FlorianPicca / JWT-Key-Recovery
A tool that recovers the public key used to sign JWT tokens
☆115Updated 2 years ago
Alternatives and similar repositories for JWT-Key-Recovery
Users that are interested in JWT-Key-Recovery are comparing it to the libraries listed below
Sorting:
- PP-finder Help you find gadget for prototype pollution exploitation☆160Updated 9 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆53Updated 8 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆89Updated 6 years ago
- Deriving RSA public keys from message-signature pairs☆318Updated last year
- A python based minimal DNS server to test/verify DNS rebinding attacks☆47Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 3 months ago
- ☆109Updated last year
- A tool to inspect and attack version 1 GUIDs☆221Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 5 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆134Updated 5 months ago
- Need any help bypassing CSP ?☆27Updated 4 years ago
- Some tips for Bug Bounty using LibreOffice☆46Updated 2 months ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 8 months ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆187Updated 3 months ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆134Updated 3 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆89Updated this week
- A complete table of results of types comparison in multiple languages☆31Updated 2 years ago
- ☆85Updated 10 months ago
- CVE-2022-39227 : Proof of Concept☆21Updated last year
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆117Updated last month
- ☆83Updated last month
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆128Updated 5 years ago
- Official writeups for Hack The Boo CTF 2023☆44Updated 5 months ago
- ☆174Updated 3 years ago
- HTTP redirection service designed to help bypass SSRF filters. Integrated with Burp Suite.☆36Updated last month
- LFI to RCE via phpinfo() assistance or via controlled log file☆66Updated 2 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆57Updated 2 years ago
- ☆291Updated this week
- IIS shortname scanner written in Go☆332Updated 2 years ago