A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
-
Updated
Apr 12, 2024 - CSS
A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.
Vulnerable REST based PHP webservice deployed in Docker
just a lab for sql injection
A website developed with Nodejs. This website includes server side prototype pollution vulnerability
Add a description, image, and links to the vulnerable-web-app topic page so that developers can more easily learn about it.
To associate your repository with the vulnerable-web-app topic, visit your repo's landing page and select "manage topics."