NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a better understanding of the NoSQL injection vulnerability among a wide audience of software engineers, security engineers, pentesters, and trainers.
☆19Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for nosql-injection-vulnapp
Users that are interested in nosql-injection-vulnapp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX☆19Jul 22, 2023Updated 2 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Code-snippets for developing eBPF programs☆20Oct 6, 2025Updated 5 months ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆45Mar 21, 2026Updated last week
- ☆21Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Practical Jupyter notebooks from Andrew Ng and Giskard team's "Red Teaming LLM Applications" course on DeepLearning.AI.☆23Apr 8, 2024Updated last year
- A deliberately vulnerable js app made with reactjs. For educational purposes.☆17Mar 20, 2019Updated 7 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Burp Suite Configuration Tweak☆13Mar 15, 2024Updated 2 years ago
- HTB writeup downloader☆24Aug 11, 2022Updated 3 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- trakttv everywhere☆27Mar 31, 2013Updated 13 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆12Oct 17, 2020Updated 5 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16May 15, 2020Updated 5 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Mar 19, 2026Updated last week
- Termux - a terminal emulator application for Android OS extendible by variety of packages.☆12Jan 8, 2023Updated 3 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 8 months ago
- HVNC using virtual desktop☆10Dec 30, 2020Updated 5 years ago
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 5 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- Tested Ducky script payloads for USB Rubber Ducky☆14Nov 7, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆18Apr 16, 2022Updated 3 years ago
- ☆11Aug 31, 2021Updated 4 years ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆31Oct 16, 2024Updated last year
- A JSON API to fetch Piped instances!☆12Updated this week
- ☆17Feb 22, 2020Updated 6 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- A domain specific language for creating composable command line interfaces.☆14Mar 17, 2026Updated last week