hakaioffsec / jwt-hunterLinks
Simple tool for exploiting JWT vulnerabilities
☆12Updated last month
Alternatives and similar repositories for jwt-hunter
Users that are interested in jwt-hunter are comparing it to the libraries listed below
Sorting:
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆13Updated 6 months ago
- ☆12Updated 2 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Updated 2 years ago
- burp extension for brazilian stuff☆28Updated 2 years ago
- BIOS Workshop 2023☆26Updated 2 years ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆25Updated 4 years ago
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆86Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆70Updated 2 years ago
- Some Useful Tricks for Pentest Android and iOS Apps☆158Updated 2 months ago
- A websocket-based reverse (javascript) shell for XSS attacks.☆30Updated 3 years ago
- Versão PT-BR do hacktricks.☆44Updated last year
- Tactical Race Exploitation & Concurrency Orchestrator☆24Updated 2 weeks ago
- ☆29Updated 10 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Updated 2 years ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- exploits for CVE-2024-20017☆140Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆19Updated last year
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆95Updated 2 weeks ago
- Easily gather all routes related to a NextJs application through parsing of _buildManifest.js☆69Updated 3 years ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆62Updated last year
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆126Updated last month
- A burp for intents wannabe☆78Updated last year
- Scripts to set up your own Android 📱 app hacking lab☆94Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆41Updated 2 years ago
- A tool to extract cookies and passwords from major web browsers, passively, with no process injection.☆53Updated 2 months ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Updated 3 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆81Updated last year