Words list generator to crack security tokens
☆110May 20, 2020Updated 5 years ago
Alternatives and similar repositories for token-reverser
Users that are interested in token-reverser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Suite extension to track vulnerability assessment progress☆59Mar 7, 2020Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- ☆102May 5, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆92May 10, 2020Updated 5 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Everything you need about Burp Extension Generation☆157Jan 6, 2023Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆93Aug 27, 2019Updated 6 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,707Oct 26, 2024Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆77Dec 29, 2019Updated 6 years ago
- Scan Victim Backup Directories & Backup Files☆183Sep 25, 2023Updated 2 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated 2 weeks ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆303Feb 12, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Scripts to help with different ffuf tasks and workflows☆225Dec 24, 2023Updated 2 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆239Dec 5, 2021Updated 4 years ago
- ☆49Jul 14, 2020Updated 5 years ago
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 5 years ago
- A golang utility to spider through a website searching for additional links.☆343Nov 7, 2020Updated 5 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆623Aug 15, 2025Updated 7 months ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 7 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- You can read the writeup on this script here☆274Jul 12, 2020Updated 5 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆277Jan 28, 2025Updated last year
- Lesser Known Web Attack Lab☆330Feb 7, 2020Updated 6 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- A tool to automate the boring process of APK recon☆344Sep 30, 2022Updated 3 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆202Nov 8, 2020Updated 5 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆279Feb 11, 2021Updated 5 years ago