OWASP ZAP addon for finding vulnerabilities in JWT Implementations
☆35Mar 3, 2025Updated last year
Alternatives and similar repositories for owasp-zap-jwt-addon
Users that are interested in owasp-zap-jwt-addon are comparing it to the libraries listed below
Sorting:
- OWASP ZAP add-on for finding vulnerabilities in File Upload functionality.☆23Aug 1, 2024Updated last year
- GoWC - Wildcard cleaner for MassDNS☆24Jun 10, 2022Updated 3 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- A fast web fuzzer in golang☆16Dec 2, 2020Updated 5 years ago
- A substitute repository put up on public demand for the original Awesome WAF repository (https://github.com/0xInfection/Awesome-WAF) whic…☆12May 3, 2019Updated 6 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- ☆11May 25, 2021Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- Inject different payloads in the log of your target☆18Apr 3, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆20Mar 15, 2021Updated 4 years ago
- VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vul…☆50Feb 19, 2026Updated 2 weeks ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 3 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 4 years ago
- The Last Web Recon Tool You'll Need☆17Nov 7, 2020Updated 5 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Springboot detection☆23Nov 8, 2021Updated 4 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Oct 19, 2023Updated 2 years ago
- Recon Custom WordList Ganerator☆58Jul 2, 2020Updated 5 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Aug 1, 2018Updated 7 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆56Nov 24, 2024Updated last year
- Sissy Life CYOA☆12Sep 4, 2015Updated 10 years ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactions☆12Feb 8, 2023Updated 3 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Nov 24, 2021Updated 4 years ago
- ☆30Dec 23, 2020Updated 5 years ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- The xAPI Learning Cohort is a free, vendor-neutral, 12-week learning-by-doing project-based team learning experience about the Experience…☆21Apr 27, 2022Updated 3 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- A commandline vulnerability reporter using WP-CLI and WPVulnDB☆31Sep 27, 2025Updated 5 months ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- This is base code of fastapi, mongodb and machine learning with poetry env☆13Nov 4, 2023Updated 2 years ago
- Library managment system in Java /MySQL☆12Jan 8, 2019Updated 7 years ago