Intentionaly very vulnerable API with bonus bad coding practices
☆52Nov 15, 2025Updated 4 months ago
Alternatives and similar repositories for vulnapi
Users that are interested in vulnapi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆46Feb 2, 2023Updated 3 years ago
- ☆84May 1, 2023Updated 2 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,197Nov 25, 2024Updated last year
- Vulnerable API☆422Mar 4, 2023Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆133Dec 22, 2022Updated 3 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Mar 29, 2026Updated last week
- 🔍 Improve your files enumeration with specific extensions!☆17Jan 11, 2022Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- stdin writes to slack☆13Feb 8, 2020Updated 6 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Enumerate wordpress users in 1 second.☆15Jan 23, 2018Updated 8 years ago
- Penetration Testing Lab☆28Jul 17, 2014Updated 11 years ago
- TensorFlow materials☆13Jan 8, 2021Updated 5 years ago
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- bugBounty Scripts☆11Feb 3, 2023Updated 3 years ago
- ☆39Jul 1, 2023Updated 2 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Community documentation for known Hack The Box v4 API endpoints☆26Oct 6, 2022Updated 3 years ago
- ☆18Jul 26, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Tools & TTP's for Active Directory Red Teaming☆31Dec 22, 2024Updated last year
- Javascript payload that inject a malicious payload into the copy-buffer of the victim☆37May 25, 2018Updated 7 years ago
- Implement CollAFL using LLVM LTO pass on afl++.☆12Sep 24, 2020Updated 5 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated 2 weeks ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- Mass IP Grabbbing From Bing | Mr.MaGnoM☆12Jun 6, 2018Updated 7 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 3 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- Solutions of xchg rax,rax☆15Jun 2, 2020Updated 5 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,332Jan 10, 2025Updated last year
- List of Command&Control (C2) software☆50Nov 11, 2022Updated 3 years ago
- ✍️ A curated list of CVE PoCs.☆13Jan 24, 2018Updated 8 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- completely ridiculous API (crAPI)☆1,472Apr 2, 2026Updated last week