dr34mhacks / jwtauditorLinks
JWT Auditor – Analyze, break, and understand your tokens like a pro.
☆292Updated 2 months ago
Alternatives and similar repositories for jwtauditor
Users that are interested in jwtauditor are comparing it to the libraries listed below
Sorting:
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆374Updated 2 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆222Updated 6 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆103Updated 2 months ago
- Header Exploitation HTTP☆667Updated this week
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆455Updated last month
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆380Updated 5 months ago
- A fast WordPress plugin enumeration tool☆701Updated 2 months ago
- API Security Vulnerability Scanner designed to help you secure your APIs.☆212Updated last week
- ☆110Updated 2 weeks ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆65Updated 4 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆151Updated last month
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆236Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆148Updated 2 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆239Updated last week
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆435Updated 2 weeks ago
- Abuse trust-boundaries to bypass firewalls and network controls☆379Updated 3 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆263Updated this week
- Analyze Android native `.so` files☆85Updated 3 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆201Updated last month
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆164Updated last week
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆734Updated last week
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆262Updated 3 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆425Updated last week
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆82Updated 6 months ago
- ☆223Updated 3 weeks ago
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆132Updated 5 months ago
- An archive of 0day.today exploits☆294Updated 3 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 9 months ago
- ☆127Updated 4 months ago
- ☆82Updated last month