wahengchang / Nodejs Security Must Know
It is a note about security on nodejs
Stars: ✭ 38
Programming Languages
javascript
184084 projects - #8 most used programming language
Projects that are alternatives of or similar to Nodejs Security Must Know
Command Injection Payload List
🎯 Command Injection Payload List
Stars: ✭ 658 (+1631.58%)
Mutual labels: command, injection
NodeJS-Red-Team-Cheat-Sheet
NodeJS Red-Team Cheat Sheet
Stars: ✭ 121 (+218.42%)
Mutual labels: command, injection
Netbare
Net packets capture & injection library designed for Android
Stars: ✭ 716 (+1784.21%)
Mutual labels: injection
Koin
Koin - a pragmatic lightweight dependency injection framework for Kotlin
Stars: ✭ 7,142 (+18694.74%)
Mutual labels: injection
Executor
Watch for file changes and then execute command. Very nice for test driven development.
Stars: ✭ 14 (-63.16%)
Mutual labels: command
Pince
A reverse engineering tool that'll supply the place of Cheat Engine for linux
Stars: ✭ 987 (+2497.37%)
Mutual labels: injection
Aruba
Test command-line applications with Cucumber-Ruby, RSpec or Minitest. The most up to date documentation can be found on Cucumber.Pro (https://app.cucumber.pro/projects/aruba)
Stars: ✭ 900 (+2268.42%)
Mutual labels: command
Imagejs
Small tool to package javascript into a valid image file.
Stars: ✭ 828 (+2078.95%)
Mutual labels: injection
Sql Injection Payload List
🎯 SQL Injection Payload List
Stars: ✭ 716 (+1784.21%)
Mutual labels: injection
Cmd
The standard library flag package with its missing features
Stars: ✭ 32 (-15.79%)
Mutual labels: command
Wifi ducky
Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4
Stars: ✭ 991 (+2507.89%)
Mutual labels: injection
Nodejs security must know
This is a note about Node.js security, by reading the amazing book Securing Node Applications by @ChetanKarade, which explains couple of common vulnerabilities in very simple way, and provides relevant npm modules as solutions to protect Node.js Web Apps.
The rate of security incidents is on the rise, based on the analysis of 64,199 security incidents and 2,260 breaches in 2015, the Verizon Data Breach Investigations Report published that the top 10 vulnerabilities accounted for 85 percent of these successful exploits.
Content
- Command Injection : more
- Broken Authentication : more
- Cross-Site Scripting more
- Insecure Direct Object Referencesmore
Remark
- hijack
- exploit
- vulnerable
Reference:
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].