FlorianPicca / JWT-Key-RecoveryLinks
A tool that recovers the public key used to sign JWT tokens
☆126Updated 2 years ago
Alternatives and similar repositories for JWT-Key-Recovery
Users that are interested in JWT-Key-Recovery are comparing it to the libraries listed below
Sorting:
- PP-finder Help you find gadget for prototype pollution exploitation☆180Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆61Updated 4 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆94Updated 6 years ago
- A tool to inspect and attack version 1 GUIDs☆238Updated 3 years ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆66Updated 2 years ago
- Deriving RSA public keys from message-signature pairs☆354Updated last year
- This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) an…☆106Updated last week
- ☆118Updated last year
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated last year
- Some tips for Bug Bounty using LibreOffice☆51Updated 8 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆157Updated 11 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 9 months ago
- Blazing fast, advanced Padding Oracle exploit☆257Updated 2 months ago
- CVE-2022-39227 : Proof of Concept☆21Updated last year
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆145Updated 7 months ago
- Fast exfiltration of text using only CSS and Ligatures☆82Updated 2 months ago
- ☆88Updated last year
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆199Updated 5 months ago
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆251Updated last week
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆149Updated 11 months ago
- A complete table of results of types comparison in multiple languages☆35Updated 3 years ago
- Enumerate / Dump Docker Registry☆180Updated last year
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Updated 2 years ago
- Obtain GraphQL API schema despite disabled introspection!☆72Updated 4 years ago
- Root shell PoC for CVE-2021-3156☆70Updated 4 years ago
- HTTP redirection service designed to help bypass SSRF filters. Integrated with Burp Suite.☆52Updated 4 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆100Updated 3 months ago
- WebSocket REPL for pentesters☆226Updated last year
- Need any help bypassing CSP ?☆31Updated 4 years ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆217Updated 3 months ago