Vulnerabilities discovered in npm packages [Berkeley PL & Security Research]
☆42Jun 22, 2024Updated last year
Alternatives and similar repositories for NPM-Vuln-PoC
Users that are interested in NPM-Vuln-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jan 9, 2023Updated 3 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Dec 20, 2019Updated 6 years ago
- Proxy to run security checks against packages from npm☆12Sep 4, 2016Updated 9 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Dec 9, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A zoo for malicious NPM packages☆20Dec 8, 2022Updated 3 years ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆51Jan 15, 2026Updated 2 months ago
- Reacting to content with GPT-4V, OpenAI tts, Cloudflare Workers and Mac shortcuts☆21Nov 29, 2023Updated 2 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- Babelfish Python client☆17Nov 6, 2019Updated 6 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Jun 16, 2015Updated 10 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Aug 10, 2021Updated 4 years ago
- Vulnerabilities which found in Oracle products☆33Apr 17, 2019Updated 6 years ago
- Proof of concept code for client-side vulnerabilities☆17Mar 14, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SolarWinds Orion API 远程代码执行漏洞批量检测脚本☆10Jan 5, 2021Updated 5 years ago
- A linter for npm & node package.json files with a focus on dependency security☆29Apr 19, 2020Updated 5 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Tools to gather subdomains from Bug Bounty programs☆65Mar 29, 2018Updated 7 years ago
- Secure Coding in Python☆22Oct 11, 2024Updated last year
- (Keep It) Simple Stupid Database☆10Jul 16, 2017Updated 8 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- ☆18Dec 12, 2022Updated 3 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SecurityPaper For www.polaris-lab.com☆104Mar 13, 2019Updated 7 years ago
- LiteX-based PCIe MITM, sniffing, fuzzing, device emulation☆19Feb 9, 2022Updated 4 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- ☆13Mar 15, 2020Updated 6 years ago
- The BAP tutorial☆73Dec 15, 2022Updated 3 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- get popular npm packages☆45Mar 26, 2025Updated last year
- Playing with Haskell☆12Oct 13, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Compiled dataset of Java deserialization CVEs☆60Aug 31, 2020Updated 5 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- Package verification for npm☆62Feb 12, 2022Updated 4 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- Black Hat 2017 Talk☆12Jul 31, 2017Updated 8 years ago
- 苹果商店模拟购买下载工具。☆18Dec 30, 2021Updated 4 years ago