A vulnerable node.js application
☆42Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for VulnNodeApp
Users that are interested in VulnNodeApp are comparing it to the libraries listed below
Sorting:
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated 2 weeks ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 5 years ago
- 一款信息泄漏利用工具,适用于.git/.svn/.DS_Store泄漏和目录列出(dumpall Golang重构版)☆21Apr 8, 2025Updated 10 months ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 8 months ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- ☆19Dec 5, 2024Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Tai-e的Web插件☆23Jun 11, 2024Updated last year
- 用Go编写的轻量文件监控器. 可以监控终端上指定文件夹内的变化, 阻止删除,修改,新增操作. 可以用于AWD比赛或者终端应急响应☆35Sep 28, 2025Updated 5 months ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆20Feb 16, 2021Updated 5 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- ☆18Dec 12, 2020Updated 5 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Hidedump:a lsassdump tools that may bypass EDR☆51May 23, 2024Updated last year
- Automatic security vulnerability remediation for your code.☆65Updated this week
- #JavascriptRecon #bugbounty☆21Aug 18, 2021Updated 4 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- 就是一个练习RMI 反序列化的最简单环境☆30Jan 8, 2022Updated 4 years ago
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated last month
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 3 years ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 9 months ago
- Vandalize old emails. Like an NFT that's easy to prove ownership of.☆34Jul 20, 2023Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Jun 10, 2025Updated 8 months ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- This is a writeup for CVE-2020-11107 reported by Maximilian Barz☆32Apr 3, 2020Updated 5 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Typora theme based on the CryptoHack blog☆33Mar 24, 2021Updated 4 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago