☆21Mar 11, 2026Updated 2 weeks ago
Alternatives and similar repositories for vuln_node_express
Users that are interested in vuln_node_express are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Oct 27, 2022Updated 3 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 8 months ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Mar 19, 2026Updated last week
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- ☆22Dec 23, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Crystal library for the Shodan API.☆10Dec 20, 2021Updated 4 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vul…☆51Mar 16, 2026Updated last week
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 12 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A random testing / fuzzer framework for Ruby.☆136Aug 2, 2019Updated 6 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Bash one-liners for great justice!☆12Feb 9, 2019Updated 7 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- experimental crate to generate the Chrome Devtools Protocol.☆21Dec 13, 2025Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- Ansible playbooks and more for setting up a server.☆15Jul 2, 2016Updated 9 years ago
- PoC of CVE-2022-22978 vulnerability in Spring Security framework☆12Jun 4, 2022Updated 3 years ago
- HVNC using virtual desktop☆10Dec 30, 2020Updated 5 years ago
- Carwhisperer modified for NetHunter☆12Jan 19, 2023Updated 3 years ago
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Jul 26, 2020Updated 5 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- ☆11Aug 31, 2021Updated 4 years ago
- #!/bin/bash ########## DEBUG Mode ########## if [ -z ${FLUX_DEBUG+x} ]; then FLUX_DEBUG=0 else FLUX_DEBUG=1 fi #####################…☆19Mar 25, 2018Updated 8 years ago
- ☆14Oct 17, 2021Updated 4 years ago
- A tool to evaluate Content Security Policies.☆71Jun 20, 2020Updated 5 years ago
- ☆17Feb 22, 2020Updated 6 years ago