3v4Si0N / RS256-2-HS256Links
JWT Attack to change the algorithm RS256 to HS256
☆34Updated 2 years ago
Alternatives and similar repositories for RS256-2-HS256
Users that are interested in RS256-2-HS256 are comparing it to the libraries listed below
Sorting:
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- XXE Injection Payloads☆28Updated 6 years ago
- BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.☆66Updated 8 months ago
- ☆27Updated 6 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Updated 5 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Updated 6 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 5 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86Updated 2 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Updated 4 years ago
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Updated 8 years ago
- ☆25Updated last year
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Some of my public exploits☆52Updated 5 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆48Updated 5 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated 2 years ago
- ☆103Updated 5 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Updated 2 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Updated 3 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆105Updated 2 years ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated last year
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Updated 6 years ago
- ☆32Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 4 years ago
- All the information provided on this site is for educational purposes only.☆18Updated last year
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- This is a writeup for CVE-2020-11107 reported by Maximilian Barz☆32Updated 5 years ago
- ☆51Updated 5 years ago