onsecru / jwt-hacking-challengesLinks
APIs to practise diverse techniques to hack JWT Signatures
☆66Updated 2 years ago
Alternatives and similar repositories for jwt-hacking-challenges
Users that are interested in jwt-hacking-challenges are comparing it to the libraries listed below
Sorting:
- GraphQL security workshop labs☆113Updated last month
- Fetch the details of assets hosted on AWS.☆89Updated last year
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Bucky (An automatic S3 bucket discovery tool)☆197Updated 3 years ago
- xss development frameworks, with the goal of making payload writing easier.☆147Updated last year
- A reverse whois tool based on Whoxy API.☆166Updated last year
- Go scripts for checking API key / access token validity☆216Updated 4 years ago
- A simple way of sending messages from the CLI output to your Slack with webhook.☆116Updated last year
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆70Updated 4 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆175Updated 3 years ago
- GraphQL security testing tool☆124Updated 3 years ago
- Bruteforce a JWT against a list of passwords☆77Updated 7 years ago
- Prototype pollution scanner using headless chrome☆219Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆321Updated last year
- You can find hardcoded Api-Key,Secret,Token Etc..☆79Updated 3 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆80Updated 3 years ago
- someone needs help☆65Updated 3 years ago
- Turns any junk text into a usable wordlist for brute-forcing.☆221Updated last year
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆98Updated 3 years ago
- A combined wordlists for files and directory discovery☆125Updated 4 years ago
- Predict Mongo ObjectIds☆145Updated 7 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆131Updated 4 years ago
- All Things Bug Bounty☆115Updated 3 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago
- Guide to SSRF☆69Updated last year
- DNS and Target HTTP History Local Storage and Search☆64Updated 4 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆92Updated last month
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆158Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago