Lab for learning JWT.
☆34Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for jwt-lab
Users that are interested in jwt-lab are comparing it to the libraries listed below
Sorting:
- Python code for generating a signature for Json Web Tokens☆26Jun 24, 2020Updated 5 years ago
- ☆15Aug 27, 2020Updated 5 years ago
- Brute forcing jwt tokens signed with HS256 since 2014☆60Aug 6, 2018Updated 7 years ago
- dork scanner with Sqli and Lfi testing☆28Apr 29, 2018Updated 7 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Feb 12, 2022Updated 4 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆20Sep 7, 2022Updated 3 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- ☆23Jan 9, 2019Updated 7 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- Practice hacking JWT tokens☆115Sep 8, 2022Updated 3 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 2 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- s3 brute force tool☆44May 7, 2021Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆46Feb 16, 2024Updated 2 years ago
- Springboot detection☆23Nov 8, 2021Updated 4 years ago
- GoWC - Wildcard cleaner for MassDNS☆24Jun 10, 2022Updated 3 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Jun 17, 2025Updated 8 months ago
- A Web-UI for subdomain enumeration (subfinder)☆56Jun 5, 2020Updated 5 years ago
- ☆23Mar 29, 2022Updated 3 years ago
- ☆22Aug 15, 2023Updated 2 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated last year
- Vulnerable API☆418Mar 4, 2023Updated 3 years ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactions☆12Feb 8, 2023Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- Spring Boot Actuator (jolokia) XXE/RCE☆23Mar 10, 2019Updated 6 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- Burp Extension in Python hilighting DOM Sinks and Hosts using DOM XSS Wiki regex☆24Aug 28, 2013Updated 12 years ago
- ☆30Oct 21, 2021Updated 4 years ago
- Tool to extract & validate google fcm server keys from apks☆29Jan 20, 2021Updated 5 years ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆109Mar 1, 2022Updated 4 years ago
- Multifunctional open redirection vulnerability scanner.☆30May 6, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆28Jul 20, 2022Updated 3 years ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆29Dec 7, 2025Updated 2 months ago
- Check AWS S3 instances for read/write/delete access☆121Feb 8, 2022Updated 4 years ago
- ☆29May 14, 2019Updated 6 years ago