A tool that recovers the public key used to sign JWT tokens
☆131May 16, 2023Updated 2 years ago
Alternatives and similar repositories for JWT-Key-Recovery
Users that are interested in JWT-Key-Recovery are comparing it to the libraries listed below
Sorting:
- ☆10Jan 8, 2023Updated 3 years ago
- Cracking V8 Math.random() from arbitrary bit leaks☆35Updated this week
- ☆40Sep 21, 2025Updated 6 months ago
- Deriving RSA public keys from message-signature pairs☆378Jan 30, 2026Updated last month
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last month
- Pwning Sudo Rules☆29Mar 3, 2022Updated 4 years ago
- 🎉 CVE Monitor v1.0☆26Jun 30, 2025Updated 8 months ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆112Jun 23, 2025Updated 8 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆53Sep 23, 2022Updated 3 years ago
- Gopher Tomcat Deployer☆48Nov 12, 2018Updated 7 years ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- ☆11May 28, 2020Updated 5 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Jul 14, 2024Updated last year
- PWNable pyjail☆13Jan 13, 2025Updated last year
- ☆10Nov 21, 2024Updated last year
- ☆67Nov 10, 2025Updated 4 months ago
- ☆75Feb 11, 2024Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆168Nov 18, 2024Updated last year
- Searcher for cross-site leaks (XS-Leaks)☆81Dec 27, 2022Updated 3 years ago
- Attack-defense CTF training organized by dtl on 23 Jul, 2023☆12Jul 24, 2023Updated 2 years ago
- grapX will iterate through the URLs and grep the endpoints with all possible extensions.☆56Mar 23, 2021Updated 4 years ago
- Uni Work - labs, exams, homework.☆13Mar 18, 2021Updated 5 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆534Dec 4, 2024Updated last year
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- Dynamically deploy containers for CTF challenges.☆22Nov 29, 2025Updated 3 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 9 months ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆20Jul 16, 2021Updated 4 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆29Nov 20, 2021Updated 4 years ago
- Source code and writeups for CSCTF'24!☆19Sep 15, 2024Updated last year
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆111Jul 22, 2025Updated 8 months ago
- Allows you to use randomly assigned hostports in Kubernetes pods☆16Aug 10, 2020Updated 5 years ago
- ☆54Nov 3, 2025Updated 4 months ago
- ☆32Jun 13, 2023Updated 2 years ago
- ☆17Aug 29, 2022Updated 3 years ago
- Some tips for Bug Bounty using LibreOffice☆57Feb 28, 2025Updated last year
- World CIDR IP lists☆10Jan 28, 2026Updated last month
- My CTF Challenges☆22Oct 10, 2023Updated 2 years ago