Example of a vulnerable NodeJS+Express+MySQL service
☆20Jan 17, 2023Updated 3 years ago
Alternatives and similar repositories for vulnerable-nodejs-express-mysql
Users that are interested in vulnerable-nodejs-express-mysql are comparing it to the libraries listed below
Sorting:
- Chrome extension to detect possible xsleaks☆12May 4, 2019Updated 6 years ago
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 10 months ago
- Web 3.0 Security resources☆16Oct 12, 2023Updated 2 years ago
- Javascript file change monitoring☆17Nov 11, 2025Updated 3 months ago
- Scripts/tools to destroy things☆17Sep 13, 2021Updated 4 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆15Feb 20, 2020Updated 6 years ago
- Passively check for XSS character encodings☆18Feb 7, 2026Updated 3 weeks ago
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- tetctf2020_amf_writeups☆23Jan 3, 2021Updated 5 years ago
- ☆22Feb 12, 2022Updated 4 years ago
- ☆28Nov 18, 2021Updated 4 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Jul 7, 2022Updated 3 years ago
- A extension for collecting parameters☆25Oct 25, 2020Updated 5 years ago
- GH-Takeover — GitHub Pages Sub-domain Takeover Automation!☆28Apr 17, 2021Updated 4 years ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆142Sep 16, 2024Updated last year
- Detectify Crowdsource Challenge☆72Apr 26, 2022Updated 3 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆92Aug 25, 2023Updated 2 years ago
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆10Feb 28, 2023Updated 3 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- 要是不做开源的话,我可能早就财务自由了吧?😅☆18Dec 20, 2021Updated 4 years ago
- This is a simple python based CLI project that can map symptoms like Aarogya Setu app. it's also generate report using matplot library an…☆10Dec 28, 2020Updated 5 years ago
- In this article we will be creating an application with spring mvc and angular js client. We will have a login page with form inputs for …☆11Jun 20, 2022Updated 3 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Burp Bounty profiles☆80Jan 2, 2022Updated 4 years ago
- ☆35Aug 2, 2022Updated 3 years ago
- List of Trusted Types bypasses☆102Apr 15, 2024Updated last year
- Learn how to automate XSS, SSRF, LFI, SQLI, NoSQLi☆44Jul 9, 2021Updated 4 years ago
- Recon-Ninja☆86Mar 24, 2024Updated last year
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago