rishuranjanofficial / JWTweak
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
☆99Updated last year
Alternatives and similar repositories for JWTweak:
Users that are interested in JWTweak are comparing it to the libraries listed below
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆103Updated 4 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆109Updated 3 years ago
- Generates target specific word lists for Fuzzing with fuff☆110Updated 4 years ago
- ☆30Updated 4 years ago
- Burp Bounty profiles☆82Updated 3 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- ☆145Updated 2 years ago
- Horizontal Domain Discovery☆76Updated last year
- All known and unknown public POC's for wordpress themes and plugins☆78Updated 3 years ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆90Updated 5 years ago
- Extract relative urls from a heap snapshot☆87Updated 3 years ago
- SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibil…☆155Updated 4 years ago
- Get the scope of your bugcrowd programs☆67Updated 4 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆72Updated 3 years ago
- Webapp to search tips on Twitter through #bugbountytips☆71Updated 2 years ago
- jsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints.☆152Updated 4 years ago
- ☆76Updated 4 years ago
- A tool to find sensitive keys and passwords in Travis logs☆142Updated 3 years ago
- Authenticated SSRF in Grafana☆81Updated 10 months ago
- HTTP parameter discovery suite.☆94Updated 5 years ago
- List of configuration files from WEB-INF and META-INF for use in Unvalidated Forwards and JSP Include vulnerabilities.☆82Updated 7 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- ☆59Updated 9 months ago
- A Payload Injector for bugbounties written in go☆70Updated 4 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆65Updated 4 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- jenkinz is a tool to retrieve every build for every job ever created and run on a given Jenkins instance.☆67Updated 5 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆159Updated last year
- Host Header Injection Checker☆81Updated 3 years ago