jws2pubkey tool
☆43Jun 27, 2025Updated 8 months ago
Alternatives and similar repositories for jws2pubkey
Users that are interested in jws2pubkey are comparing it to the libraries listed below
Sorting:
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- A tool to inspect and attack version 1 GUIDs☆239Oct 13, 2022Updated 3 years ago
- A malicious LDAP server for JNDI injection attacks☆76Nov 15, 2024Updated last year
- The Outlook HTML Leak Test Project☆41May 12, 2018Updated 7 years ago
- ☆49Mar 21, 2023Updated 2 years ago
- CVE-2024-4367 arbitrary js execution in pdf js☆57May 20, 2024Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Nov 15, 2019Updated 6 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Mar 22, 2022Updated 3 years ago
- Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"☆210Mar 9, 2023Updated 2 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- Exploitation toolkit for RichFaces☆106Nov 3, 2023Updated 2 years ago
- ☆30Jul 29, 2021Updated 4 years ago
- Bypass JVM Class ByteCode Verifier , 对抗反编译器☆116Sep 21, 2023Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆36Mar 4, 2025Updated last year
- ☆34May 4, 2022Updated 3 years ago
- ffmpeg exploitation tool☆27Aug 3, 2016Updated 9 years ago
- Launch your SOC as fast as a rocket with only one command☆12Feb 17, 2025Updated last year
- Dusseldorf is an out-of-band security tool to help in security research.☆50Updated this week
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities (aka Zip Slip)☆31May 31, 2019Updated 6 years ago
- ☆41Mar 12, 2025Updated 11 months ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- A simple Google Protobuf Decoder for Burp☆43Nov 22, 2022Updated 3 years ago
- ☆40Aug 2, 2024Updated last year
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Oct 4, 2025Updated 5 months ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via craft…☆79Jun 11, 2024Updated last year
- ☆43Nov 15, 2025Updated 3 months ago
- Deriving RSA public keys from message-signature pairs☆377Jan 30, 2026Updated last month
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago