FlorianPicca / JWT-Key-Recovery
A tool that recovers the public key used to sign JWT tokens
☆111Updated last year
Alternatives and similar repositories for JWT-Key-Recovery:
Users that are interested in JWT-Key-Recovery are comparing it to the libraries listed below
- PP-finder Help you find gadget for prototype pollution exploitation☆151Updated 6 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆82Updated 6 years ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆45Updated 5 months ago
- Need any help bypassing CSP ?☆25Updated 4 years ago
- Deriving RSA public keys from message-signature pairs☆297Updated 9 months ago
- A tool to inspect and attack version 1 GUIDs☆214Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆140Updated 3 months ago
- ☆83Updated 8 months ago
- ☆98Updated last year
- This tool allows to automatically test for Content Security Policy bypass payloads.☆40Updated 5 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆88Updated 3 weeks ago
- ☆170Updated 3 years ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆39Updated last year
- CTF write-ups☆82Updated 2 months ago
- ☆149Updated last year
- A collection of Server-Side Prototype Pollution gadgets and exploits☆166Updated 2 weeks ago
- CVE-2022-39227 : Proof of Concept☆20Updated 11 months ago
- A complete table of results of types comparison in multiple languages☆26Updated 2 years ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆128Updated 3 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆53Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆88Updated 3 months ago
- Official writeups for Hack The Boo CTF 2023☆43Updated 2 months ago
- Client Side Prototype Pollution Scanner☆514Updated 2 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆124Updated 5 years ago
- Some tips for Bug Bounty using LibreOffice☆40Updated 2 weeks ago
- A natural evolution of Burp Suite's Repeater tool☆194Updated last year
- Challenges I wrote for various CTF competitions☆40Updated 7 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆133Updated 2 months ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆93Updated 3 years ago