Vulnerable NodeJS Web Application
☆97Aug 22, 2024Updated last year
Alternatives and similar repositories for ninjasworkout
Users that are interested in ninjasworkout are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 4 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- ssb=simple subdomain bruteforcer☆20Mar 10, 2023Updated 3 years ago
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆81Oct 20, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Yet another PHP Obfuscator☆33Jan 28, 2026Updated 3 months ago
- Windows Hacking FrameWork using Reverse Shell☆110Feb 22, 2026Updated 2 months ago
- ☆148Dec 23, 2022Updated 3 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- stdin writes to slack☆13Feb 8, 2020Updated 6 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- ☆12May 16, 2020Updated 6 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 10 months ago
- ☆11Dec 25, 2020Updated 5 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Built on a lazy Sunday after seeing this tweet (https://twitter.com/intigriti/status/1272145863868104705?s=20) I present to you, Paramete…☆52Jun 14, 2020Updated 5 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Feb 14, 2022Updated 4 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability☆85Mar 16, 2024Updated 2 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆65Jan 24, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆45Jun 5, 2021Updated 4 years ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆291Nov 13, 2024Updated last year
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 3 years ago
- The Ultimate Recon Framework☆11Mar 11, 2026Updated 2 months ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Mar 21, 2026Updated last month
- Dependency Combobulator☆96Jan 10, 2024Updated 2 years ago
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆37Dec 15, 2025Updated 5 months ago
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- ☆23Nov 19, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool for testing subdomain takeover possibilities at a mass scale.☆50May 23, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 2 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Feb 9, 2022Updated 4 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- ☆563Mar 27, 2025Updated last year
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago