A utility for automating the testing and re-signing of Express.js cookie secrets.
☆60Dec 10, 2022Updated 3 years ago
Alternatives and similar repositories for cookie-monster
Users that are interested in cookie-monster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆15Dec 21, 2022Updated 3 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆22Jan 27, 2022Updated 4 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆26May 8, 2023Updated 2 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆26Mar 17, 2019Updated 7 years ago
- Automatically download Raspbian and create customized SD card☆18Feb 22, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Apr 30, 2025Updated 11 months ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- ☆10Feb 18, 2016Updated 10 years ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 8 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆61Jan 18, 2023Updated 3 years ago
- Enumerate / Dump Docker Registry☆182Apr 10, 2024Updated 2 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Apr 1, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Security Tool for Enumerating WebSockets☆369Jan 10, 2022Updated 4 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆73Dec 28, 2023Updated 2 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- Demo of a malicious python package that will run code upon pip download or install☆29Sep 10, 2022Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- ☆29Jan 10, 2023Updated 3 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Data extraction tool for Docker Registry API☆135Feb 4, 2024Updated 2 years ago
- Chat Bot Security Checklist☆31Jul 4, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Simple module to render pixel art in the terminal using braille☆16Apr 8, 2021Updated 5 years ago
- A PowerShell module for exporting, importing, removing, permissioning, publishing Active Directory Certificate Templates. It also include…☆95Jul 2, 2024Updated last year
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- ☆51Jun 13, 2024Updated last year
- A Discord bot for Hack The Box teams.☆24Feb 27, 2023Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Apr 13, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆408Oct 31, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆156Aug 3, 2022Updated 3 years ago
- Styx is an cross-platform GUI interface for HackTheBox made in GoLang☆31Feb 8, 2026Updated 2 months ago
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago
- Miscellaneous scripts and tools☆15Oct 17, 2019Updated 6 years ago