salcode / jwtLinks
Single Page Offline JSON Web Token (JWT) Decoder
☆34Updated 4 years ago
Alternatives and similar repositories for jwt
Users that are interested in jwt are comparing it to the libraries listed below
Sorting:
- Semgrep-based Policy Controller for Kubernetes☆47Updated 7 months ago
- Validate the isolation posture of your container environment.☆303Updated 3 months ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆52Updated last year
- Cumulus. Threat modeling the Clouds.☆40Updated 3 weeks ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- Mirror of cisa.gov/kev data files☆60Updated last week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆162Updated last week
- Generate realistic-looking fake meetings to fill up your Microsoft Outlook/Apple/Google calendar. Available in Python and PowerShell.☆32Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated last year
- Check NPM packages for manifest confusion☆44Updated 2 years ago
- Helm chart for Open Cyber Threat Intelligence Platform☆33Updated this week
- Browser plugin for Linux to SSO on Microsoft Entra ID using a locally running microsoft identity broker (Intune).☆148Updated 2 weeks ago
- Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git☆137Updated last week
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆190Updated 7 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆113Updated last week
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆58Updated 9 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆37Updated last month
- ☆182Updated 6 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆107Updated last year
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆38Updated 3 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆312Updated last month
- ☆16Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- ☆75Updated 8 months ago
- Customized CVE FEED Notifier☆114Updated 7 months ago
- CLI component of OWASP PurpleTeam☆131Updated last year
- An open-source collection of API key rotation tutorials.☆74Updated 2 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆107Updated last year
- Source code and examples for Antignis☆44Updated 3 years ago