A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.
☆10Jun 15, 2023Updated 2 years ago
Alternatives and similar repositories for vulnerable-app
Users that are interested in vulnerable-app are comparing it to the libraries listed below
Sorting:
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆21Nov 7, 2025Updated 3 months ago
- ☆11May 30, 2021Updated 4 years ago
- ☆49Feb 10, 2019Updated 7 years ago
- WSO SHELL , wso shell , WSO.php , wso.php , webshell , wso-shell веб-шелл , шелл , WSO2.5 , WSO2.5.1 , WSO2.php , Shell download, C99 , …☆10Jun 25, 2016Updated 9 years ago
- A curated list of awesome Arch-related projects,softwares and resources.☆16May 9, 2021Updated 4 years ago
- Initiates PostgreSQL streaming replication using rsync and ssh☆20May 16, 2013Updated 12 years ago
- java 内存马系列 实现(Servlets 、组件、Agent)☆10Mar 7, 2022Updated 3 years ago
- Demo Code for the Xpring SDK☆11Aug 31, 2023Updated 2 years ago
- 代码审计关键词扫描工具☆11Apr 29, 2024Updated last year
- fscan结果优化,更新DC域筛选☆10Nov 21, 2023Updated 2 years ago
- Java ☕ reverse engineering tool - Batch decompile the jar package.☆10Feb 14, 2023Updated 3 years ago
- Java安全相关,目前主要是CC链研究☆10Sep 1, 2022Updated 3 years ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- Tao(道)一款用于java语言函数调用关系生成的工具, 致力于提高java代码审计效率。☆11Jul 2, 2024Updated last year
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- Tool Desgined to remove unwanted apps from Xioami Devices.☆13Oct 22, 2023Updated 2 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- SAMR修改域内主机密码☆10Feb 27, 2022Updated 4 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- 灯塔v2.6.2_docker版本☆15Oct 13, 2025Updated 4 months ago
- ☆10Jul 21, 2022Updated 3 years ago
- Extract entire function source code based on giving line number using Javaparser☆21Jul 15, 2025Updated 7 months ago
- 批量域名筛查CDN☆12Nov 26, 2021Updated 4 years ago
- A tool to embed files into images☆14Feb 10, 2021Updated 5 years ago
- Quick deployment for LEMP / LAMP on Ubuntu.☆13May 9, 2023Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- 安卓APP和微信小程序抓包以及反编译需要的一些软件应用☆11Jan 23, 2024Updated 2 years ago
- ☆13Nov 7, 2023Updated 2 years ago
- Kali in a Box - Containerized and fully operational within your Browser☆13Nov 17, 2025Updated 3 months ago
- Java安全,漏洞分析/挖掘/利用☆14Mar 14, 2023Updated 2 years ago
- Automatically reloads HoRNDIS kext when usb tether device is plugged in☆10Dec 18, 2017Updated 8 years ago
- Python-based stack trace analysis tools☆10May 7, 2018Updated 7 years ago
- Data Structure and Algorithm explanations with Implementations by Python☆15Jul 12, 2021Updated 4 years ago
- Bash scripts that help you audit the system administration on a Linux server☆11Jun 26, 2017Updated 8 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated last year