Provide a collection of deliberately vulnerable APIs along with corresponding challenges to help enhancing their skills in identifying, exploiting, and securing API vulnerabilities.
api challenge jwt cybersecurity api-rest vulnerability jwt-authentication vulnerable-web-app security-tools cybersecurity-education vulnerability-lab
-
Updated
Dec 7, 2025 - Go