Python code for generating a signature for Json Web Tokens
☆26Jun 24, 2020Updated 5 years ago
Alternatives and similar repositories for Jwt-code
Users that are interested in Jwt-code are comparing it to the libraries listed below
Sorting:
- Lab for learning JWT.☆34Jan 19, 2023Updated 3 years ago
- ☆15Aug 27, 2020Updated 5 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- ☆22Aug 15, 2023Updated 2 years ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactions☆12Feb 8, 2023Updated 3 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Small script to check a list of domains against open redirect vulnerability☆29Jan 22, 2022Updated 4 years ago
- CDK project that leverages an OpenAPI definition to define, document and create an Amazon API Gateway deployment. At deploy time, a Cloud…☆11Dec 24, 2024Updated last year
- dotfiles☆11Feb 20, 2026Updated last week
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- This autocomplete gives suggestion based on the previous input as JIRA does.☆13Jan 7, 2023Updated 3 years ago
- Scripts to automate RECON process☆11Aug 31, 2025Updated 6 months ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- Limits asset outflows from contracts within customisable timeframes☆11May 7, 2022Updated 3 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- My attempts at making life with VMware that little bit easier.☆11Aug 7, 2023Updated 2 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Highly recommended dorks for bug bounty☆19Oct 17, 2021Updated 4 years ago
- Sample demo for creating an Azure File Share using AKS.☆12Jun 6, 2021Updated 4 years ago
- Okta IDX API consumption layer for Swift☆14Aug 15, 2025Updated 6 months ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 3 months ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- Hardhat made easy with a flexible CLI to help run test, deploy and more.☆10Apr 10, 2024Updated last year
- Solidity smart contract for atomic swaps.☆10Oct 31, 2022Updated 3 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- s3 brute force tool☆44May 7, 2021Updated 4 years ago
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- ☆15Oct 31, 2022Updated 3 years ago
- Skattered tools from Skatterbrainz☆14Jan 7, 2019Updated 7 years ago
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago
- Cloud Related Projects☆11Oct 8, 2024Updated last year
- A repository to hold my AWS Cloud Deployment Kit Demos 🎓☆11Apr 15, 2020Updated 5 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- A technical walkthrough for extracting authentication keys and either emulating or cloning MIFARE classic 1k cards.☆25Apr 29, 2025Updated 10 months ago
- Ansible replacement, written in pure Sh☆11Dec 2, 2023Updated 2 years ago