effortlessdevsec / ninjasworkout
Vulnerable NodeJS Web Application
☆87Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for ninjasworkout
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 2 years ago
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆77Updated 4 years ago
- ☆51Updated 3 years ago
- The scripts I write to help me on my bug bounty hunting☆120Updated 2 years ago
- Simple fork from degoogle original project with bug hunting purposes☆85Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- Target practice for ffuf☆59Updated 3 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆130Updated 3 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆88Updated last year
- HTTP parameter discovery suite.☆60Updated 4 years ago
- AWS S3 open bucket poc automated script.☆55Updated 3 years ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆75Updated 2 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆80Updated last year
- SetMyKali is a bash based tool to configure and customize kali linux☆68Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆61Updated 4 years ago
- ☆163Updated 2 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago
- Advanced Reconnaissance and Web Application Discovery☆75Updated 2 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆50Updated 2 years ago
- Automated Web Recon Shell Scripts☆50Updated 2 years ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆102Updated 3 years ago
- XSS Bypass☆28Updated 9 months ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆102Updated 2 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆50Updated 3 years ago
- Prototype pollution scanner using headless chrome☆197Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago