PortSwigger / jwt-editorLinks
A Burp Suite extension for creating and editing JSON Web Tokens. This tool supports signing and verification of JWS, encryption and decryption of JWE and automation of several well-known attacks against applications that consume JWT.
☆38Updated 4 months ago
Alternatives and similar repositories for jwt-editor
Users that are interested in jwt-editor are comparing it to the libraries listed below
Sorting:
- A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to e…☆92Updated 8 months ago
- CVE-2024-4367 & CVE-2024-34342 Proof of Concept☆171Updated last year
- Time Based SQL Injection in Zabbix Server Audit Log --> RCE☆124Updated last year
- ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具☆247Updated last year
- pdf svg xss payload☆98Updated last year
- ☆130Updated 3 years ago
- CVE-2023-25157 - GeoServer SQL Injection - PoC☆172Updated 2 years ago
- JWT-scanner Burp Extension☆53Updated 3 months ago
- Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset☆107Updated last year
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆181Updated 11 months ago
- CyberPanel 2.3.6 pre-auth RCE☆40Updated 10 months ago
- GoFOFA is a command-line tool for the FOFA API written in Golang.☆88Updated 3 months ago
- exploit for f5-big-ip RCE cve-2023-46747☆205Updated 10 months ago
- ☆89Updated last year
- All Nuclei Templates☆77Updated this week
- WebLogic vulnerability exploration from beginner to expert.☆158Updated 2 years ago
- pdf exploit 集成☆230Updated last year
- CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4☆150Updated last year
- Burp Suite Extension - Trigger actions and reshape HTTP request/response and WebSocket traffic using configurable rules☆104Updated 9 months ago
- Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.☆303Updated 2 years ago
- ☆71Updated 2 years ago
- ☆50Updated last month
- Burp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.☆205Updated last year
- PoC. Severity critical.☆70Updated last year
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆62Updated 6 months ago
- bounty collection☆38Updated last year
- Heavily obfuscated ASP web shell generation tool.☆170Updated last year
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆119Updated last year
- POC for CVE-2023-38646☆20Updated last year
- Burp Extension for a passive scanning JS files for endpoint links.☆55Updated 9 months ago