Modular command-line tool to parse, create and manipulate JWT tokens for hackers
☆104Mar 17, 2023Updated 3 years ago
Alternatives and similar repositories for jwtear
Users that are interested in jwtear are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated last month
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 3 weeks ago
- Amazon S3 bucket finder and crawler.☆155Dec 27, 2021Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- ☆16May 3, 2021Updated 4 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆59Dec 31, 2022Updated 3 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated this week
- List DTDs and generate XXE payloads using those local DTDs.☆651Feb 21, 2024Updated 2 years ago
- Super organized and flexible script for sending phishing campaigns☆56Nov 28, 2021Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆48Jan 11, 2023Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- Web app authorisation coverage scanning☆234Mar 6, 2023Updated 3 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- burpsuite 插件对GP所有参数(过滤特殊参数)一键自动添加xss sql payload 进行fuzz☆63Dec 4, 2018Updated 7 years ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 7 months ago
- ☆121Sep 13, 2023Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A python library to automate time-based blind SQL injection☆49Sep 15, 2019Updated 6 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 2 years ago
- Second-order subdomain takeover scanner☆403Aug 28, 2025Updated 6 months ago
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- Dumping LSASS with a duplicated handle from custom LSA plugin☆204Feb 23, 2022Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 7 months ago
- ☆17Aug 3, 2021Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆293Aug 23, 2019Updated 6 years ago