☆16Oct 3, 2018Updated 7 years ago
Alternatives and similar repositories for eslint-plugin-prototype-pollution-security-rules
Users that are interested in eslint-plugin-prototype-pollution-security-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An invoice management application built on the MEAN stack with intentional vulnerabilities used to demonstrate insecure configurations an…☆16Sep 4, 2020Updated 5 years ago
- Rules for detecting security issues in Angular 1.x☆30Apr 20, 2023Updated 2 years ago
- ☆35Oct 28, 2021Updated 4 years ago
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- Make it easy to probe the strengths and weaknesses of a hardened Node.js stack☆21May 3, 2019Updated 6 years ago
- LCTF 2018 Platform☆16Oct 3, 2023Updated 2 years ago
- Secure Contexts, but with _more_ secureness!☆20May 1, 2024Updated last year
- ☆17Apr 21, 2017Updated 8 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- A zoo for malicious NPM packages☆20Dec 8, 2022Updated 3 years ago
- Blockchains. Destruction. Mayhem.☆50Dec 7, 2022Updated 3 years ago
- some codeql rules☆15Apr 6, 2020Updated 5 years ago
- Contains random code and some of my older projects☆28Feb 28, 2024Updated 2 years ago
- GitHub Advanced Security Python Toolkit☆14Updated this week
- A repository for GraphQL Extension for Burp Suite☆57Oct 31, 2018Updated 7 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- 🚩 CTF AWD framework☆29Nov 28, 2021Updated 4 years ago
- ☆74Aug 20, 2018Updated 7 years ago
- ☆36Aug 7, 2020Updated 5 years ago
- 对一些开源cms官网的更新,github commit进行监控的工具☆11Dec 27, 2018Updated 7 years ago
- Fast and simple way to check any HTTP Headers☆46Jun 25, 2023Updated 2 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated 2 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Pockr Asset Management 破壳资产管理工具☆11Dec 8, 2022Updated 3 years ago
- Instructions for setting up Kerberos, Zookeeper, and Kafka with SASL☆16Jan 22, 2018Updated 8 years ago
- Repo for CSAW CTF 2018 Quals challenges☆38Sep 17, 2018Updated 7 years ago
- Cloud metadata extraction tools and scripts☆34May 22, 2023Updated 2 years ago
- The rust language implementation of the Falco client☆16Jul 20, 2022Updated 3 years ago
- ☆13Apr 24, 2018Updated 7 years ago
- A modern CLI for Tenable.io written in Go☆14Nov 28, 2020Updated 5 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- Toolset for writing shellcode in Python's Pickle language and for manipulating pickles to inject shellcode.☆84Apr 20, 2017Updated 8 years ago
- ☆11May 13, 2019Updated 6 years ago
- sqlmap分块传输代理☆48May 24, 2019Updated 6 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116May 17, 2019Updated 6 years ago
- Depstubber generates type-correct stubs for Go dependencies, for use in testing☆17Mar 21, 2025Updated last year