☆28Jun 10, 2016Updated 9 years ago
Alternatives and similar repositories for jwtcrack
Users that are interested in jwtcrack are comparing it to the libraries listed below
Sorting:
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Scripts for ElasticSearch vulns☆13Oct 17, 2015Updated 10 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆12Aug 2, 2020Updated 5 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Jul 20, 2025Updated 7 months ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆48Sep 4, 2016Updated 9 years ago
- Detect and remove the presence of canary tokens☆25Dec 9, 2023Updated 2 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆21Aug 6, 2017Updated 8 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- ☆85Dec 6, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆112Sep 8, 2024Updated last year
- Vulnerabilities which found in Oracle products☆33Apr 17, 2019Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- A tool for automatic black-box detection of missing hostname verification, including for applications that use certificate pinning.☆19Feb 13, 2019Updated 7 years ago
- A honeypot proxy for mongodb. When run, this will proxy and log all traffic to a dummy mongodb server.☆93Feb 20, 2023Updated 3 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- A generated corpus, seed, and target for a fuzz job☆60Mar 13, 2016Updated 9 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- This repository for training application security.☆26Aug 9, 2019Updated 6 years ago