An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️
☆45Mar 24, 2025Updated 11 months ago
Alternatives and similar repositories for JWTXposer
Users that are interested in JWTXposer are comparing it to the libraries listed below
Sorting:
- ☆18Oct 8, 2024Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆110Aug 21, 2025Updated 6 months ago
- ☆36Mar 28, 2025Updated 11 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆42Apr 7, 2025Updated 11 months ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- Cloud subdomains identification tool☆62Apr 15, 2025Updated 10 months ago
- Privilege Escalation using Passwd - April Fools prank☆36Apr 3, 2025Updated 11 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- ☆47Mar 7, 2025Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- ☆12Feb 20, 2025Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 7 months ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆31Jul 10, 2025Updated 7 months ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- ☆33Apr 22, 2025Updated 10 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆77Apr 6, 2025Updated 11 months ago
- ☆94May 26, 2023Updated 2 years ago
- ☆32Apr 16, 2025Updated 10 months ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Automated tool for domains & Subdomains Gathering☆14Feb 26, 2026Updated last week
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆63Mar 2, 2025Updated last year
- ☆107Feb 12, 2025Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆20Apr 27, 2025Updated 10 months ago
- 修改Bug后的ParamSpider,方便各位师傅使用☆13Nov 13, 2024Updated last year