A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
-
Updated
Apr 12, 2024 - CSS
A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.
A website developed with Nodejs. This website includes server side prototype pollution vulnerability
Vulnerable REST based PHP webservice deployed in Docker
just a lab for sql injection
Add a description, image, and links to the vulnerable-web-app topic page so that developers can more easily learn about it.
To associate your repository with the vulnerable-web-app topic, visit your repo's landing page and select "manage topics."