Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for token exploitation
exploitation
x
token
x
2 search results found
Jwt_tool
⭐
4,639
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
Sudo_inject
⭐
510
[Linux] Two Privilege Escalation techniques abusing sudo token
Padre
⭐
202
Blazing fast, advanced Padding Oracle exploit
Exploit Cve 2017 6008
⭐
108
Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.
Windows Exploitation
⭐
84
My notes while studying Windows exploitation
Advancedkeyhacks
⭐
47
API Key/Token Exploitation Made easy.
Docker Npmrc Security
⭐
27
.npmrc files are often used insecurely in Docker images. Use multi-stage builds or Docker build secrets to protect your .nrpmc files.
Eos Proxy Token
⭐
21
Proxy token to allow mitigating EOSIO Ram exploit
Hsploit
⭐
18
HEVD Multi-Exploit by m_101
Bypass Json Web Token Jwt
⭐
12
Break and Elevation of Privilege the API v2 using JSON Web Token (JWT)
Nosqli Checkr
⭐
10
Automated NoSQLi pentest
Mock Dao Hack
⭐
9
Simplified "DAO" contract and attacker contract to recursively exploit it
Joomlacve20168869
⭐
7
Exploit for Joomla 3.4.4 - 3.6.4 (CVE-2016-8869 and CVE-2016-8870)
Related Searches
Javascript Token (8,107)
Python Token (4,812)
Token Oauth (2,402)
Token Jwt (2,294)
Php Token (2,264)
Java Token (2,161)
Ruby Token (1,845)
Token Authentication (1,822)
Golang Token (1,792)
Python Exploitation (1,616)
1-2 of 2 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.