Modular command-line tool to parse, create and manipulate JWT tokens for hackers. Features: * Parse JWT tokens * Create JWT tokens * Manipulate JWT tokens Useful for hackers and security researchers to analyze and manipulate JWT tokens.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A library for validating and accessing environment variables in Node.js programs
A collection of writeups of CTF challenges I solved, including explanations of the challenges and how I solved them.
An open-source artifact metadata API for managing metadata about software resources and governing the software supply chain.
CLI program for cybersecurity solution management with multiple functionalities and authentication methods.
A lightweight CTF platform inspired by motherfuckingwebsite.com with a focus on challenge difficulty.
A tool for SSH server auditing with comprehensive analysis capabilities.
Mellivora Mellivora is a PHP-based CTF engine with a wide range of features for managing Capture The Flag competitions.
Node package for preparing CTF events with OWASP Juice Shop challenges for popular CTF frameworks.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.