jws2pubkey tool
☆44Jun 27, 2025Updated 9 months ago
Alternatives and similar repositories for jws2pubkey
Users that are interested in jws2pubkey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆38May 1, 2023Updated 2 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- Utility for creating ZipSlip archives☆89Feb 9, 2023Updated 3 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to inspect and attack version 1 GUIDs☆239Oct 13, 2022Updated 3 years ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated 3 weeks ago
- tetctf2020_amf_writeups☆23Jan 3, 2021Updated 5 years ago
- QL-Relax☆13Aug 12, 2025Updated 8 months ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite.☆11Aug 20, 2023Updated 2 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"☆210Mar 9, 2023Updated 3 years ago
- Rust语言安全相关分析☆23Jan 20, 2022Updated 4 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- A proposal to extend FedCM to allow RPs to accept "any" registered IdP☆18Mar 10, 2026Updated last month
- Exploitation toolkit for RichFaces☆106Nov 3, 2023Updated 2 years ago
- ☆34May 4, 2022Updated 3 years ago
- CVE-2024-4367 arbitrary js execution in pdf js☆57May 20, 2024Updated last year
- Bypass JVM Class ByteCode Verifier , 对抗反编译器☆116Sep 21, 2023Updated 2 years ago
- A malicious LDAP server for JNDI injection attacks☆76Nov 15, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11May 16, 2024Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆37Mar 4, 2025Updated last year
- Zero trust. Zero security. Total exposure. A deliberately vulnerable health tech platform with AI Chatbot for learning about application …☆44Mar 27, 2026Updated 2 weeks ago
- ☆24Jan 27, 2026Updated 2 months ago
- ☆49Mar 21, 2023Updated 3 years ago
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- ffmpeg exploitation tool☆28Aug 3, 2016Updated 9 years ago
- ☆30Jul 29, 2021Updated 4 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Mar 22, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- Best practices for OAuth in Browser-Based Apps☆41Jan 8, 2026Updated 3 months ago
- A C2 Framework developed as an FYP☆12Feb 15, 2026Updated 2 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 8 months ago