all InfoSec news
vAPI - Vulnerable Adversely Programmed Interface Which Is Self-Hostable API That Mimics OWASP API Top 10 Scenarios Through Exercises
April 14, 2022, 9:30 p.m. | noreply@blogger.com (Unknown)
KitPloit - PenTest Tools! www.kitploit.com
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios in the means of Exercises.
- PHP
- MySQL
- PostMan
- MITM Proxy
docker-compose up -dInstallation (Manual)
Copying the Code
cd <your-hosting-directory>
git clone https://github.com/roottusk/vapi.git
Setting up the Database
Import vapi.sql into MySQL Database
Configure the DB Credentials in the vapi/.env
Starting MySQL service
Run following command (Linux)
service mysqld start
Starting Laravel Server
Go to vapi directory and Run
php artisan …
api exercises owasp owasp top 10 owasp top ten vapi vulnerable vulnerable application
More from www.kitploit.com / KitPloit - PenTest Tools!
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Cybersecurity Engineer
@ Alstom | Charleroi, BE
Member of Compliance, Information Technology
@ Anchorage Digital | United States
Information Security Consultant (GRC) - Cumulus Systems
@ Hitachi | (HIL) DELHI - RHQ
Security Engineer
@ EarnIn | Mexico