JWT Auditor – Analyze, break, and understand your tokens like a pro.
☆513Dec 20, 2025Updated 2 months ago
Alternatives and similar repositories for jwtauditor
Users that are interested in jwtauditor are comparing it to the libraries listed below
Sorting:
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Aug 25, 2025Updated 6 months ago
- Microsoft Network Service Fingerprinting Tool☆70Jan 2, 2026Updated 2 months ago
- AI-powered ffuf wrapper☆646Dec 4, 2025Updated 3 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- Autoswagger by Intruder - detect API auth weaknesses☆1,880Aug 8, 2025Updated 6 months ago
- Impacket☆49Feb 25, 2026Updated last week
- Cloud subdomains identification tool☆62Apr 15, 2025Updated 10 months ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆25Jan 31, 2026Updated last month
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆77Apr 6, 2025Updated 10 months ago
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆234Apr 5, 2025Updated 11 months ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆118Oct 9, 2025Updated 4 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆259Nov 3, 2025Updated 4 months ago
- Basic Psexec clone, but in golang.☆16Jul 2, 2022Updated 3 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Automate Recon XSS Bug Bounty☆178Updated this week
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆408Feb 7, 2026Updated 3 weeks ago
- Subdomain Enumerator and Simple Crawler☆348Feb 12, 2026Updated 2 weeks ago
- A passive way to find backups/ sensitive information.☆87Jul 10, 2025Updated 7 months ago
- Header Exploitation HTTP☆711Feb 24, 2026Updated last week
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated 11 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆110Aug 21, 2025Updated 6 months ago
- ☆29Feb 4, 2026Updated last month
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆132Sep 6, 2024Updated last year
- Browser-based iOS IPA security analyzer.☆49Jan 12, 2026Updated last month
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆383Nov 26, 2024Updated last year
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆182Dec 23, 2025Updated 2 months ago
- An Android app to easily manage Frida server on your device or emulator☆113Jan 3, 2026Updated 2 months ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- ☆15Jan 4, 2025Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆334Oct 25, 2025Updated 4 months ago
- A tool for inspecting and analyzing mobile application storage files.☆50May 15, 2025Updated 9 months ago
- ☆38Feb 9, 2025Updated last year
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Nov 21, 2024Updated last year
- ☆52Oct 1, 2025Updated 5 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆388Jan 20, 2026Updated last month