Break and Elevation of Privilege the API v2 using JSON Web Token (JWT)
☆15Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for Bypass-JSON-Web-Token-JWT-
Users that are interested in Bypass-JSON-Web-Token-JWT- are comparing it to the libraries listed below
Sorting:
- ☆18Jun 21, 2019Updated 6 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Gathering Email Information Tool☆38Mar 1, 2017Updated 9 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Fraud prevention tool☆28Aug 9, 2020Updated 5 years ago
- assets for www.hahwul.com☆24Updated this week
- Fast subdomain bruteforce enumerator in PHP 7.1☆34May 4, 2017Updated 8 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 9 years ago
- Ultra-fast TCP port discovery engine with Nmap orchestration☆23Dec 8, 2025Updated 2 months ago
- A small project announcing details about satellites as they pass overhead☆10May 26, 2021Updated 4 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Hardware random number generator for FPGAs☆10May 7, 2015Updated 10 years ago
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- Advanced AI Jailbreak. Uses steganography and fernet encryption to pass data that is hidden in images to AI models undetected.☆11Jan 28, 2024Updated 2 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- Arctos Documentation and How-To Guides☆13Feb 21, 2026Updated 2 weeks ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- Interactive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illeg…☆10Sep 25, 2016Updated 9 years ago
- massively concurrent web scraping☆24Apr 19, 2009Updated 16 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- ☆13Jun 30, 2017Updated 8 years ago
- 🐬 A collection of awesome resources for the Flipper Zero device.☆10Nov 15, 2025Updated 3 months ago
- GC3355 chip data sheets☆33Nov 29, 2013Updated 12 years ago
- Extraction of TYPO3 CMS Extension-Scanner package as separate composer library☆11Feb 24, 2023Updated 3 years ago
- Quadruped Robot Dogs + ROS & Gelblasters == Dystopian Future "Fox" Hunt☆11Sep 28, 2023Updated 2 years ago
- Deploying of infrastructure and technologies for a SOC as a Service ( SOCasS)☆14Apr 10, 2020Updated 5 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- ☆14May 22, 2024Updated last year
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3☆12Jan 23, 2020Updated 6 years ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- Academy Spectral Similarity Index Calculator☆10Aug 7, 2024Updated last year
- Flipper RPC protobuf specification with screen color parameters and keyboard input request☆13Jan 11, 2025Updated last year
- github-trending-weekly☆11Sep 14, 2021Updated 4 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆12Dec 19, 2016Updated 9 years ago
- It uploads user photos without user permission to server☆15Oct 7, 2018Updated 7 years ago