Rules for detecting security issues in Angular 1.x
☆30Apr 20, 2023Updated 3 years ago
Alternatives and similar repositories for eslint-plugin-angularjs-security-rules
Users that are interested in eslint-plugin-angularjs-security-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Oct 3, 2018Updated 7 years ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- A small tool that extracts relative URLs from a file.☆768Sep 23, 2020Updated 5 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 10 months ago
- Actarus is a custom tool for bug bounty☆77Nov 14, 2019Updated 6 years ago
- ☆32May 30, 2019Updated 6 years ago
- A python script to bypass 403-forbidden.☆13Aug 2, 2021Updated 4 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- ☆15Mar 21, 2025Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆17Jul 1, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- a javascript static security analysis tool☆591May 5, 2015Updated 11 years ago
- frown (frida-own) – an instrumentation challenge☆25Jan 20, 2024Updated 2 years ago
- An invoice management application built on the MEAN stack with intentional vulnerabilities used to demonstrate insecure configurations an…☆16Sep 4, 2020Updated 5 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆14Dec 17, 2018Updated 7 years ago
- Scanning LAN hosts from Chrome using ICE servers☆30Dec 20, 2019Updated 6 years ago
- ☆25May 30, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Extract username and passwords from IPTV urls☆13Nov 8, 2025Updated 6 months ago
- Implementation of LDFI for Akka programs in Scala☆15Sep 27, 2018Updated 7 years ago
- A library for generating PDFs, images, and other types of output in Play Framework applications.☆11Mar 3, 2025Updated last year
- ☆19Mar 24, 2017Updated 9 years ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆93Aug 27, 2019Updated 6 years ago
- Simple tool to test for SSRF/OOB HTTP Read within the Path of a request☆30Aug 2, 2019Updated 6 years ago
- Small python script to extract Facebook deeplinks from an APK file☆14Oct 30, 2020Updated 5 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated 2 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆100Dec 30, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆36Sep 12, 2020Updated 5 years ago
- A sample Akka Cluster application that uses ZooKeeper for service discovery☆12Dec 12, 2017Updated 8 years ago
- A repository for GraphQL Extension for Burp Suite☆57Oct 31, 2018Updated 7 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆23Jul 31, 2022Updated 3 years ago
- Burp-suite Extension For finding .map files☆54Dec 19, 2023Updated 2 years ago
- Example code used during the "Effective Akka HTTP" talk at Reactive Systems Hamburg, November 2016☆13Nov 14, 2016Updated 9 years ago
- Tool to search secrets in various filetypes.☆1,034Apr 25, 2023Updated 3 years ago