ojensen5115 / jwtcrackLinks
☆28Updated 9 years ago
Alternatives and similar repositories for jwtcrack
Users that are interested in jwtcrack are comparing it to the libraries listed below
Sorting:
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Updated 13 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- yet another dirbuster☆20Updated 4 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Updated 7 years ago
- Fast browser-based network discovery module☆115Updated 4 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 3 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆55Updated 3 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- Scripts that I've written that others may find useful☆14Updated 3 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Burp Suite extension to track vulnerability assessment progress☆59Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 7 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆49Updated 9 years ago