aurainfosec / jwt_key_confusionView external linksLinks
JWT key confusion attack, i.e. re-sigining RS256 to HS256
☆13May 4, 2022Updated 3 years ago
Alternatives and similar repositories for jwt_key_confusion
Users that are interested in jwt_key_confusion are comparing it to the libraries listed below
Sorting:
- ☆12Aug 24, 2025Updated 5 months ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- This Tool is for web penetration Testing.☆21Jan 10, 2021Updated 5 years ago
- IPA-SCOPE☆24Mar 3, 2023Updated 2 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 7 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- For accessing info of both public and private instagram accounts☆16Aug 29, 2022Updated 3 years ago
- Start here!☆11Feb 19, 2020Updated 5 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- The most powerful and fastest DoS Attack Tool☆12Dec 8, 2022Updated 3 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 8 months ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- This tool is for pranking your friends😂. It will send messages to your friend on WhatsApp Web automatically at fixed interval (e.g. afte…☆11Apr 12, 2021Updated 4 years ago
- ☆15Mar 17, 2022Updated 3 years ago
- ☆12Jul 13, 2020Updated 5 years ago
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- A tool which can perform advance recon automatically. Sit back and enjoy this tool work for you and find target's subdomains automaticall…☆11Sep 17, 2021Updated 4 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Boilerplate for deploying glue python shell jobs through shell script. For developers, it will be useful as script can install external l…☆13Oct 29, 2019Updated 6 years ago
- cydia源☆10Mar 20, 2022Updated 3 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- https://github.com/DarkSecDevelopers/HiddenEye.git☆14Apr 27, 2020Updated 5 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- Fast threaded padding oracle attack automation script for Python 3.☆38Nov 25, 2023Updated 2 years ago
- Instagram-Py Instagram-py performs slick brute force attack on Instagram without any type of password limiting and also resumes your atta…☆11Dec 4, 2021Updated 4 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- creating adminpannel for any website.☆13Jun 18, 2021Updated 4 years ago
- Brute force your iOS Restrictions Passcode from the key & salt☆14Aug 27, 2019Updated 6 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 4 years ago
- Like DLP☆11Jan 27, 2025Updated last year
- Find person in facebook with phone number☆11Apr 9, 2017Updated 8 years ago
- Fully functional Instagram clone built in flutter framework using Firebase realtime database and storage☆13Jan 9, 2023Updated 3 years ago
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15May 1, 2022Updated 3 years ago