ojensen5115 / jwtcrackView external linksLinks
☆28Jun 10, 2016Updated 9 years ago
Alternatives and similar repositories for jwtcrack
Users that are interested in jwtcrack are comparing it to the libraries listed below
Sorting:
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 7 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Scripts for ElasticSearch vulns☆13Oct 17, 2015Updated 10 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆12Aug 2, 2020Updated 5 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploi…☆17Dec 8, 2015Updated 10 years ago
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Jul 20, 2025Updated 6 months ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆48Sep 4, 2016Updated 9 years ago
- Detect and remove the presence of canary tokens☆25Dec 9, 2023Updated 2 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- ☆85Dec 6, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A tool for automatic black-box detection of missing hostname verification, including for applications that use certificate pinning.☆19Feb 13, 2019Updated 7 years ago
- A honeypot proxy for mongodb. When run, this will proxy and log all traffic to a dummy mongodb server.☆93Feb 20, 2023Updated 2 years ago
- A generated corpus, seed, and target for a fuzz job☆60Mar 13, 2016Updated 9 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Jan 24, 2019Updated 7 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- A docker example for privilege escalation☆25Jul 17, 2017Updated 8 years ago
- This repository for training application security.☆26Aug 9, 2019Updated 6 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- ☆26Jun 19, 2022Updated 3 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆97Aug 23, 2018Updated 7 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- ☆28Apr 22, 2025Updated 9 months ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Dec 8, 2021Updated 4 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Apr 10, 2022Updated 3 years ago