This repository contains an example Python API that is vulnerable to several different web API attacks.
☆27Feb 1, 2019Updated 7 years ago
Alternatives and similar repositories for vulnerable-api
Users that are interested in vulnerable-api are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Feb 7, 2024Updated 2 years ago
- Pretty vulnerable flask app..☆22Oct 30, 2018Updated 7 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- An insecure example application (Java)☆33Aug 19, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆17Updated this week
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- An tool for search IOT MQTT vulnerable with shodan☆21Sep 15, 2017Updated 8 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆30Jan 30, 2023Updated 3 years ago
- PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 7 - Ansible role generated from ComplianceAsCode☆16Dec 11, 2018Updated 7 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆47Feb 16, 2024Updated 2 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- An offensive attack framework for Distributed Layer of Modern Applications☆85Feb 5, 2020Updated 6 years ago
- Github action that installs SDKs served up by the AdoptOpenJDK API☆12May 8, 2024Updated 2 years ago
- 404 File not found C2 PoC☆32Jul 4, 2016Updated 9 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- ☆31Feb 10, 2020Updated 6 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆12Nov 22, 2016Updated 9 years ago
- Scrape Twitter for long hashtags that could be used as passwords☆10Jan 4, 2017Updated 9 years ago
- Extract the best title value from within HTML head elements.☆17Apr 17, 2023Updated 3 years ago
- Change code blocks to look more like a terminal☆10Jun 14, 2017Updated 8 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Quick Repo for any Bug Hunter☆15May 19, 2021Updated 4 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- ☆33Oct 12, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆135Dec 22, 2022Updated 3 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆41Feb 4, 2023Updated 3 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated last year
- Intentionally Vulnerable Node Applications☆16Mar 12, 2020Updated 6 years ago