A vulnerable nodejs web app with expresss and MongoDB for final project of cyber security course
☆45Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for Vulnerable-nodejs
Users that are interested in Vulnerable-nodejs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project contains files for cyber security☆36Dec 17, 2018Updated 7 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Feb 21, 2022Updated 4 years ago
- A repository of wordlists for enumeration. Will be added to by my tools when they find interesting new entries☆23Jan 21, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆28Mar 8, 2023Updated 3 years ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- Multithread reverse shell listener☆26Feb 10, 2024Updated 2 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Exploring Pegasus Spyware: A Deep Dive☆10Nov 25, 2023Updated 2 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆19Mar 1, 2026Updated 3 weeks ago
- This repository contains projects and activities that have been completed within the CyberSecurity Bootcamp.☆16May 24, 2022Updated 3 years ago
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- A list of web application security☆15Dec 26, 2019Updated 6 years ago
- Random Exploits☆51Sep 12, 2023Updated 2 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- Chat.JS - Vulnerable NodeJS Web-App to practice NoSQLi and Deserialization exploitation☆31Mar 21, 2021Updated 5 years ago
- ☆39Oct 2, 2021Updated 4 years ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆127Aug 13, 2021Updated 4 years ago
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automate the build of a vulnerable AD environment.☆41Aug 19, 2022Updated 3 years ago
- Projects that show my knowledge and experience of Cyber Security.☆15Jan 27, 2022Updated 4 years ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 5 months ago
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- OSWE-cheat sheet module by module with updated syllabus☆12May 25, 2021Updated 4 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- TESTR - A Vulnerable Python Web-App to practice XSS and Command Injection☆42Oct 8, 2022Updated 3 years ago
- ☆35Aug 5, 2025Updated 7 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆170Feb 16, 2022Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆33Jan 19, 2026Updated 2 months ago
- PEN-300/OSEP Public resources for PEN-300 Training☆128Sep 2, 2021Updated 4 years ago
- Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showe…☆45Dec 29, 2019Updated 6 years ago
- Cybersecurity Internship Project☆115Jun 18, 2022Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago