Example of a vulnerable NodeJS+Express+MySQL service
☆20Jan 17, 2023Updated 3 years ago
Alternatives and similar repositories for vulnerable-nodejs-express-mysql
Users that are interested in vulnerable-nodejs-express-mysql are comparing it to the libraries listed below
Sorting:
- Chrome extension to detect possible xsleaks☆12May 4, 2019Updated 6 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- ☆28Nov 18, 2021Updated 4 years ago
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 11 months ago
- Web 3.0 Security resources☆16Oct 12, 2023Updated 2 years ago
- ☆22Feb 12, 2022Updated 4 years ago
- ☆28Apr 21, 2021Updated 4 years ago
- Javascript file change monitoring☆17Mar 13, 2026Updated last week
- Scripts/tools to destroy things☆17Sep 13, 2021Updated 4 years ago
- Passively check for XSS character encodings☆18Mar 9, 2026Updated last week
- 一個Ubike站點搜尋telegram bot☆13Jul 21, 2023Updated 2 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- ☆54Aug 10, 2018Updated 7 years ago
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- A extension for collecting parameters☆25Oct 25, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆23Feb 21, 2025Updated last year
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆51Jul 22, 2023Updated 2 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- ☆16Apr 19, 2022Updated 3 years ago
- tetctf2020_amf_writeups☆23Jan 3, 2021Updated 5 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- ☆14Dec 3, 2020Updated 5 years ago
- Burp Bounty profiles☆80Jan 2, 2022Updated 4 years ago
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆92Aug 25, 2023Updated 2 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- A simple http server built with Rust☆11Feb 21, 2021Updated 5 years ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 2 months ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- ⚡️ Animated Twitter clone using Next.js, Firebase, Recoil, Framer Motion☆13Sep 26, 2021Updated 4 years ago
- LeakIX maintained plugins implementing the l9format golang plugin interface.☆12Dec 9, 2021Updated 4 years ago
- JAX-based Spiking Neural Network framework☆60Sep 2, 2021Updated 4 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆141Sep 16, 2024Updated last year