DigitalInterruption / cookie-monster
A utility for automating the testing and re-signing of Express.js cookie secrets.
☆58Updated 2 years ago
Alternatives and similar repositories for cookie-monster:
Users that are interested in cookie-monster are comparing it to the libraries listed below
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 3 years ago
- ☆39Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 2 years ago
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆60Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year
- ☆26Updated 4 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆53Updated 2 years ago
- Cheat sheet☆38Updated 5 years ago
- Shell Simulation over Net-SNMP with extend functionality☆93Updated 4 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Updated 5 years ago
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- Creates and sends fake meeting invite☆57Updated 3 years ago
- ☆35Updated 2 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆39Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆21Updated 3 weeks ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- ☆33Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆24Updated 2 years ago
- Squid Pivoting Open Port Scanner☆61Updated 2 months ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆28Updated 6 years ago
- ☆48Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆86Updated 7 years ago
- ☆26Updated last year
- Exploit to dump ipmi hashes☆31Updated last year
- ☆68Updated 4 years ago
- ☆30Updated 4 years ago
- This is to reorganize my notes☆10Updated 3 years ago