logo
Red wilds
API attack playbooks
  • Privacy greenhouse
  • Defence blues
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Unseen University Power & Light Co.
    • The Scarlet Semaphore
    • Myrddin’s menagerie
    • In: Where the falcons and foxes roam
      • A canopy of apple-blossom
      • Social engineering
      • Where wild boars plough through endpoints
        • Tusks, snouts, and fuzzing snorts
        • API recon and attack runbooks
        • API attack playbooks
          • Playbook: REST API attack chain
          • Playbook: GraphQL attack chain
          • Playbook: Business logic abuse
        • API attack playbooks
          • Playbook: REST API attack chain
          • Playbook: GraphQL attack chain
          • Playbook: Business logic abuse
        • Where boars sharpen their tusks
      • Wolverines do not ask for permissions
      • Riches in the ground
      • The device is just the keyring
      • Poking physics with network packets
    • Through: Where the raccoons burrow and rummage
    • Out: Where squirrels swipe the crown jewels

    API attack playbooks¶

    Full attack chains from surface discovery through to exploitation. Each playbook covers one API type from the initial reconnaissance through to a documented finding, connecting the individual runbooks into an operational sequence.

    • Playbook: REST API attack chain
    • Playbook: GraphQL attack chain
    • Playbook: Business logic abuse
    2026-03-25 22:33
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7