Stars
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Drop in a screenshot and convert it to clean code (HTML/Tailwind/React/Vue)
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Stable Diffusion web UI
The repository provides code for running inference with the SegmentAnything Model (SAM), links for downloading the trained model checkpoints, and example notebooks that show how to use the model.
The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A vulnerable Application in crystal
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.
nodejsscan is a static security code scanner for Node.js applications.
A native implementation of TLS in Javascript and tools to write crypto-based and network-heavy webapps
✅ The Node.js best practices list (July 2024)
ESLint rules for Node Security
DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:
Email tracker, read receipt and spy pixel blocker plugin for macOS Mail (10.11-13.x)
The API backend for the email tracking
Open and click tracking for html emails – hosted by any Express-based node.js app
Show Tracking Numbers from the Email Sensor for Home Assistant
A demo node.js app designed to run on Google App Engine
Gmail extension for blocking read receipts and other email tracking pixels.
A list of ReDoS vulnerabilities in npm modules found by the Software Lab at TU Darmstadt. For each vulnerability, there is a proof-of-concept exploit, showing how the slowdown may occur. The resour…