Provide a collection of deliberately vulnerable APIs along with corresponding challenges to help enhancing their skills in identifying, exploiting, and securing API vulnerabilities.
api
jwt
cybersecurity
api-rest
vulnerability
jwt-authentication
vulnerable-web-app
security-tools
cybersecurity-education
vulnerability-lab
-
Updated
Sep 13, 2024 - Go