Some Tweak To Hide Jwt Payload Values | A Handful Of Tweaks And Ideas To Safeguard The JWT Payload
|
|
0
|
258
|
March 24, 2024
|
Route-Detect | Find Authentication (Authn) And Authorization (Authz) Security Bugs In Web Application Routes
|
|
0
|
373
|
February 1, 2024
|
ADCSync | Use ESC1 To Perform A Makeshift DCSync And Dump Hashes
|
|
0
|
219
|
January 22, 2024
|
Squarephish | An advanced phishing tool that uses a technique combining the OAuth Device code authentication flow and QR codes
|
|
0
|
934
|
February 24, 2023
|
LATMA | Lateral Movement Analyzer Tool
|
|
0
|
493
|
January 17, 2023
|
Reverse SSH | SSH Based Reverse Shell
|
|
0
|
773
|
November 4, 2022
|
SharpNamedPipePTH | Pass The Hash To A Named Pipe For Token Impersonation
|
|
0
|
439
|
September 28, 2022
|
GraphCrawler | GraphQL Automated Security Testing Toolkit
|
|
0
|
655
|
September 13, 2022
|
The Best Alternatives To Google Authenticator
|
|
0
|
837
|
August 25, 2022
|
Pamspy | Credentials Dumper For Linux Using eBPF
|
|
0
|
447
|
July 10, 2022
|
Jatayu | Stealthy Stand Alone PHP Web Shell
|
|
0
|
619
|
February 23, 2022
|
Lsarelayx | NTLM Relaying For Windows Made Easy
|
|
0
|
666
|
February 4, 2022
|
Advanced Phishing | Bypass Two Factor Authentication | Modlishka
|
|
2
|
1981
|
July 31, 2020
|
Attackers Can Bypass Fingerprint Authentication With an 80 Percent Success Rate
|
|
0
|
696
|
April 9, 2020
|