gluckzhang / ctf-jwt-tokenView external linksLinks
An example of a vulnerability in the early JWT token node.js library
☆37Apr 6, 2023Updated 2 years ago
Alternatives and similar repositories for ctf-jwt-token
Users that are interested in ctf-jwt-token are comparing it to the libraries listed below
Sorting:
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- A small pentesting lab for Azure☆11Apr 19, 2019Updated 6 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Python code examples for working with the Slack API. 2.x and 3.x compatible code.☆13May 19, 2016Updated 9 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Web CTF CheatSheet 🐈☆29Jul 24, 2021Updated 4 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- ☆13Feb 29, 2020Updated 5 years ago
- Small golang program for ssh brute force attacks☆11Jan 23, 2019Updated 7 years ago
- A simple vulnerable webapp created by PHP☆12Apr 18, 2025Updated 9 months ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- Learn what is NoSQL injection and how to find them ?☆10Jul 22, 2021Updated 4 years ago
- Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed☆14Oct 8, 2019Updated 6 years ago
- a brainfuck interpreter written in bash☆14Apr 22, 2016Updated 9 years ago
- Create subdomains and files wordlists from your browser history☆13Jan 10, 2023Updated 3 years ago
- Fetch & Filter Known URLs☆15Aug 3, 2022Updated 3 years ago
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Haxmas-2017 LD_PRELOAD rootkit in Golang☆19Dec 28, 2017Updated 8 years ago
- Terraform to build CTFd in AWS☆18Apr 25, 2025Updated 9 months ago
- ☆21Dec 15, 2020Updated 5 years ago
- Simple Keylogger with smtp to send emails on your account using python works on linux and Windows☆36Dec 3, 2019Updated 6 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- Windows Privilege Escalation☆22Jun 7, 2022Updated 3 years ago
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- ☆18Feb 16, 2021Updated 4 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆23Jan 1, 2025Updated last year
- sub domain wild card filtering tool☆40Apr 18, 2020Updated 5 years ago
- Firefox extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnera…☆60Oct 28, 2018Updated 7 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- This Repo Contain Summary of The eLearnSecurity Web Application Penetration Tester certification Content☆20Apr 9, 2022Updated 3 years ago