kongbytes / joi-securityLinks
Detect security flaws in Joi validation schemas (XSS, SQL injection, ...) π₯
β44Updated 11 months ago
Alternatives and similar repositories for joi-security
Users that are interested in joi-security are comparing it to the libraries listed below
Sorting:
- An extensible, heuristic-based vulnerability scanning tool for installed npm packagesβ50Updated 3 years ago
- Collection of useful command line commandsβ14Updated 3 years ago
- All checklistsβ26Updated 6 years ago
- Fast and passive subdomain enumeration.β17Updated 3 years ago
- The DNS Hunt will make your life easier, and of course faster.β47Updated 4 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.β31Updated 6 months ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.β21Updated 9 months ago
- Mitigate security concerns of Dependency Confusion supply chain security risksβ47Updated 2 years ago
- Bypassing AWS WAF using a single ';'β40Updated 6 years ago
- Deploy multiple instances of Nessus in docker containers easilyβ20Updated 4 years ago
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.β15Updated 3 years ago
- Burp Suite extension to log GraphQL operations as a commentβ23Updated 3 years ago
- App for generating OTP tokens for 2FA protected accountsβ21Updated last week
- Web application recon for bug bountyβ22Updated 5 years ago
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Takeβ¦β12Updated 4 years ago
- Site fast fuzzing with chorme extension.β25Updated 3 years ago
- A script to check if a container environment is vulnerable to container escapes via CVE-2022-0492β9Updated 3 years ago
- Visualize your project security vulnerabilities as a pie chart in the terminalβ25Updated 2 years ago
- β39Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websitesβ¦β14Updated 3 years ago
- Information Repository on Various Methods of getting shell access into a Windows machineβ16Updated 5 years ago
- Blind SQL Injection (BSQLI) Data Exploration Toolβ18Updated 8 years ago
- A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in publicβ63Updated 3 years ago
- A pre-DDoS security assessment toolβ120Updated 3 years ago
- Research on abusing GitLab Runnersβ26Updated 4 years ago
- NearForm OWASP Top Ten Security Vulnerabilities Workshopβ43Updated this week
- β10Updated last week
- Simple python script to check against hypothetical JWT vulnerability.β51Updated 4 years ago
- Security cheat sheets for different language and platformsβ19Updated last year
- β15Updated last year