Nodejs application intentionally vulnerable to SSRF
☆42May 12, 2023Updated 2 years ago
Alternatives and similar repositories for Nodejs-SSRF-App
Users that are interested in Nodejs-SSRF-App are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Everything you need to exploit overly permissive crossdomain.xml files☆86Nov 12, 2014Updated 11 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Jul 6, 2013Updated 12 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- A set of vulnerable PHP scripts used to test w3af's vulnerability detection features.☆28Apr 15, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- Traverse JS files for APIs/Endpoints☆15May 12, 2015Updated 10 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- This repo contains the files required to perform a CSRF attack using Flash and HTTP 307 redirections.☆78Feb 5, 2018Updated 8 years ago
- Web Application Security☆131Jan 6, 2026Updated 3 months ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- ☆56May 30, 2017Updated 8 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Mar 24, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- ☆30Sep 1, 2022Updated 3 years ago
- Go tool to perform DNS rebinding☆24Nov 1, 2018Updated 7 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- A lightweight packet capture application☆12Oct 16, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Use a specific markdown file to write proper formatted papers and articles.☆21Jan 29, 2012Updated 14 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Jul 29, 2019Updated 6 years ago
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆26Apr 14, 2018Updated 7 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- A docker example for privilege escalation☆25Jul 17, 2017Updated 8 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- RFD Checker - security CLI tool to test Reflected File Download issues☆64Feb 26, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A simple tool to decloak/expose the bucket name behind a domain.☆25Mar 20, 2026Updated 3 weeks ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ secur…☆34Mar 24, 2026Updated 2 weeks ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago