roottusk / vapiLinks
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
☆1,322Updated last year
Alternatives and similar repositories for vapi
Users that are interested in vapi are comparing it to the libraries listed below
Sorting:
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,166Updated last year
- completely ridiculous API (crAPI)☆1,415Updated this week
- API Security Project aims to present unique attack & defense methods in API Security field☆1,429Updated last year
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆858Updated 4 months ago
- Twitter vulnerable snippets☆1,097Updated 10 months ago
- ☆1,117Updated 2 years ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,062Updated this week
- My cheatsheet notes to pentest AWS infrastructure☆704Updated 3 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,139Updated 2 weeks ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,966Updated 8 months ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677Updated 8 months ago
- ☆422Updated 3 years ago
- ☆1,013Updated 4 years ago
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆553Updated this week
- A list of open source web security scanners☆1,285Updated 9 months ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,626Updated 2 months ago
- Golden Guide☆510Updated 6 months ago
- Contextual Content Discovery Tool☆3,082Updated last year
- PeTeReport is an open-source application vulnerability reporting tool.☆532Updated last year
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆850Updated 3 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆502Updated last week
- ☆758Updated last year
- Bugbounty Resources☆541Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆1,303Updated 2 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,815Updated last year
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆541Updated 3 years ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,185Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Updated 2 years ago
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆914Updated 2 months ago
- This script grab public report from hacker one and make some folders with poc videos☆906Updated 3 months ago