This repository contains an example Python API that is vulnerable to several different web API attacks.
☆27Feb 1, 2019Updated 7 years ago
Alternatives and similar repositories for vulnerable-api
Users that are interested in vulnerable-api are comparing it to the libraries listed below
Sorting:
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Feb 7, 2024Updated 2 years ago
- A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity☆21Jul 3, 2024Updated last year
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- Pretty vulnerable flask app..☆22Oct 30, 2018Updated 7 years ago
- ☆15Oct 8, 2025Updated 4 months ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Dec 15, 2014Updated 11 years ago
- A method for building LinuxKit images for Docker-CE with custom kernels.☆21Aug 3, 2023Updated 2 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 2 years ago
- An automated setup for fuzzing Redis w/ AFL++☆35Mar 12, 2022Updated 3 years ago
- An insecure example application (Java)☆33Aug 19, 2025Updated 6 months ago
- Rules for detecting security issues in Angular 1.x☆30Apr 20, 2023Updated 2 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Demo Application and Exploit☆35Mar 13, 2017Updated 8 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Meus Estudos com Flutter (Moor+dio+Mobx)☆10Jan 13, 2020Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- The flowershow site behind flowershow.app☆10Feb 16, 2026Updated 2 weeks ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Uma CLI para criação de diretórios e arquivos da arquitetura criada Clean Dart baseada na Clean Architecture☆11Oct 13, 2020Updated 5 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem☆667Feb 25, 2021Updated 5 years ago
- The future of the decentralized internet begins with the community [L0]☆10Nov 4, 2017Updated 8 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Genrates python dependency graph☆22Aug 10, 2018Updated 7 years ago
- Scripts to create and manage a Proxmox Cluster☆11Oct 5, 2025Updated 5 months ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- Secure OTA bootloader for SiLabs EFR32BG BLE chips and BGM111 modules☆12Apr 21, 2017Updated 8 years ago
- App to quickly add Physical Machines into VMware Horizon Manual Pool☆11Mar 23, 2020Updated 5 years ago