Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security testing.
☆25Mar 22, 2025Updated 11 months ago
Alternatives and similar repositories for Confusional
Users that are interested in Confusional are comparing it to the libraries listed below
Sorting:
- ☆20Sep 2, 2024Updated last year
- ☆37Jan 17, 2024Updated 2 years ago
- 😁 Easy Regex☆28Apr 9, 2023Updated 2 years ago
- ☆12Mar 13, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- ☆48Dec 5, 2025Updated 3 months ago
- WordTally is a Python script designed to analyze text files and provide word frequency statistics.☆15Jul 3, 2023Updated 2 years ago
- ☆11Apr 29, 2023Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- ☆26Nov 4, 2013Updated 12 years ago
- ☆23Feb 27, 2025Updated last year
- TLDFinder is a Python package that identifies valid top-level domains (TLDs) for a list of domains with wildcard characters in the TLD.☆24Jul 2, 2023Updated 2 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆44Jun 1, 2025Updated 9 months ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆20Dec 3, 2024Updated last year
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆19Nov 18, 2025Updated 4 months ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- ☆19Jan 13, 2025Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- ☆20Aug 23, 2025Updated 6 months ago
- An implementation of execve() in user space☆35Oct 25, 2024Updated last year
- Burp suite extension which help you to find inconsistency between content-type header and body parsers☆11Sep 14, 2025Updated 6 months ago
- 🔎 Dork Generator☆29Jun 11, 2023Updated 2 years ago
- ☆13Nov 3, 2023Updated 2 years ago
- Application to understand narrow recon☆20Feb 18, 2025Updated last year
- Writeup-app is a simple program for sending notifications of new bug bounty write-ups in Discord.☆11Sep 15, 2022Updated 3 years ago
- ☆88Sep 20, 2024Updated last year
- SubEX is a script to find subdomains of a domain using several methods☆26Nov 29, 2022Updated 3 years ago
- A runtime for developing large-scale and complex shellcode.☆22Mar 3, 2026Updated 2 weeks ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆37Oct 23, 2025Updated 4 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Sleep Obfuscation in Rust☆280Dec 1, 2025Updated 3 months ago
- A Bind9 server for pentesters to use for Out-of-Band vulnerabilities☆26Dec 23, 2023Updated 2 years ago
- ☆24Apr 28, 2024Updated last year
- ☆60Jun 2, 2025Updated 9 months ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 2 years ago
- URL Fuzzing Tool.☆28Apr 21, 2025Updated 11 months ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated 2 months ago