FlorianPicca / JWT-Key-RecoveryLinks
A tool that recovers the public key used to sign JWT tokens
☆118Updated 2 years ago
Alternatives and similar repositories for JWT-Key-Recovery
Users that are interested in JWT-Key-Recovery are comparing it to the libraries listed below
Sorting:
- PP-finder Help you find gadget for prototype pollution exploitation☆164Updated 10 months ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆48Updated 2 years ago
- Deriving RSA public keys from message-signature pairs☆323Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆54Updated 9 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆90Updated 6 years ago
- A tool to inspect and attack version 1 GUIDs☆225Updated 2 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆141Updated 6 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆100Updated 4 months ago
- Some tips for Bug Bounty using LibreOffice☆46Updated 4 months ago
- ☆26Updated last month
- A collection of Server-Side Prototype Pollution gadgets and exploits☆190Updated 4 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆124Updated 2 months ago
- ☆81Updated 8 months ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- ☆111Updated last year
- ☆85Updated last year
- ☆152Updated last year
- GQLSpection - parses GraphQL introspection schema and generates possible queries☆89Updated 3 months ago
- CTF write-ups☆86Updated 6 months ago
- Need any help bypassing CSP ?☆29Updated 4 years ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆89Updated last month
- ☆178Updated last week
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆181Updated last month
- LFI to RCE via phpinfo() assistance or via controlled log file☆68Updated 2 years ago
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆236Updated last week
- ☆306Updated last week
- Obtain GraphQL API schema despite disabled introspection!☆68Updated 4 years ago
- Challenges I wrote for various CTF competitions☆43Updated 11 months ago
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆193Updated 10 months ago
- jxscout superpowers JavaScript analysis for security researchers☆177Updated 3 weeks ago