roottusk / vapi
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
☆1,233Updated 4 months ago
Alternatives and similar repositories for vapi
Users that are interested in vapi are comparing it to the libraries listed below
Sorting:
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆983Updated 5 months ago
- completely ridiculous API (crAPI)☆1,230Updated this week
- API Security Project aims to present unique attack & defense methods in API Security field☆1,383Updated last year
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆840Updated 3 months ago
- ☆388Updated 2 years ago
- ☆1,002Updated 3 years ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,278Updated last month
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆538Updated 2 years ago
- ☆1,076Updated last month
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆963Updated 3 weeks ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,150Updated 9 months ago
- ☆719Updated 2 years ago
- ☆1,120Updated last year
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,682Updated 7 months ago
- Burp Suite Certified Practitioner Exam Study☆1,040Updated last month
- Mind-Maps of Several Things☆2,544Updated last year
- ☆1,694Updated last week
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,064Updated 10 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,842Updated 3 months ago
- Azure and AWS Attacks☆1,105Updated 2 years ago
- An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects☆958Updated 3 years ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆901Updated 3 weeks ago
- Contextual Content Discovery Tool☆2,837Updated last year
- Ressources for bug bounty hunting☆1,819Updated 2 years ago
- NMAP Vulnerability Scanning Scripts☆628Updated 3 years ago
- Tools & Interesting Things for RedTeam Ops☆2,189Updated 2 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆973Updated 10 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,757Updated 11 months ago
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆902Updated 2 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,586Updated last year