Tools Blog Learn Quizzes Smile API Log In / Sign Up
Tools Blog Learn Quizzes Smile API Log In / Sign Up
We have updated our privacy policy to let you know that we use cookies to personalise content and ads. We also use cookies to analyse our traffic and we share information about your use of our site and application with our advertising and analytics partners. By using this website or our application you agree to our use of cookies. Learn more about the way this website uses cookies or remove this message.

HTTP-API-Requests-Online Simple HTTP POST and GET Requests

Category: Web Development Tools

Version: 1.1.3 :: Last updated: 2017-05-15 - Changelog :: RoadMap

This is a tool that I built for myself a while back to simplify API testing and I am now making it available to anyone who needs to test APIs. The application sends GET or POST HTTP requests to a specified API end-point. The application saves request parameters and results so that you can share the results with co-workers and compare them with previous values. To activate your personal url, just send a request and a new url will be generated for you.

If you find this tool useful, please consider sharing it with other developers:    

Add extra headers

Upset by this ? You can remove the captcha and access the PRO features by creating an account or logging in.

Share URL for this request:



Request response: Raw/Parsed


Alerts

2017-09-21 - PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files. Read more ...
2017-09-21 - PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600. Read more ...

See All Entries...