Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/
☆15Aug 4, 2018Updated 7 years ago
Alternatives and similar repositories for json_web_tokens
Users that are interested in json_web_tokens are comparing it to the libraries listed below
Sorting:
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- AV/EDR evasion via direct system calls.☆33Dec 7, 2020Updated 5 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- ☆39Apr 23, 2024Updated last year
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Nov 23, 2021Updated 4 years ago
- Learning Process Injection and Hollowing techniques☆42Jun 26, 2022Updated 3 years ago
- Dranzer is a tool that enables users to examine effective techniques for fuzz testing ActiveX controls☆35Jun 1, 2015Updated 10 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- The official Bento distribution - orchestration and deployment infrastructure for the Bento platform.☆11Feb 20, 2026Updated last week
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- ☆12May 2, 2017Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)☆10Mar 19, 2020Updated 5 years ago
- 🔐 HIROO is an FUD Remote Administration Tool (RAT) Generator☆16Aug 14, 2019Updated 6 years ago
- Minimalistic libvte based terminal.☆14Feb 16, 2026Updated last week
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Kubernetes Fundamentals Book☆14Feb 5, 2019Updated 7 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago