An extended Node.js runtime with additional security mechanisms built-in. Protects your Node.js applications from injection attacks such as SQL and NoSQL injection as well as path traversal attacks.
☆31May 7, 2021Updated 4 years ago
Alternatives and similar repositories for node-rasp
Users that are interested in node-rasp are comparing it to the libraries listed below
Sorting:
- Snyk Node Runtime Agent☆16Apr 12, 2022Updated 3 years ago
- Tree traversal and transform functions☆12Jun 7, 2015Updated 10 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Apr 23, 2021Updated 4 years ago
- Full Session Replays☆22Feb 26, 2022Updated 4 years ago
- Dynamic Taint Analysis in JavaScript☆16Feb 24, 2011Updated 15 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆11Dec 19, 2024Updated last year
- Content-Security-Policy report aggregator/analyzer☆54May 29, 2020Updated 5 years ago
- Modules for the Stratos ERP project☆13May 15, 2023Updated 2 years ago
- A simple, case-management-focused CRM for small altruistic organisations.☆10Jun 8, 2020Updated 5 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- Trimmed adblocking lists: Ads, trackers, malware and miners for average Joe and Janes☆10Sep 3, 2021Updated 4 years ago
- Fireline,a static code analysis program to look for bugs in Java code.☆10Nov 21, 2022Updated 3 years ago
- Burp Bounty is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.☆71Feb 4, 2022Updated 4 years ago
- Assembler, disassembler and decompiler for Java class files☆19Apr 30, 2015Updated 10 years ago
- ECMAScript source modification tool☆62Feb 6, 2016Updated 10 years ago
- Git module to prevent from committing sensitive information into the repository.☆43Aug 20, 2019Updated 6 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆31Aug 13, 2015Updated 10 years ago
- ☆81Oct 14, 2012Updated 13 years ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆16Feb 2, 2019Updated 7 years ago
- Storybook benchmark☆16Jun 9, 2023Updated 2 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆44May 4, 2022Updated 3 years ago
- ☆10Apr 20, 2023Updated 2 years ago
- Kubernetes sidecar for MongoDB☆42Jan 16, 2023Updated 3 years ago
- ☆30Aug 30, 2022Updated 3 years ago
- A nodejs loader for import maps☆61Oct 24, 2025Updated 4 months ago
- AGV☆14Aug 29, 2015Updated 10 years ago
- Check Redis instance for security vulnerabilities.☆13Sep 20, 2016Updated 9 years ago
- Code record☆14Aug 4, 2019Updated 6 years ago
- ⚡️ Combine several JSON files into one with Gulp☆12Feb 27, 2023Updated 3 years ago
- It shows how you can get visuals back quicker if you're only assembling existing parts☆13May 1, 2024Updated last year
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- A simple implementation of an "Error" [pseudo-]monad for Ruby.☆16Dec 29, 2015Updated 10 years ago
- ☆10Apr 22, 2016Updated 9 years ago
- A simple class-based object model for JavaScript