cyberblackhole / TokenBreakerLinks
JSON RSA to HMAC and None Algorithm Vulnerability POC
☆61Updated 5 years ago
Alternatives and similar repositories for TokenBreaker
Users that are interested in TokenBreaker are comparing it to the libraries listed below
Sorting:
- HTTP parameter discovery suite.☆63Updated 5 years ago
- BurpSuite using the document and some extensions☆69Updated 4 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆96Updated 2 years ago
- ☆71Updated 4 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- HTTP verb tampering & methods enumeration☆59Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago
- Payloads to be used with Burp Suite Intruder. (Originally found on swisskeyrepo-PayloadsAllTheThings)☆81Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆27Updated 4 years ago
- XSS Payload without Anything.☆105Updated 5 years ago
- s3 brute force tool☆44Updated 4 years ago
- Detectify Crowdsource Challenge☆69Updated 3 years ago
- ASN reconnaissance script☆127Updated last year
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 4 years ago
- A reverse whois tool based on Whoxy API.☆166Updated last year
- ☆42Updated last year
- A Burp Suite extension to add a custom header (e.g. JWT)☆19Updated 4 years ago
- ☆67Updated 2 years ago
- Prototype pollution scanner using headless chrome☆218Updated 2 years ago
- A python based blind SQL injection exploitation script☆136Updated 5 years ago
- ☆76Updated 4 years ago
- Target practice for ffuf☆66Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 6 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆40Updated 4 years ago
- ☆152Updated last year
- API Pentesting notes.☆97Updated 7 months ago