Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.
☆35Sep 30, 2025Updated 5 months ago
Alternatives and similar repositories for Token-Tailor
Users that are interested in Token-Tailor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆322Nov 12, 2025Updated 4 months ago
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆53Jul 17, 2025Updated 8 months ago
- ☆48Apr 15, 2022Updated 3 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆25Sep 28, 2025Updated 5 months ago
- PathBuster - multiple hosts Web path scanner☆23Jun 3, 2024Updated last year
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- Browser-based iOS IPA security analyzer.☆57Jan 12, 2026Updated 2 months ago
- OWASP ASVS Security Evaluation Templates with Nuclei☆42Dec 2, 2025Updated 3 months ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- My personal collection of nuclei templates made for fuzzing.☆29Sep 6, 2024Updated last year
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- TapJacking Attacks Demo☆20Apr 25, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 9 months ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆49Dec 10, 2025Updated 3 months ago
- Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.☆21Sep 24, 2023Updated 2 years ago
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Dec 9, 2024Updated last year
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- WEB API fuzzing☆23Apr 30, 2025Updated 10 months ago
- API for Asset Service☆15Aug 15, 2024Updated last year
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 5 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆147Feb 21, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 📦 A GitHub Action that performs a security scan of your GitHub Actions.☆26Oct 28, 2024Updated last year
- High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential v…☆423Mar 18, 2026Updated last week
- Audio Transcription for WhatsApp☆15Jun 28, 2024Updated last year
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆62Jun 12, 2023Updated 2 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- A Burp Suite extension which performs checks for cross-domain scripting against the DOM, subresource integrity checks, and evaluates Java…☆26Mar 23, 2022Updated 4 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆32Mar 1, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 11 months ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 8 months ago