DigitalInterruption / cookie-monsterLinks
A utility for automating the testing and re-signing of Express.js cookie secrets.
☆59Updated 2 years ago
Alternatives and similar repositories for cookie-monster
Users that are interested in cookie-monster are comparing it to the libraries listed below
Sorting:
- LFI to RCE via phpinfo() assistance or via controlled log file☆70Updated 2 years ago
- ☆42Updated last year
- Tool to enable blind sql injection attacks against websockets using sqlmap☆64Updated 3 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆56Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆43Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- Creates and sends fake meeting invite☆67Updated 4 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Updated 4 years ago
- ☆31Updated 4 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- ☆102Updated 8 months ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆108Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆57Updated 2 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- ☆29Updated 4 years ago
- Shell Simulation over Net-SNMP with extend functionality☆96Updated 4 years ago
- Upload files done during my research.☆164Updated 3 months ago
- Exploit and Check Script for CVE 2022-1388☆58Updated 3 months ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Rewriting SIET to python3☆51Updated 9 months ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago