gluckzhang / ctf-jwt-tokenLinks
An example of a vulnerability in the early JWT token node.js library
☆37Updated 2 years ago
Alternatives and similar repositories for ctf-jwt-token
Users that are interested in ctf-jwt-token are comparing it to the libraries listed below
Sorting:
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Updated 6 years ago
- XXE Injection Payloads☆28Updated 6 years ago
- ☆72Updated 4 years ago
- Random Exploits☆50Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 11 months ago
- HTTP request smuggling tools☆18Updated 5 years ago
- PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509☆58Updated 5 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- ☆15Updated 4 years ago
- ☆76Updated 5 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 5 years ago
- A cheatsheet for exploiting server-side SVG rasterization.☆30Updated 3 years ago
- This is a simple CSRF Proof of Concept generator that supports multiple form encodings and methods☆34Updated 8 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- A python library to automate time-based blind SQL injection☆49Updated 6 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆33Updated 4 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- CVE, reports, research☆15Updated 4 years ago
- Offsec Pentest and Bug Bounty Notes☆25Updated 5 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- Insecure Deserialization, PDF and lab☆18Updated 6 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆29Updated 3 years ago
- HTTP requests of FrontPage expolit☆26Updated 12 years ago
- Pentest stuff☆48Updated 2 years ago