rishuranjanofficial / JWTweakLinks
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
☆99Updated last week
Alternatives and similar repositories for JWTweak
Users that are interested in JWTweak are comparing it to the libraries listed below
Sorting:
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆103Updated 4 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆109Updated 3 years ago
- Burp Bounty profiles☆83Updated 3 years ago
- Push notifications for passive DNS data☆109Updated 9 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆93Updated 2 months ago
- ☆32Updated 4 years ago
- ☆76Updated 4 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆67Updated 3 years ago
- HTTP parameter discovery suite.☆94Updated 5 years ago
- subdomain bruteforce list☆101Updated 8 months ago
- ☆60Updated 11 months ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago
- A collection of scripts to extend Burp Suite☆142Updated 6 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆76Updated 5 years ago
- A combined wordlists for files and directory discovery☆125Updated 4 years ago
- All known and unknown public POC's for wordpress themes and plugins☆78Updated 4 years ago
- Generate wordlists for fuzzing API method names☆54Updated 4 years ago
- A Python script to parse net blocks & domain names from SPF record☆84Updated 5 years ago
- A collection of simple tools and poc-builders☆39Updated 2 months ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86Updated 2 years ago
- Get all possible href | src | url from target url or domain☆41Updated 4 years ago
- A tool to find sensitive keys and passwords in Travis logs☆142Updated 4 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 4 years ago
- Extract relative urls from a heap snapshot☆87Updated 4 years ago
- SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibil…☆155Updated 4 years ago
- Generates target specific word lists for Fuzzing with fuff☆111Updated 4 years ago
- Authenticated SSRF in Grafana☆82Updated last year
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago