Skip to content
#

security-misconfiguration

Here are 8 public repositories matching this topic...

Language: All
Filter by language

A hands-on security lab demonstrating how weak authentication code can be exploited and how to harden it. Includes a vulnerable Flask login page and an attacker script to simulate brute-force credential stuffing. Learn common auth flaws, defensive coding practices, and concrete steps to secure real-world apps.

  • Updated Oct 1, 2025
  • Python

🔭 JWTelescope is an advanced CLI tool for decoding, inspecting, and performing security analysis on JSON Web Tokens (JWTs). It is designed for bug bounty hunters, pentesters, and developers who want fast insight into JWT structure, claims, and common misconfigurations.

  • Updated Dec 22, 2025
  • Python

Improve this page

Add a description, image, and links to the security-misconfiguration topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the security-misconfiguration topic, visit your repo's landing page and select "manage topics."

Learn more