kongbytes / joi-securityLinks
Detect security flaws in Joi validation schemas (XSS, SQL injection, ...) 🔥
☆44Updated last year
Alternatives and similar repositories for joi-security
Users that are interested in joi-security are comparing it to the libraries listed below
Sorting:
- Vulnerable NodeJS Web Application☆97Updated last year
- Fast and passive subdomain enumeration.☆18Updated 3 years ago
- Find security vulnerabilities in open source npm packages while you code☆211Updated 3 years ago
- A curated list of awesome GraphQL Security frameworks, libraries, software and resources☆351Updated last year
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 4 years ago
- CLI component of OWASP PurpleTeam☆134Updated 2 years ago
- A repository of JavaScript XSS attacks against client browsers☆103Updated 5 years ago
- Cybersecurity handbook by One Beyond☆115Updated 2 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19Updated 2 years ago
- Security checks for your researches☆34Updated 5 years ago
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆45Updated 3 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Updated last year
- Dependency Combobulator☆95Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 3 years ago
- Pull secrets from an AWS environment☆67Updated 6 years ago
- Simple website to guess API Key / OAuth Token☆48Updated 3 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 5 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated 2 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 4 years ago
- APIs to practise diverse techniques to hack JWT Signatures☆67Updated 3 years ago
- Blind SQL Injection (BSQLI) Data Exploration Tool☆18Updated 8 years ago
- Security cheat sheets for different language and platforms☆18Updated 2 years ago
- Prototype Pollution in JavaScript☆75Updated 3 years ago
- Web application recon for bug bounty☆21Updated 5 years ago
- Bruteforce a JWT against a list of passwords☆81Updated 8 years ago
- Target practice for ffuf☆69Updated 4 years ago
- ☆39Updated 2 years ago
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago