A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection
☆71Apr 2, 2021Updated 4 years ago
Alternatives and similar repositories for nodejs-websocket-sqli
Users that are interested in nodejs-websocket-sqli are comparing it to the libraries listed below
Sorting:
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- 各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC ,该项目将持续更新☆13Apr 18, 2022Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆12Feb 10, 2013Updated 13 years ago
- ☆30Jul 29, 2021Updated 4 years ago
- Official repository of the Blackbuntu pentesting distribution☆12Feb 5, 2023Updated 3 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 6 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Aug 22, 2024Updated last year
- GKE CIS 1.1.0 Benchmark InSpec Profile☆25Sep 7, 2021Updated 4 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- ☆44Feb 6, 2025Updated last year
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 4 years ago
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.☆13Jan 5, 2022Updated 4 years ago
- Resolve bulk host file list to IP addresses, ASN, and validate DNS.☆39Apr 25, 2025Updated 10 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆148Dec 3, 2020Updated 5 years ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Nov 17, 2023Updated 2 years ago
- Java反序列化漏洞学习☆14Jul 1, 2021Updated 4 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Externalize Java application access to protected resources as log messages.☆43Jan 22, 2026Updated last month
- Slides, documentation, and files from my presentation at Red Team Village for HackerOne's hacktivitycon.☆36Sep 18, 2021Updated 4 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- Chosen-Prefix Collision Attack Against SHA-1 Hash Function☆17Feb 17, 2020Updated 6 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 8 months ago
- Metasploit Framework with Viproy installed.☆36Mar 15, 2017Updated 8 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- ☆102May 5, 2020Updated 5 years ago
- ☆17May 29, 2018Updated 7 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago