An extended Node.js runtime with additional security mechanisms built-in. Protects your Node.js applications from injection attacks such as SQL and NoSQL injection as well as path traversal attacks.
☆31May 7, 2021Updated 4 years ago
Alternatives and similar repositories for node-rasp
Users that are interested in node-rasp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SWAT, a dynamic symbolic execution engine for Java Applications that uses ASM for on-the-fly byte code instrumentation.☆40Apr 30, 2025Updated 11 months ago
- Snyk Node Runtime Agent☆16Apr 12, 2022Updated 3 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Apr 23, 2021Updated 4 years ago
- A collection of intentionally vulnerable test bench applications for testing the Contrast Security Node Agent.☆10Oct 13, 2025Updated 5 months ago
- ☆23Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Dynamic Taint Analysis in JavaScript☆16Feb 24, 2011Updated 15 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- 《深入理解IAST交互式应用安全测试》Interactive Application Security Testing.☆13Oct 20, 2022Updated 3 years ago
- Phosphor: Dynamic Taint Tracking for the JVM☆182Jun 17, 2025Updated 9 months ago
- ☆11Dec 19, 2024Updated last year
- Content-Security-Policy report aggregator/analyzer☆54May 29, 2020Updated 5 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- Modules for the Stratos ERP project☆13May 15, 2023Updated 2 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- bugbounty tools☆17Oct 26, 2023Updated 2 years ago
- Burp Bounty is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.☆71Feb 4, 2022Updated 4 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- Assembler, disassembler and decompiler for Java class files☆19Apr 30, 2015Updated 10 years ago
- ☆81Oct 14, 2012Updated 13 years ago
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆119Feb 13, 2026Updated last month
- Evaluation Framework for Dependency Analysis (EFDA)☆44May 4, 2022Updated 3 years ago
- Kubernetes sidecar for MongoDB☆42Jan 16, 2023Updated 3 years ago
- ☆30Aug 30, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A nodejs loader for import maps☆61Oct 24, 2025Updated 5 months ago
- Code record☆14Aug 4, 2019Updated 6 years ago
- Check Redis instance for security vulnerabilities.☆13Sep 20, 2016Updated 9 years ago
- ⚡️ Combine several JSON files into one with Gulp☆12Feb 27, 2023Updated 3 years ago
- Testability Pattern Catalogs for SAST☆34Feb 18, 2025Updated last year
- It shows how you can get visuals back quicker if you're only assembling existing parts☆13May 1, 2024Updated last year
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- docker remote api未授权访问的利用代码☆50Feb 14, 2017Updated 9 years ago
- A simple implementation of an "Error" [pseudo-]monad for Ruby.☆16Dec 29, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Apr 22, 2016Updated 9 years ago
- mult-answer plugin for CTFd☆15Aug 22, 2019Updated 6 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- 一些学习笔记 Good Good Study Day Day Up !☆12Mar 1, 2023Updated 3 years ago
- CSAW 2017 Embedded Security Challenge☆12Jun 7, 2018Updated 7 years ago
- An Emacs mode to help you learn the proper Emacs movement keys☆17Jul 23, 2012Updated 13 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago