Practice hacking JWT tokens
☆115Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for jwtdemo
Users that are interested in jwtdemo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable SAML infrastructure training applicaiton☆54Feb 2, 2023Updated 3 years ago
- A simple web app with a XXE vulnerability.☆232Nov 10, 2021Updated 4 years ago
- GraphQL security workshop labs☆118Jan 31, 2026Updated last month
- Simple websites vulnerable to Server Side Template Injections(SSTI)☆417Mar 16, 2023Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Jun 10, 2020Updated 5 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆346Nov 20, 2022Updated 3 years ago
- Lab for learning JWT.☆34Jan 19, 2023Updated 3 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- Security Testing Scripts for JWT☆328Mar 13, 2026Updated last week
- Directory transversal to remote code execution☆70Oct 15, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆34Jul 17, 2019Updated 6 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Hacking Facebook for fun and profit: It’s not that hard, apparently (exclusive)☆62Jul 2, 2019Updated 6 years ago
- ☆62Mar 25, 2020Updated 6 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- JWT fuzzer☆107Jul 24, 2018Updated 7 years ago
- NagaScan is a distributed passive scanner for Web application.☆92May 16, 2017Updated 8 years ago
- Remote Command Execution Over Spark☆97Feb 21, 2026Updated last month
- ☆25May 30, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆68Feb 3, 2020Updated 6 years ago
- A BurpSuite extension written by Python,used to find API interface in JS file.☆114Mar 13, 2023Updated 3 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- GitLab 11.4.7 SSRF配合redis远程执行代码☆120Apr 24, 2019Updated 6 years ago
- ☆18Sep 6, 2018Updated 7 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 7 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- HTTP file upload scanner for Burp Proxy☆491Dec 25, 2023Updated 2 years ago
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Sep 20, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- exploit Apache Flink Web Dashboard unauth rce on right way by python2 scripts☆90Nov 13, 2019Updated 6 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Java deserialization exploitation lab.☆237Mar 1, 2019Updated 7 years ago
- Simple HS256, HS384 & HS512 JWT token brute force cracker.☆1,166Jul 13, 2024Updated last year
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆47Feb 16, 2024Updated 2 years ago
- ☆15Aug 27, 2020Updated 5 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago