Break and Elevation of Privilege the API v2 using JSON Web Token (JWT)
☆15Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for Bypass-JSON-Web-Token-JWT-
Users that are interested in Bypass-JSON-Web-Token-JWT- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Jun 2, 2016Updated 9 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- assets for www.hahwul.com☆24Updated this week
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 13 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Fraud prevention tool☆28Aug 9, 2020Updated 5 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 8 months ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 9 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- Ruby Bind and Reverse Shells I wrote using standard libs. Bind Shell includes authentication while reverse does not. Standard libs only s…☆12Aug 2, 2013Updated 12 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆12Aug 8, 2023Updated 2 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 10 years ago
- ☆54Feb 25, 2021Updated 5 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66May 16, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Twitter Futures for Python☆58Jun 22, 2014Updated 11 years ago
- Fast subdomain bruteforce enumerator in PHP 7.1☆34May 4, 2017Updated 9 years ago
- ☆11Mar 1, 2024Updated 2 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- ☆44Apr 20, 2020Updated 6 years ago
- Eva-Theme for NeoVim☆19Feb 9, 2026Updated 2 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Academy Spectral Similarity Index Calculator☆10Aug 7, 2024Updated last year
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Hardware random number generator for FPGAs☆10May 7, 2015Updated 10 years ago
- ☆12Jun 30, 2017Updated 8 years ago
- It uploads user photos without user permission to server☆15Oct 7, 2018Updated 7 years ago
- Just pick out the code we need.☆66Nov 22, 2019Updated 6 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 9 years ago