COURSE AUTHOR – Wesley Thijs
Last Updated on September 11, 2022 by GeeksGod
1. Build your own API to hack 2. Protect an API with a firewall 3. The OWASP API top 10 vulnerabilities 4. API hacking with postman