β84May 1, 2023Updated 2 years ago
Alternatives and similar repositories for rest-api-goat
Users that are interested in rest-api-goat are comparing it to the libraries listed below
Sorting:
- π Websheep is an app based on a willingly vulnerable ReSTful APIs.β57Mar 25, 2024Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!β132Dec 22, 2022Updated 3 years ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.β22Aug 13, 2024Updated last year
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API reβ¦β503Updated this week
- Intentionaly very vulnerable API with bonus bad coding practicesβ51Nov 15, 2025Updated 3 months ago
- A very vulnerable implementation of a GraphQL API.β61Nov 12, 2021Updated 4 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)β46Feb 2, 2023Updated 3 years ago
- Exactly what it sounds like, which is something radβ22Oct 12, 2022Updated 3 years ago
- Vulnerable APIβ418Mar 4, 2023Updated 2 years ago
- β14Jul 21, 2024Updated last year
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.β1,328Jan 10, 2025Updated last year
- β422Aug 13, 2022Updated 3 years ago
- Six Degrees of Domain Adminβ15Oct 23, 2017Updated 8 years ago
- Create subdomains and files wordlists from your browser historyβ13Jan 10, 2023Updated 3 years ago
- visually see issues with supported cipher suitesβ17Jun 18, 2024Updated last year
- Collection of fuzzing payloads and corpus from all around added as sub modulesβ15May 17, 2025Updated 9 months ago
- Vulnerable Android application for Ostolab Security Scannerβ35Jan 30, 2026Updated last month
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagrβ¦β41Jun 20, 2025Updated 8 months ago
- Extract endpoints marked as disallow in robots files to generate wordlists.β58Mar 2, 2022Updated 4 years ago
- (aka Kotlin Goat) - an intentionally vulnerable Kotlin applicationβ36Apr 17, 2024Updated last year
- β33Jun 19, 2021Updated 4 years ago
- C# havoc implantβ101Feb 12, 2023Updated 3 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.β25Sep 7, 2025Updated 5 months ago
- Mythic Developer Series: Workshop Golang Agentβ25Jun 27, 2023Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilitiesβ93Jun 11, 2023Updated 2 years ago
- Collection of Helm charts that developed by the BeeInventor.β10Feb 20, 2025Updated last year
- Don't use bookmarks. A collection of resources for designers and front-end developers.β13Feb 4, 2023Updated 3 years ago
- Awesome Data Sanitizationβ12Jun 6, 2021Updated 4 years ago
- Standalone Satellite Tracker Project based on ESP32 and Micropythonβ12Aug 20, 2020Updated 5 years ago
- Smart and efficient tool to automate open redirect detection at scale.β10Mar 21, 2022Updated 3 years ago
- A Bash wrapper for radamsa that can be used to fuzz exported activities and deep links.β52Aug 17, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ43Mar 25, 2025Updated 11 months ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.β13Aug 4, 2025Updated 6 months ago
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-apiβ13Dec 8, 2021Updated 4 years ago
- Simple tools to handle string and generate subdomain permutationsβ15Jun 8, 2022Updated 3 years ago
- Snyk Node Runtime Agentβ16Apr 12, 2022Updated 3 years ago
- Tree traversal and transform functionsβ12Jun 7, 2015Updated 10 years ago
- Scanner for public s3 bucketsβ12Oct 23, 2017Updated 8 years ago
- You can check below blog post on attacks related to azure storage.β13Apr 8, 2021Updated 4 years ago