zaproxy / zap-api-docs
ZAP API Documentation
☆35Updated 2 weeks ago
Alternatives and similar repositories for zap-api-docs:
Users that are interested in zap-api-docs are comparing it to the libraries listed below
- The source of ZAP website☆72Updated this week
- The ZAP Heads Up Display (HUD)☆263Updated 2 months ago
- OWASP Foundation Web Respository☆63Updated last year
- OWASP Foundation Web Respository☆41Updated last year
- Some good resources for getting started with application security☆142Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆125Updated 2 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago
- A Broken Application - Very Vulnerable!☆156Updated this week
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆39Updated 3 weeks ago
- OWASP Foundation Web Respository☆67Updated last month
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆20Updated 8 months ago
- ZAP Add-ons☆865Updated last week
- GraphQL security workshop labs☆104Updated 9 months ago
- portscanner in javascript☆69Updated 3 years ago
- Official module repository for the Recon-ng Framework.☆236Updated 9 months ago
- ☆78Updated last year
- GraphQL security testing tool☆122Updated 3 years ago
- ☆93Updated 7 months ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆316Updated last year
- ☆38Updated 2 months ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆76Updated 5 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆78Updated 2 years ago
- An application to catch, search and analyze HTTP secure headers.☆65Updated 3 years ago
- Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"☆225Updated 3 weeks ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆109Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆102Updated last year
- Vulnerable Banking Suite☆157Updated last year
- Hands-On AWS Penetration Testing with Kali Linux published by Packt☆131Updated 2 years ago
- The Secure Coding Framework☆268Updated 4 years ago