JWT key confusion attack, i.e. re-sigining RS256 to HS256
☆13May 4, 2022Updated 3 years ago
Alternatives and similar repositories for jwt_key_confusion
Users that are interested in jwt_key_confusion are comparing it to the libraries listed below
Sorting:
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- ☆12Aug 24, 2025Updated 6 months ago
- This Tool is for web penetration Testing.☆21Jan 10, 2021Updated 5 years ago
- IPA-SCOPE☆24Mar 3, 2023Updated 3 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 4 months ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 8 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- For accessing info of both public and private instagram accounts☆17Aug 29, 2022Updated 3 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- https://github.com/DarkSecDevelopers/HiddenEye.git☆14Apr 27, 2020Updated 5 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- A tool which can perform advance recon automatically. Sit back and enjoy this tool work for you and find target's subdomains automaticall…☆11Sep 17, 2021Updated 4 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 9 months ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- The most powerful and fastest DoS Attack Tool☆12Dec 8, 2022Updated 3 years ago
- cydia源☆10Mar 20, 2022Updated 3 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 4 months ago
- This tool is for pranking your friends😂. It will send messages to your friend on WhatsApp Web automatically at fixed interval (e.g. afte…☆11Apr 12, 2021Updated 4 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- ☆15Mar 17, 2022Updated 3 years ago
- ☆12Jul 13, 2020Updated 5 years ago
- Boilerplate for deploying glue python shell jobs through shell script. For developers, it will be useful as script can install external l…☆13Oct 29, 2019Updated 6 years ago
- Fast threaded padding oracle attack automation script for Python 3.☆38Nov 25, 2023Updated 2 years ago
- Home Assistant iCloud3 - Home Assistant Device Tracker Custom Component☆12Jan 28, 2019Updated 7 years ago
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15May 1, 2022Updated 3 years ago
- creating adminpannel for any website.☆13Jun 18, 2021Updated 4 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Find person in facebook with phone number☆11Apr 9, 2017Updated 8 years ago
- Fully functional Instagram clone built in flutter framework using Firebase realtime database and storage☆13Jan 9, 2023Updated 3 years ago
- Yet Another ASGI Toolkit☆10Jun 1, 2022Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- 📱ᴘʜᴏɴᴇ ɴᴜᴍʙᴇʀ ʟᴏᴏᴋᴜᴘ📱☆12Mar 22, 2024Updated last year