Delightful Node.js packages useful for penetration testing, exploiting, reverse engineer, cryptography ...
☆425Jun 19, 2021Updated 4 years ago
Alternatives and similar repositories for awesome-nodejs-pentest
Users that are interested in awesome-nodejs-pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- More than 100 security checks for your Node.js API☆509Apr 23, 2024Updated 2 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 7 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆262Apr 7, 2023Updated 3 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- DirBuster for Node.js☆20Mar 21, 2019Updated 7 years ago
- nodejsscan is a static security code scanner for Node.js applications.☆2,558Oct 10, 2025Updated 6 months ago
- Hamburglar -- collect useful information from urls, directories, and files☆320Jan 3, 2026Updated 3 months ago
- A horizontal and vertical web content enumerator☆50Apr 7, 2026Updated 3 weeks ago
- Issues to consider when planning a red team exercise.☆611Aug 23, 2017Updated 8 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 7 years ago
- A collection of useful Serverless functions I use when pentesting☆390Dec 9, 2022Updated 3 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆103Dec 8, 2022Updated 3 years ago
- DNS Rebinding Exploitation Framework☆492Apr 27, 2021Updated 5 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Sample vulnerable code and its exploit code☆190Mar 14, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- Declarative penetration testing orchestration framework☆296Dec 20, 2019Updated 6 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆759Apr 12, 2022Updated 4 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆660Dec 17, 2021Updated 4 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆407Apr 22, 2026Updated last week
- A kinda reckless dns resolver. Still under development.☆16Mar 23, 2020Updated 6 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆149Feb 15, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Domain user enumeration tool☆217Nov 2, 2023Updated 2 years ago
- Gogs CVEs☆80Nov 30, 2019Updated 6 years ago
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications☆1,060Nov 26, 2023Updated 2 years ago
- DupeKeyInjector☆134Apr 16, 2022Updated 4 years ago
- Exploitation for XSS☆734Aug 5, 2021Updated 4 years ago
- The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Nod…☆2,034Jun 15, 2024Updated last year