☆21Feb 12, 2026Updated 3 weeks ago
Alternatives and similar repositories for vuln_node_express
Users that are interested in vuln_node_express are comparing it to the libraries listed below
Sorting:
- ☆43Oct 27, 2022Updated 3 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated this week
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 7 months ago
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- Popcorn - the JSON fuzzer☆22Jul 27, 2014Updated 11 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vul…☆50Feb 19, 2026Updated 2 weeks ago
- ☆22Dec 23, 2021Updated 4 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated last year
- ☆24Feb 2, 2026Updated last month
- ☆20Nov 29, 2023Updated 2 years ago
- Source Code - https://github.com/USStateDept/State-TalentMAP☆13Sep 12, 2023Updated 2 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆48Updated this week
- Contract for a CryptoFiat currency☆11Aug 25, 2018Updated 7 years ago
- A way to use XInput to insert PIN for login, useful for handheld devices that does not have Fingerprint or face reco☆12Nov 3, 2024Updated last year
- The hacker technical cheat sheet☆45Feb 25, 2026Updated last week
- Terraform Code For Azure Kubernetes Service☆11Apr 27, 2023Updated 2 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- A Kubernetes pod monitor for safely terminating pods with persistent volumes in case of node failures☆12Feb 23, 2026Updated last week
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- ☆12Feb 16, 2017Updated 9 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- Efficiently manage and track your job application history☆13May 1, 2025Updated 10 months ago
- A stable Java API for interfacing with and extending OpenNMS☆14Jan 27, 2026Updated last month
- Competitive Coding Project☆40Oct 1, 2020Updated 5 years ago
- This script allows you to create a hidden admin account on your victim's PC.☆43Feb 8, 2025Updated last year
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- Linux Foundation Certified Engineer (LFCE) learning materials☆12Mar 6, 2022Updated 4 years ago
- Flask app for connecting Munki and MicroMDM☆13Jun 17, 2022Updated 3 years ago
- Custom Kdelive Effect Stacks for quick color correction and grading.☆14May 19, 2025Updated 9 months ago
- Deprecated - This project repo is no longer being maintained.☆14Mar 15, 2023Updated 2 years ago
- A copy of articles published at Peerlyst☆43Oct 30, 2016Updated 9 years ago
- Documentation website source code for Concord☆15Feb 10, 2026Updated 3 weeks ago
- Cloud Trust Protocol Server☆11Jan 5, 2016Updated 10 years ago
- Termux - a terminal emulator application for Android OS extendible by variety of packages.☆11Jan 8, 2023Updated 3 years ago
- Faraday's Command Line Interface☆52Feb 12, 2026Updated 3 weeks ago