onsecru / jwt-hacking-challengesLinks
APIs to practise diverse techniques to hack JWT Signatures
☆67Updated 2 years ago
Alternatives and similar repositories for jwt-hacking-challenges
Users that are interested in jwt-hacking-challenges are comparing it to the libraries listed below
Sorting:
- GraphQL security workshop labs☆116Updated 2 weeks ago
- Fetch the details of assets hosted on AWS.☆88Updated 2 years ago
- Bruteforce a JWT against a list of passwords☆79Updated 8 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆174Updated 4 years ago
- Prototype pollution scanner using headless chrome☆219Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Bucky (An automatic S3 bucket discovery tool)☆198Updated 3 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 3 years ago
- GraphQL security testing tool☆126Updated 3 years ago
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Updated 2 years ago
- A combined wordlists for files and directory discovery☆126Updated 4 years ago
- A reverse whois tool based on Whoxy API.☆168Updated last year
- Prototype Pollution in JavaScript☆75Updated 3 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆98Updated 3 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆52Updated 4 years ago
- A blind XSS detection and XSS data capture framework☆174Updated 2 weeks ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆134Updated 2 years ago
- A simple way of sending messages from the CLI output to your Slack with webhook.☆116Updated 2 years ago
- Go scripts for checking API key / access token validity☆219Updated 4 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Updated 3 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆70Updated 4 years ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆105Updated 4 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Updated 2 years ago
- xss development frameworks, with the goal of making payload writing easier.☆153Updated last year
- Finds the End-Points in JavaScript files☆97Updated 4 years ago
- The Serverless Blind XSS App☆339Updated 7 months ago