nccgroup / jwt-reauthLinks
☆106Updated 2 years ago
Alternatives and similar repositories for jwt-reauth
Users that are interested in jwt-reauth are comparing it to the libraries listed below
Sorting:
- Burp Extension to add additional functionality for pentesting websocket based applications☆98Updated 3 weeks ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆117Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆68Updated 3 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Updated 3 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆39Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆108Updated 2 years ago
- ☆56Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Upload files done during my research.☆165Updated 5 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- Fast website scraper and wordlist generator☆81Updated 4 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆79Updated last year
- ☆79Updated last year
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆60Updated 2 years ago
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆182Updated last year
- ☆66Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆39Updated 4 months ago