appsecco / dvna
Damn Vulnerable NodeJS Application
☆705Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for dvna
- Automatically exported from code.google.com/p/domxsswiki☆518Updated 6 years ago
- A very vulnerable web site written in NodeJS with the purpose of have a project with identified vulnerabilities to test the quality of se…☆447Updated 3 months ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆873Updated 3 weeks ago
- Repository for hosting my research papers☆503Updated 7 months ago
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆443Updated 5 years ago
- ☆788Updated last year
- Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem☆632Updated 3 years ago
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.☆518Updated last year
- Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"☆221Updated last month
- This repository contains payload to test NoSQL Injections☆351Updated 3 years ago
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆532Updated 7 years ago
- A Powerful Subdomain Takeover Tool☆931Updated last year
- Content discovery wordlists generated using BigQuery☆558Updated 4 years ago
- ☆454Updated 3 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,107Updated 3 weeks ago
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆410Updated 3 weeks ago
- ☆318Updated 6 years ago
- njsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.☆375Updated last week
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆257Updated 3 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆634Updated 5 years ago
- Delightful Node.js packages useful for penetration testing, exploiting, reverse engineer, cryptography ...☆418Updated 3 years ago
- Tools and datas related to Bug Bounty.☆230Updated 2 years ago
- Multi Tool Subdomain Enumeration☆722Updated 3 years ago
- Tools of "The Bug Hunters Methodology V2 by @jhaddix"☆197Updated 7 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆532Updated 2 years ago
- The ZAP Heads Up Display (HUD)☆253Updated last week
- A simple SSRF-testing sheriff written in Go☆316Updated 2 weeks ago
- Pathbrute☆444Updated 4 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆455Updated last month
- ☆532Updated 9 months ago