AdityaBhatt3010 / JavaScript-JWT-and-the-Key-That-Shouldnt-ExistLinks
How a leaked JWT secret inside a JavaScript file led to full admin access — and why most devs still don't see it coming.
☆12Updated 6 months ago
Alternatives and similar repositories for JavaScript-JWT-and-the-Key-That-Shouldnt-Exist
Users that are interested in JavaScript-JWT-and-the-Key-That-Shouldnt-Exist are comparing it to the libraries listed below
Sorting:
- SecureKeyGen: A robust cryptographic key generation tool leveraging hashing, PBKDF2, XOR, and multi-layered encryption for enhanced data …☆14Updated 11 months ago
- Automates discovery of leaked backup files via robots.txt, extracts hardcoded credentials from source code, and reveals sensitive info in…☆10Updated 7 months ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆13Updated 11 months ago
- A Java-based Hospital Management System implementing OOP concepts, AWT for GUI, multithreading, event handling, interfaces, abstract clas…☆14Updated 11 months ago
- Encryption Algorithm based on Bit Manipulation in Python3☆14Updated 2 years ago
- Wgel THM CTF Walkthrough☆13Updated last year
- This repository contains a collection of Bash and PowerShell scripts for automating AWS services, including AWS CLI setup, S3, EC2, and D…☆13Updated 10 months ago
- C++ project implementing a Doctor Management System with OOP, polymorphism, and templates.☆14Updated 11 months ago
- All in one cryptography solution☆14Updated 7 months ago
- Config files for my GitHub profile.☆23Updated last week
- Network, recon and offensive-security tool for Linux.☆12Updated 11 months ago
- VirusTotal API Key Leak Fix☆11Updated 10 months ago
- Web Forensics Documentation: A detailed guide covering methodologies, evidence collection, forensic processes, web protocols, and analysi…☆12Updated 10 months ago
- ai app key leak fix☆11Updated 10 months ago
- AutoGPT-Next-Web-1 API Keys Fix☆11Updated 11 months ago
- This API testing documentation demonstrates various test cases executed in Postman, covering authentication, data retrieval, order manage…☆11Updated 11 months ago
- Tarang: An immersive music streaming platform with the main aim of promoting rising independent artists and community relationships.☆14Updated last year
- Personal Jarvis Ai using just Python Fixation☆12Updated last year
- Light TryHackMe Capture The Flag Walkthrough☆11Updated 11 months ago
- Inspira ExchangeRate API Key Leak Fix☆11Updated 11 months ago
- Deploy and orchestrate AWS EC2 instances with ease, ensuring optimal performance and security via Terraform.☆13Updated 10 months ago
- Deploy and orchestrate AWS RDS instances with ease, ensuring optimal performance and security along with BackUp options via Terraform.☆13Updated 11 months ago
- Corrupt a File using Python 3☆14Updated 2 years ago
- 🔥 Aditya Bhatt Cybersecurity Portfolio | Ethical Hacker | VAPT Expert | Red Team Specialist☆15Updated 3 months ago
- This repository contains various scripts for the Digispark ATTiny85 USB Development Board. These scripts allow you to perform fun and use…☆12Updated 11 months ago
- Convert Image to Sketch with easily Python3☆14Updated 2 years ago
- Lie Detector is a Prank software which pretends as if the software has an AI which knows the answer to any secret while the actual answer…☆15Updated 2 years ago
- Hydra Password Cracking Cheetsheet☆14Updated 5 years ago
- An in-depth guide to understanding and writing efficient assembly code for cybersecurity, exploit development, and low-level programming.☆14Updated 10 months ago
- Universal Offline AI Chatbot is a lightweight, extensible local assistant that answers questions based on your own PDFs — legal, technica…☆14Updated 5 months ago