dr34mhacks / jwtauditorLinks
JWT Auditor – Analyze, break, and understand your tokens like a pro.
☆256Updated 3 weeks ago
Alternatives and similar repositories for jwtauditor
Users that are interested in jwtauditor are comparing it to the libraries listed below
Sorting:
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆267Updated 2 months ago
- Header Exploitation HTTP☆631Updated last month
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆378Updated last month
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆377Updated 8 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆66Updated 3 weeks ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆234Updated this week
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆235Updated last year
- A fast WordPress plugin enumeration tool☆662Updated 2 weeks ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆61Updated 2 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆258Updated last month
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆92Updated last week
- ☆122Updated 2 months ago
- ☆189Updated 4 months ago
- SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.☆179Updated 5 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆101Updated this week
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆142Updated 4 months ago
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆131Updated 3 months ago
- A collection of config files for linux focusing on hackthebox theme☆50Updated 8 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆369Updated last month
- Search for all leaked keys/secrets using one regex! bugbounty☆136Updated 4 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆358Updated 3 months ago
- ☆87Updated 5 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆167Updated 3 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆114Updated 10 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆691Updated last month
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated 11 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆123Updated this week
- Subdomain Enumerator and Simple Crawler☆136Updated this week
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆322Updated 3 weeks ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆126Updated 6 months ago