This project provides a CLI for offensive and defensive security assessments on the Joi validator library. The goal is to ensure that a given Joi validation schema can resist against known security attacks such as SQL injections, path traversal, and SSRF attempts. To get started, install the latest joi-security CLI tool using NPM: npm install -g joi-security. Create a sample JavaScript file containing the Joi schema for login validation and scan the file using the joi-security scan command. The joi-security CLI includes a wide range of attacks like XSS, SQL injections, NoSQL injections, RCE, LFI, Overflow, SSRF, suspicious IP addresses, homograph attacks on domains & email addresses.
FEATURES
ALTERNATIVES
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
Check if a domain is in the Alexa or Cisco top one million domain list.
A fuzzing framework for Android that creates corrupt media files to identify potential vulnerabilities
A tool for managing multiple reverse shell sessions/clients via terminal with a RESTful API.
Mortar is an evasion technique to defeat and divert detection and prevention of security products, including AV, EDR, and XDR solutions.
A visual guide illustrating attack paths and techniques for exploiting vulnerabilities in GitHub Actions configurations.
APT Simulator is a tool for simulating a compromised system on Windows.
A standard for conducting penetration tests, covering seven main sections from planning to reporting.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.