DigitalInterruption / cookie-monster
A utility for automating the testing and re-signing of Express.js cookie secrets.
☆58Updated 2 years ago
Alternatives and similar repositories for cookie-monster:
Users that are interested in cookie-monster are comparing it to the libraries listed below
- LFI to RCE via phpinfo() assistance or via controlled log file☆62Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆58Updated last year
- ☆39Updated last year
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- ☆38Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆57Updated last year
- Creates and sends fake meeting invite☆59Updated 3 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆55Updated 5 years ago
- ☆51Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆55Updated 2 years ago
- The following package is the standalone wordlist-only component to flask-unsign.☆38Updated 9 months ago
- ☆31Updated 4 years ago
- ☆28Updated 4 years ago
- Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)☆19Updated 3 years ago
- Find the remote website version based on a git repository☆125Updated 3 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆108Updated 11 months ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆30Updated 5 years ago
- ☆65Updated 2 years ago
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆26Updated 6 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆21Updated 3 years ago
- OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated last year
- Vulnerable SAML infrastructure training applicaiton☆51Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆91Updated 7 years ago
- OSWE Preparation☆37Updated 5 years ago