kongbytes / joi-securityLinks
Detect security flaws in Joi validation schemas (XSS, SQL injection, ...) π₯
β43Updated last year
Alternatives and similar repositories for joi-security
Users that are interested in joi-security are comparing it to the libraries listed below
Sorting:
- Find security vulnerabilities in open source npm packages while you codeβ211Updated 3 years ago
- APIs to practise diverse techniques to hack JWT Signaturesβ67Updated 3 years ago
- Android Pentest Setup Environmentβ30Updated 3 years ago
- A curated list of awesome GraphQL Security frameworks, libraries, software and resourcesβ348Updated last year
- Cybersecurity handbook by One Beyondβ115Updated 2 years ago
- All checklistsβ27Updated 6 years ago
- A very vulnerable implementation of a GraphQL API.β61Updated 4 years ago
- Simple website to guess API Key / OAuth Tokenβ48Updated 3 years ago
- An exotic service bruteforce tool.β13Updated 8 months ago
- Vulnerable NodeJS Web Applicationβ97Updated last year
- Mitigate security concerns of Dependency Confusion supply chain security risksβ51Updated 6 months ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.β27Updated 3 years ago
- A repository of JavaScript XSS attacks against client browsersβ100Updated 5 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challengesβ33Updated 3 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packagesβ50Updated 4 years ago
- Security checks for your researchesβ34Updated 5 years ago
- Prototype Pollution in JavaScriptβ75Updated 3 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tesβ¦β85Updated 3 years ago
- S3 bucket enumeratorβ30Updated 6 years ago
- Small python script to look for common vulnerabilities on SMTP server.β49Updated 2 years ago
- Target practice for ffufβ69Updated 4 years ago
- Red Team tools, infrastructure, and hardware weaponizedβ109Updated 2 weeks ago
- Fast and passive subdomain enumeration.β18Updated 3 years ago
- Yet another web recon toolβ61Updated 2 years ago
- β10Updated last month
- NearForm OWASP Top Ten Security Vulnerabilities Workshopβ43Updated last week
- Web application pentesting reconβ23Updated 5 years ago
- Relative Path Overwrite Vulnerability Scannerβ22Updated 3 years ago
- njsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.β421Updated last year
- Just another vulnerable web application.β36Updated last year