Lab for learning JWT.
☆34Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for jwt-lab
Users that are interested in jwt-lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python code for generating a signature for Json Web Tokens☆26Jun 24, 2020Updated 5 years ago
- ☆15Aug 27, 2020Updated 5 years ago
- Brute forcing jwt tokens signed with HS256 since 2014☆60Aug 6, 2018Updated 7 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Feb 12, 2022Updated 4 years ago
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆20Sep 7, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Practice hacking JWT tokens☆115Sep 8, 2022Updated 3 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- ☆23Mar 29, 2022Updated 4 years ago
- Bug Bounty Platforms☆26Oct 17, 2024Updated last year
- Ansible replacement, written in pure Sh☆11Dec 2, 2023Updated 2 years ago
- This autocomplete gives suggestion based on the previous input as JIRA does.☆13Jan 7, 2023Updated 3 years ago
- Vulnerable API☆423Mar 4, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- s3 brute force tool☆44May 7, 2021Updated 4 years ago
- ☆21Jan 17, 2026Updated 2 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- Springboot detection☆23Nov 8, 2021Updated 4 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- A Web-UI for subdomain enumeration (subfinder)☆55Jun 5, 2020Updated 5 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Jun 17, 2025Updated 9 months ago
- (⚠️DO NOT FORK⚠️) Integrate Magisk root and Google Apps (and more) into WSA☆11Jan 28, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆47Feb 16, 2024Updated 2 years ago
- ☆19Sep 1, 2022Updated 3 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆95Jun 5, 2021Updated 4 years ago
- ☆18Dec 15, 2020Updated 5 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- ☆29May 14, 2019Updated 6 years ago
- dork scanner with Sqli and Lfi testing☆27Apr 29, 2018Updated 7 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- APIs to practise diverse techniques to hack JWT Signatures☆67Dec 22, 2022Updated 3 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- $ curl -sL sub.sh | bash☆17Aug 7, 2023Updated 2 years ago
- Web Application recon automation☆125Dec 18, 2020Updated 5 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆28Jul 20, 2022Updated 3 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago