A NoSQL Injectable Node App
☆42Jun 8, 2021Updated 4 years ago
Alternatives and similar repositories for vulnerable-node-app
Users that are interested in vulnerable-node-app are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- A simple web app with a XXE vulnerability.☆232Nov 10, 2021Updated 4 years ago
- App with Server Side Template Injection (SSTI) vulnerability - possible RCE - in Flask. Free vulnerable app for ethical hacking / penetra…☆16Sep 15, 2022Updated 3 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- bugBounty Scripts☆11Feb 3, 2023Updated 3 years ago
- ☆11Nov 19, 2020Updated 5 years ago
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- ☆18Mar 23, 2020Updated 6 years ago
- ☆88Apr 24, 2024Updated last year
- A collection of useful scripts☆24Sep 12, 2018Updated 7 years ago
- An automatic XSS scanner☆10Oct 8, 2024Updated last year
- Mass IP Grabbbing From Bing | Mr.MaGnoM☆12Jun 6, 2018Updated 7 years ago
- Packaging tool to simplify what to include/archive for Veracode scan.☆10Oct 4, 2024Updated last year
- This tool is used to find the admin login page of a website.☆16Jan 15, 2021Updated 5 years ago
- SQL injection via unsanitized QuerySet.order_by() input☆13Jul 10, 2021Updated 4 years ago
- CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to …☆12Jan 1, 2024Updated 2 years ago
- Okadminfinder rewrite by Xnuvers007☆16Apr 13, 2021Updated 4 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆18Dec 28, 2017Updated 8 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- Serverless Workshop☆16Dec 8, 2022Updated 3 years ago
- The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489☆31Mar 26, 2024Updated last year
- ☆23Dec 3, 2020Updated 5 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Oct 29, 2020Updated 5 years ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- javaspringvulny - a Spring Boot web application built wrong on purpose☆24Nov 13, 2025Updated 4 months ago
- Creating an image gallery from a folder of images automatically☆20Jul 13, 2020Updated 5 years ago
- malloc for memory-mapped files☆14Jun 25, 2020Updated 5 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆47Feb 16, 2024Updated 2 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 6 years ago
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆404Oct 31, 2021Updated 4 years ago
- Java bindings for Google cpu_features☆10Jun 20, 2024Updated last year