3v4Si0N / RS256-2-HS256View external linksLinks
JWT Attack to change the algorithm RS256 to HS256
☆34May 8, 2023Updated 2 years ago
Alternatives and similar repositories for RS256-2-HS256
Users that are interested in RS256-2-HS256 are comparing it to the libraries listed below
Sorting:
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- MailHunter is a tool to give you access to the exchange server mails.☆12Apr 16, 2021Updated 4 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Jun 14, 2019Updated 6 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 7 years ago
- Subdomain Scan With Ping Method.☆46Dec 12, 2020Updated 5 years ago
- Webshell, Virtual Private Server (VPS) and cPanel Database☆39Sep 2, 2022Updated 3 years ago
- Advanced web server fingerprinting☆22Sep 27, 2017Updated 8 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- WhatsApp forensics analysis and acquisition utility☆26Apr 2, 2013Updated 12 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 2 months ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 5 months ago
- Vulnerability scanner based on vulners.com audit API☆65Jul 25, 2018Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 3 months ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆23Jan 1, 2025Updated last year
- Obfuscates a Python Script and the accompanying Shellcode.☆57Dec 30, 2019Updated 6 years ago
- XSHOCK Shellshock Exploit☆89Dec 8, 2022Updated 3 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- The Watcher version 5.0☆19Nov 10, 2017Updated 8 years ago
- Web Application Vulnerability Scanner☆132Sep 25, 2020Updated 5 years ago