆40Jun 3, 2021Updated 4 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,173Nov 25, 2024Updated last year
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆31Jan 27, 2026Updated last month
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆10Dec 8, 2022Updated 3 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Updated this week
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- a collection of bash script and python to automate ZAP Security Tests☆11Oct 31, 2020Updated 5 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- A checklist of items to check, especially when inheriting a foreign network.☆29Mar 6, 2019Updated 6 years ago
- Virtual host wordlist☆52Jan 12, 2021Updated 5 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- Simple vulnearable Flask web application☆29Dec 30, 2025Updated 2 months ago
- TV show scraper/renamer thingy☆12May 10, 2013Updated 12 years ago
- Created by David Maloney via the GitHub Connector☆12Jul 10, 2025Updated 7 months ago
- MikroTik (RouterOS) to MQTT☆11Jul 15, 2021Updated 4 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- An unofficial wrapper for the HackerOne API☆17Apr 14, 2025Updated 10 months ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago