kongbytes / joi-security
Detect security flaws in Joi validation schemas (XSS, SQL injection, ...) 🔥
☆44Updated 7 months ago
Alternatives and similar repositories for joi-security:
Users that are interested in joi-security are comparing it to the libraries listed below
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆16Updated 5 months ago
- Burp Suite extension to log GraphQL operations as a comment☆23Updated 3 years ago
- Fast and passive subdomain enumeration.☆15Updated 2 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 3 years ago
- Visualize your project security vulnerabilities as a pie chart in the terminal☆25Updated 2 years ago
- Day to day relevant info about Operational Security for Nodejs projects☆8Updated 4 years ago
- All checklists☆26Updated 5 years ago
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆44Updated 2 years ago
- OSCP☆36Updated 3 years ago
- Collection of useful command line commands☆14Updated 3 years ago
- Simple website to guess API Key / OAuth Token☆48Updated 2 years ago
- This page should help you with the recon for security issues.☆21Updated 2 years ago
- Web application pentesting recon☆23Updated 4 years ago
- ☆10Updated 2 years ago
- ☆39Updated last year
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆23Updated 8 months ago
- 🧬 Extract and analyze contributors info from git repos☆76Updated last year
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆20Updated 9 months ago
- Site fast fuzzing with chorme extension.☆25Updated 2 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆27Updated 2 months ago
- Dependency Combobulator☆89Updated last year
- Easy discovery of assets☆12Updated 2 years ago
- Creating a Database for Mass Recon☆12Updated 3 years ago
- XSS Finder Via SSTI☆53Updated last year
- NearForm OWASP Top Ten Security Vulnerabilities Workshop☆43Updated this week
- ☆15Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated last year
- Inject JS to the DOM to find vulnerable JavaScript libraries☆10Updated 3 months ago