onsecru / jwt-hacking-challenges
APIs to practise diverse techniques to hack JWT Signatures
☆64Updated 2 years ago
Alternatives and similar repositories for jwt-hacking-challenges:
Users that are interested in jwt-hacking-challenges are comparing it to the libraries listed below
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated 11 months ago
- Fetch the details of assets hosted on AWS.☆86Updated last year
- GraphQL security workshop labs☆101Updated 6 months ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆79Updated last year
- part of my wordlist to bruteforce DNS to find subdoamains.☆62Updated 3 years ago
- A simple way of sending messages from the CLI output to your Slack with webhook.☆116Updated last year
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated last year
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆58Updated 2 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆63Updated last year
- xss development frameworks, with the goal of making payload writing easier.☆136Updated 5 months ago
- A very vulnerable implementation of a GraphQL API.☆57Updated 3 years ago
- Source for Pentester Land☆32Updated 2 years ago
- ☆56Updated this week
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆56Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- Script to test open Akamai ARL vulnerability.☆70Updated 3 years ago
- Easily schedule commands to run multiple times at set intervals (like a cronjob, but with one command)☆84Updated 3 years ago
- Summary of almost all paid bounty reports on H1☆39Updated 4 years ago
- Prototype pollution scanner using headless chrome☆198Updated 2 years ago
- A vulnerability fuzzing tool written in bash, it contains the most commonly used tools to perform vulnerability scan☆79Updated 3 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆130Updated 3 years ago
- ☆67Updated 3 years ago
- List all public repositories for (valid) GitHub usernames☆68Updated last year
- A crawler that tests HTML forms for reflection☆47Updated 2 years ago
- someone needs help☆64Updated 2 years ago
- HTTP verb tampering & methods enumeration☆54Updated 2 years ago
- Basic implementation of certstream to print new subdomains and domains☆37Updated 3 years ago