From 409526a95c668aee679c0bb028764758ac210eb0 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Andr=C3=A9=20Rainho?= Date: Mon, 29 Aug 2022 00:20:11 +0100 Subject: [PATCH] new entry on deliberately vulnerable apis - tryhackme bookstore room --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 408170e..03a159e 100644 --- a/README.md +++ b/README.md @@ -93,6 +93,7 @@ Please read the contributions section before openin | Name | Description | | ---- | ----------- | | [APISandbox](https://github.com/API-Security/APISandbox) | Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose. | +| [Bookstore](https://tryhackme.com/room/bookstoreoc) | TryHackMe room - A Beginner level box with basic web enumeration and REST API Fuzzing. | | [crAPI](https://github.com/OWASP/crAPI) | completely ridiculous API (crAPI) | | [Damn-Vulnerable-GraphQL-Application](https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application)| Damn Vulnerable GraphQL Application is intentionally vulnerable implementation of Facebook's GraphQL technology to learn and practice GraphQL Security. | | [Damn Vulnerable Micro Services](https://github.com/ne0z/DamnVulnerableMicroServices) | This is a vulnerable microservice written in many languages to demonstrating OWASP API Top Security Risk (under development)|