FlorianPicca / JWT-Key-Recovery
A tool that recovers the public key used to sign JWT tokens
☆106Updated last year
Related projects ⓘ
Alternatives and complementary repositories for JWT-Key-Recovery
- PP-finder Help you find gadget for prototype pollution exploitation☆138Updated 3 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆72Updated 5 years ago
- ☆87Updated 11 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆42Updated 2 months ago
- Need any help bypassing CSP ?☆24Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆78Updated 8 months ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆133Updated 2 months ago
- A tool to inspect and attack version 1 GUIDs☆206Updated 2 years ago
- ☆83Updated 4 months ago
- ☆157Updated this week
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆132Updated this week
- This tool allows to automatically test for Content Security Policy bypass payloads.☆38Updated 2 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆85Updated this week
- Searcher for cross-site leaks (XS-Leaks)☆81Updated last year
- Deriving RSA public keys from message-signature pairs☆268Updated 6 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆115Updated last week
- Header Exploitation HTTP☆142Updated this week
- Challenges I wrote for various CTF competitions☆39Updated 3 months ago
- CTF write-ups☆80Updated 2 months ago
- Root shell PoC for CVE-2021-3156☆62Updated 3 years ago
- A script to download all the challenges and files from the CTFd instance.☆47Updated 3 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆123Updated 5 months ago
- CVE-2022-39227 : Proof of Concept☆19Updated 7 months ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆112Updated 5 years ago
- DOM Clobbering Wiki, Browser Testing, and Payload Generation☆43Updated this week
- Aspx reverse shell☆93Updated 4 years ago
- ☆65Updated last month
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆36Updated last year
- ☆146Updated last year
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆100Updated 11 months ago