Rules for detecting security issues in Angular 1.x
☆30Apr 20, 2023Updated 2 years ago
Alternatives and similar repositories for eslint-plugin-angularjs-security-rules
Users that are interested in eslint-plugin-angularjs-security-rules are comparing it to the libraries listed below
Sorting:
- ☆16Oct 3, 2018Updated 7 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- A method for building LinuxKit images for Docker-CE with custom kernels.☆21Aug 3, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A small tool that extracts relative URLs from a file.☆768Sep 23, 2020Updated 5 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Low level communication with Logitech G19 LCD Display☆15Jul 17, 2016Updated 9 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 7 months ago
- ☆18Nov 18, 2022Updated 3 years ago
- ☆32May 30, 2019Updated 6 years ago
- A python script to bypass 403-forbidden.☆13Aug 2, 2021Updated 4 years ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- frown (frida-own) – an instrumentation challenge☆25Jan 20, 2024Updated 2 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Compression Oracle Attack on OpenVPN☆13Sep 24, 2023Updated 2 years ago
- ☆25May 30, 2017Updated 8 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- GQL Burp Extension☆21Sep 16, 2022Updated 3 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 2 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- A repository for GraphQL Extension for Burp Suite☆57Oct 31, 2018Updated 7 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Jan 21, 2020Updated 6 years ago
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- Ragno is a Passive URL Crawler | Written in Python3 | Fetches URLs from the Wayback Machine, AlienVault's Open Threat Exchange & Common C…☆22Sep 1, 2025Updated 6 months ago