Modular command-line tool to parse, create and manipulate JWT tokens for hackers
☆104Mar 17, 2023Updated 3 years ago
Alternatives and similar repositories for jwtear
Users that are interested in jwtear are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated 2 months ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- Amazon S3 bucket finder and crawler.☆155Dec 27, 2021Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆106Feb 15, 2024Updated 2 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆16May 3, 2021Updated 4 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆59Dec 31, 2022Updated 3 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 5 months ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Mar 17, 2026Updated 3 weeks ago
- List DTDs and generate XXE payloads using those local DTDs.☆655Feb 21, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Super organized and flexible script for sending phishing campaigns☆56Nov 28, 2021Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆48Jan 11, 2023Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Web app authorisation coverage scanning☆234Mar 6, 2023Updated 3 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- burpsuite 插件对GP所有参数(过滤特殊参数)一键自动添加xss sql payload 进行fuzz☆63Dec 4, 2018Updated 7 years ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 7 months ago
- ☆121Sep 13, 2023Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A python library to automate time-based blind SQL injection☆50Sep 15, 2019Updated 6 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 2 years ago
- Second-order subdomain takeover scanner☆402Mar 29, 2026Updated 2 weeks ago
- A simple SSRF-testing sheriff written in Go☆337Oct 31, 2024Updated last year
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆206Feb 23, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆11Nov 8, 2021Updated 4 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆305Aug 21, 2020Updated 5 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago