wspr-ncsu / mininodeLinks
Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.
☆21Updated 2 years ago
Alternatives and similar repositories for mininode
Users that are interested in mininode are comparing it to the libraries listed below
Sorting:
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Updated 7 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 6 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆22Updated 2 years ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆27Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆20Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- ☆24Updated last year
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- Security checks for your researches☆34Updated 4 years ago
- A productivity burp extension which reminds to take break while you are at work!☆17Updated 5 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 5 months ago
- ☆9Updated 4 years ago
- Insecure Deserialization, PDF and lab☆18Updated 5 years ago