effortlessdevsec / ninjasworkoutLinks
Vulnerable NodeJS Web Application
☆97Updated last year
Alternatives and similar repositories for ninjasworkout
Users that are interested in ninjasworkout are comparing it to the libraries listed below
Sorting:
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆78Updated 5 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 3 years ago
- R3C0Nizer is the first ever CLI based menu-driven web application B-Tier recon framework.☆154Updated 4 years ago
- ☆171Updated 3 years ago
- The scripts I write to help me on my bug bounty hunting☆124Updated 3 years ago
- Simple fork from degoogle original project with bug hunting purposes☆89Updated 3 years ago
- ☆157Updated 3 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- HTTP parameter discovery suite.☆63Updated 5 years ago
- ☆55Updated 4 years ago
- ☆71Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆131Updated 3 years ago
- Wicked sick v2.0 script is intended to automate your reconnaissance process in an organized fashion.☆150Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆105Updated 4 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 5 years ago
- Prototype pollution scanner using headless chrome☆219Updated 3 years ago
- XSS Bypass☆30Updated last year
- AWS S3 open bucket poc automated script.☆57Updated 4 years ago
- ☆76Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- Prototype Pollution Scanner☆127Updated 4 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- xss vulnerability scanner and input fuzzing tool.☆63Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Updated 2 years ago