Practice hacking JWT tokens
☆115Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for jwtdemo
Users that are interested in jwtdemo are comparing it to the libraries listed below
Sorting:
- Vulnerable SAML infrastructure training applicaiton☆54Feb 2, 2023Updated 3 years ago
- A simple web app with a XXE vulnerability.☆231Nov 10, 2021Updated 4 years ago
- Simple websites vulnerable to Server Side Template Injections(SSTI)☆417Mar 16, 2023Updated 2 years ago
- GraphQL security workshop labs☆117Jan 31, 2026Updated last month
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated last year
- Directory transversal to remote code execution☆70Oct 15, 2019Updated 6 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Jun 10, 2020Updated 5 years ago
- Security Testing Scripts for JWT☆328Jun 30, 2022Updated 3 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- ☆62Mar 25, 2020Updated 5 years ago
- Hacking Facebook for fun and profit: It’s not that hard, apparently (exclusive)☆62Jul 2, 2019Updated 6 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆346Nov 20, 2022Updated 3 years ago
- ☆18Sep 6, 2018Updated 7 years ago
- JWT fuzzer☆107Jul 24, 2018Updated 7 years ago
- NagaScan is a distributed passive scanner for Web application.☆92May 16, 2017Updated 8 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 6 years ago
- ☆25May 30, 2017Updated 8 years ago
- GitLab 11.4.7 SSRF配合redis远程执行代码☆120Apr 24, 2019Updated 6 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- ☆15Aug 27, 2020Updated 5 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆68Feb 3, 2020Updated 6 years ago
- HTTP file upload scanner for Burp Proxy☆491Dec 25, 2023Updated 2 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- Remote Command Execution Over Spark☆97Feb 21, 2026Updated last week
- exploit Apache Flink Web Dashboard unauth rce on right way by python2 scripts☆91Nov 13, 2019Updated 6 years ago
- Lab for learning JWT.☆34Jan 19, 2023Updated 3 years ago
- A BurpSuite extension written by Python,used to find API interface in JS file.☆114Mar 13, 2023Updated 2 years ago
- Collection of Bug Bounty Tips☆65Dec 10, 2019Updated 6 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Joomla 3.4.6 – Remote Code Execution☆109Jan 31, 2024Updated 2 years ago
- Shiro RCE (Padding Oracle Attack)☆148Nov 15, 2019Updated 6 years ago