roottusk / vapi
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
☆1,212Updated 2 months ago
Alternatives and similar repositories for vapi:
Users that are interested in vapi are comparing it to the libraries listed below
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆968Updated 3 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,372Updated last year
- completely ridiculous API (crAPI)☆1,186Updated this week
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,202Updated 3 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆941Updated 2 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,879Updated last year
- ☆1,656Updated last week
- ☆375Updated 2 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,740Updated 9 months ago
- ☆997Updated 3 years ago
- Contextual Content Discovery Tool☆2,764Updated 10 months ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,414Updated 2 years ago
- ☆1,121Updated last year
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆964Updated 8 months ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,307Updated 3 months ago
- An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects☆953Updated 3 years ago
- ☆523Updated 3 years ago
- An XSS exploitation command-line interface and payload generator.☆1,315Updated last month
- Identify privilege escalation paths within and across different clouds☆682Updated 4 months ago
- Burp Suite Certified Practitioner Exam Study☆1,002Updated this week
- 🎯 XML External Entity (XXE) Injection Payload List☆1,150Updated 7 months ago
- Awesome Vulnerable Applications☆1,124Updated 7 months ago
- Notes about attacking Jenkins servers☆2,034Updated 8 months ago
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆837Updated last month
- ☆1,072Updated this week
- Rockyou for web fuzzing☆2,728Updated 2 weeks ago
- Ressources for bug bounty hunting☆1,791Updated 2 years ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆891Updated last year
- ☆815Updated this week
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,565Updated 2 years ago