An invoice management application built on the MEAN stack with intentional vulnerabilities used to demonstrate insecure configurations and missing or insufficient security controls.
☆16Sep 4, 2020Updated 5 years ago
Alternatives and similar repositories for MEANBug
Users that are interested in MEANBug are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Oct 3, 2018Updated 7 years ago
- Make it easy to probe the strengths and weaknesses of a hardened Node.js stack☆21May 3, 2019Updated 6 years ago
- ☆35Oct 28, 2021Updated 4 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- Blockchains. Destruction. Mayhem.☆50Dec 7, 2022Updated 3 years ago
- Contains random code and some of my older projects☆28Feb 28, 2024Updated 2 years ago
- GitHub Advanced Security Python Toolkit☆14Updated this week
- Supporting material for the frida scripting guide☆22Jul 2, 2022Updated 3 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- Lint your Rego policies inside of Visual Studio Code☆16Jun 16, 2024Updated last year
- Pure haskell encoding of MLIR for printing, parsing, and mutating MLIR within haskell☆17Oct 30, 2020Updated 5 years ago
- ☆20Feb 28, 2018Updated 8 years ago
- ☆15Jul 9, 2020Updated 5 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆13Apr 21, 2022Updated 3 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Secure Contexts, but with _more_ secureness!☆20May 1, 2024Updated last year
- Security scanning & static analysis tool☆93Oct 17, 2024Updated last year
- Instructions for setting up Kerberos, Zookeeper, and Kafka with SASL☆16Jan 22, 2018Updated 8 years ago
- The rust language implementation of the Falco client☆16Jul 20, 2022Updated 3 years ago
- Fast and simple way to check any HTTP Headers☆46Jun 25, 2023Updated 2 years ago
- Depstubber generates type-correct stubs for Go dependencies, for use in testing☆17Mar 21, 2025Updated last year
- A library to convert between Sigstore Bundles and PEP 740 Attestation objects☆14Updated this week
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆48Jul 24, 2021Updated 4 years ago
- An asynchronous leased value☆17Nov 8, 2019Updated 6 years ago
- ☆18Jan 20, 2026Updated 2 months ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- `document.domain` intentionally weakens the only security boundary we have. Perhaps we can dump it?☆17Nov 3, 2023Updated 2 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- oauth security guidelines☆232Jun 25, 2019Updated 6 years ago
- Canari local transforms pcap file analysis☆30Apr 14, 2014Updated 11 years ago
- An experimental cryptographic virtual machine☆14Feb 15, 2017Updated 9 years ago
- Rules for detecting security issues in Angular 1.x☆30Apr 20, 2023Updated 2 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Mar 20, 2017Updated 9 years ago
- A proxy designed to lie.☆25Jan 26, 2013Updated 13 years ago
- Browser-based iOS IPA security analyzer.☆57Jan 12, 2026Updated 2 months ago