Modular command-line tool to parse, create and manipulate JWT tokens for hackers
☆104Mar 17, 2023Updated 2 years ago
Alternatives and similar repositories for jwtear
Users that are interested in jwtear are comparing it to the libraries listed below
Sorting:
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated last month
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆59Dec 31, 2022Updated 3 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- ☆16May 3, 2021Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- Web app authorisation coverage scanning☆236Mar 6, 2023Updated 2 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Feb 19, 2026Updated last week
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- Mobile Application Vulnerability Scanner☆26Feb 26, 2025Updated last year
- Super organized and flexible script for sending phishing campaigns☆56Nov 28, 2021Updated 4 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 6 months ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 5 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- ☆21Nov 13, 2019Updated 6 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆48Jan 11, 2023Updated 3 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Amazon S3 bucket finder and crawler.☆155Dec 27, 2021Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated 2 weeks ago
- ☆10Oct 30, 2019Updated 6 years ago
- Second-order subdomain takeover scanner☆405Aug 28, 2025Updated 6 months ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- Automatic tool for DNS rebinding-based SSRF attacks☆304Aug 21, 2020Updated 5 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆204Feb 23, 2022Updated 4 years ago
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 10 months ago