roottusk / vapi
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
☆1,205Updated last month
Alternatives and similar repositories for vapi:
Users that are interested in vapi are comparing it to the libraries listed below
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆964Updated 2 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,369Updated 11 months ago
- completely ridiculous API (crAPI)☆1,178Updated this week
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆469Updated last month
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,175Updated 2 months ago
- ☆371Updated 2 years ago
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆834Updated 2 weeks ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,730Updated 8 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆928Updated last month
- Bugbounty Resources☆535Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,791Updated 2 weeks ago
- Contextual Content Discovery Tool☆2,747Updated 9 months ago
- An XSS exploitation command-line interface and payload generator.☆1,304Updated last month
- Golden Guide☆482Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,489Updated 9 months ago
- My cheatsheet notes to pentest AWS infrastructure☆666Updated 2 years ago
- ☆1,182Updated 2 years ago
- An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects☆953Updated 3 years ago
- ☆524Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,873Updated last year
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆574Updated last year
- API Security Project aims to present unique attack & defense methods in API Security field☆282Updated 2 years ago
- ☆993Updated 3 years ago
- Identify privilege escalation paths within and across different clouds☆680Updated 3 months ago
- ☆748Updated 7 months ago
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆897Updated last year
- Awesome cloud enumerator☆956Updated 6 months ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆464Updated 4 months ago
- Automating situational awareness for cloud penetration tests.☆2,035Updated last month
- ☆1,646Updated 3 weeks ago