kongbytes / joi-securityLinks
Detect security flaws in Joi validation schemas (XSS, SQL injection, ...) 🔥
☆44Updated last year
Alternatives and similar repositories for joi-security
Users that are interested in joi-security are comparing it to the libraries listed below
Sorting:
- APIs to practise diverse techniques to hack JWT Signatures☆67Updated 2 years ago
- Prototype Pollution in JavaScript☆74Updated 3 years ago
- All checklists☆27Updated 6 years ago
- Bruteforce a JWT against a list of passwords☆77Updated 8 years ago
- Cybersecurity handbook by One Beyond☆115Updated 2 years ago
- Vulnerable NodeJS Web Application☆97Updated last year
- A repository of JavaScript XSS attacks against client browsers☆99Updated 5 years ago
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 4 years ago
- A curated list of awesome GraphQL Security frameworks, libraries, software and resources☆338Updated last year
- ☆28Updated last year
- Find security vulnerabilities in open source npm packages while you code☆210Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆45Updated 3 years ago
- NearForm OWASP Top Ten Security Vulnerabilities Workshop☆43Updated this week
- Security checks for your researches☆34Updated 4 years ago
- Web application recon for bug bounty☆22Updated 5 years ago
- Relative Path Overwrite Vulnerability Scanner☆22Updated 3 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated 2 years ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆49Updated 2 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- FockCache - Minimalized Test Cache Poisoning☆110Updated 5 years ago
- Hands-on practical use of HTTP security headers as browser security controls to help secure web applications☆18Updated 2 years ago
- Target practice for ffuf☆67Updated 4 years ago
- OSCP☆37Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Pull secrets from an AWS environment☆70Updated 5 years ago
- It's a simple tool for test vulnerability shellshock☆118Updated 4 years ago
- Yet another web recon tool☆62Updated 2 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 3 years ago