Brute forcing jwt tokens signed with HS256 since 2014
☆60Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for jwtbrute
Users that are interested in jwtbrute are comparing it to the libraries listed below
Sorting:
- Lab for learning JWT.☆34Jan 19, 2023Updated 3 years ago
- Python code for generating a signature for Json Web Tokens☆26Jun 24, 2020Updated 5 years ago
- ☆15Aug 27, 2020Updated 5 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Source for Pentester Land☆39Nov 3, 2022Updated 3 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 6 years ago
- Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.☆63Feb 26, 2019Updated 7 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆15Oct 16, 2024Updated last year
- ☆29Jan 15, 2017Updated 9 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- ☆13May 9, 2017Updated 8 years ago
- Android application penetration testing for the masses.☆13Apr 12, 2019Updated 6 years ago
- A Web-UI for subdomain enumeration (subfinder)☆56Jun 5, 2020Updated 5 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- dork scanner with Sqli and Lfi testing☆28Apr 29, 2018Updated 7 years ago
- Recon tool for pen-tester's☆21Sep 9, 2021Updated 4 years ago
- HTTP Protocol Stack CVE-2021-31166☆13Oct 17, 2024Updated last year
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- ☆21Dec 24, 2018Updated 7 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Jul 10, 2018Updated 7 years ago
- ☆122Mar 6, 2018Updated 7 years ago
- Mass Triage Tools☆20Dec 16, 2025Updated 2 months ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- ☆23Jan 9, 2019Updated 7 years ago
- Tool to automate recon☆42Dec 28, 2021Updated 4 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- Utilities for creating Burp Suite Extensions.☆21Oct 31, 2024Updated last year