9 Repositories
JavaScript vulnerable Libraries
Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.
Invadium Invadium runs exploits against one or more target applications in an intuitive, reproducable, and well-defined manner. It focuses on bridging
This tool is studied to help ethical hackers to find vulnerable points in webpage's javascript
JavaScream This tool is studied to help ethical hackers to find vulnerable points in webpage's javascript. HOW TO INSTALL (FIREFOX) 1- clone the proje
This tool is studied to help ethical hackers to find vulnerable points in webpage's javascript
JavaScream This tool is studied to help ethical hackers to find vulnerable points in webpage's javascript. HOW TO INSTALL (FIREFOX) 1- clone the proje
AWSGoat : A Damn Vulnerable AWS Infrastructure
AWS GOAT Compromising an organization's cloud infrastructure is like sitting on a gold mine for attackers. And sometimes, a simple misconfiguration or
Intentionally Vulnerable Nodejs Application & APIs
ivna Intentionally Vulnerable Nodejs Application & APIs Vulnerable Task Manager Application & APIs build using Nodejs,mongoose. Background While learn
Scans your computer for node modules that are potentially vulnerable to supply chain attacks
Scans your computer for node modules that are potentially vulnerable to supply chain attacks. You still need to review the code of modules that are not vulnerable, but this helps.
Node.js Express + MySQL vulnerable boilerplate project
Node.js Express + MySQL vulnerable boilerplate project
Kustomizegoat - Vulnerable Kustomize Kubernetes templates for training and education
KustomizeGoat - Vulnerable by design Kustomize deployment Demonstrating secure a
A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection
NodeJS WebSocket SQLi vulnerable WebApp A one-day build of a vulnerable WebSocket app on NodeJS to practice boolean based SQLi over WebSocket. I made