Modular command-line tool to parse, create and manipulate JWT tokens for hackers. Features: * Parse JWT tokens * Create JWT tokens * Manipulate JWT tokens Useful for hackers and security researchers to analyze and manipulate JWT tokens.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
FBCTF is a platform for hosting Jeopardy and King of the Hill style Capture the Flag competitions with support for various scales and participation models.
A Node.js Ebook by GENTILHOMME Thomas, covering Node.js development and resources
Web application for visualizing live GPS locations on an SVG world map using honeypot captures.
Mellivora Mellivora is a PHP-based CTF engine that provides comprehensive competition hosting capabilities with challenge management, team scoring, and administrative tools for cybersecurity competitions.
Docker file for building Androguard dependencies with an optional interactive shell environment.
SecGen is an open-source framework that automatically generates vulnerable virtual machines and hacking challenges for cybersecurity education and penetration testing training.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.