A vulnerable nodejs web app with expresss and MongoDB for final project of cyber security course
☆45Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for Vulnerable-nodejs
Users that are interested in Vulnerable-nodejs are comparing it to the libraries listed below
Sorting:
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Mar 8, 2023Updated 3 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Multithread reverse shell listener☆26Feb 10, 2024Updated 2 years ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- My OSWE Pre-preperation (i.e. before acutally buying the course) phase plan and notes!☆85Jul 22, 2025Updated 7 months ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Feb 21, 2022Updated 4 years ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- ☆35Aug 5, 2025Updated 7 months ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆81Aug 20, 2023Updated 2 years ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆21Sep 28, 2024Updated last year
- Materials used in preperation for the BSCP certification from PortSwigger☆18Jan 28, 2022Updated 4 years ago
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- A repository of wordlists for enumeration. Will be added to by my tools when they find interesting new entries☆23Jan 21, 2021Updated 5 years ago
- Script to automate Linux live evidence collection☆28Aug 4, 2022Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆127Sep 2, 2021Updated 4 years ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆126Aug 13, 2021Updated 4 years ago
- A toolkit for your red team operations☆34Oct 24, 2021Updated 4 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- A simple authentication web page with face recognition and face verification.☆31Nov 6, 2024Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆79Dec 21, 2023Updated 2 years ago
- ☆12Sep 9, 2023Updated 2 years ago
- CPU-Z Exploit Proof of Concept☆32Feb 17, 2019Updated 7 years ago
- This repository contains 0 click exploits to some HackTheBox machines, I used it to study for OSWE☆41May 9, 2024Updated last year
- ☆10Updated this week
- For comparing different tunes differences from WinOLS!☆11Dec 8, 2020Updated 5 years ago
- Chat.JS - Vulnerable NodeJS Web-App to practice NoSQLi and Deserialization exploitation☆31Mar 21, 2021Updated 4 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 4 months ago
- ☆39Oct 2, 2021Updated 4 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Inject shellcode into a valid BMP/GIF image.☆34Sep 7, 2020Updated 5 years ago
- ☆37Aug 8, 2021Updated 4 years ago