DigitalInterruption / cookie-monsterLinks
A utility for automating the testing and re-signing of Express.js cookie secrets.
☆59Updated 3 years ago
Alternatives and similar repositories for cookie-monster
Users that are interested in cookie-monster are comparing it to the libraries listed below
Sorting:
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Updated 5 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated 2 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆71Updated 2 years ago
- ☆33Updated 5 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 5 years ago
- ☆42Updated 2 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆58Updated 5 years ago
- Merge multiple nMap xml files into one☆49Updated 6 years ago
- ☆113Updated last year
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 9 months ago
- OSWE Preparation☆38Updated 6 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 4 years ago
- ☆33Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆48Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago
- Creates and sends fake meeting invite☆75Updated 4 years ago
- Reverse Shell-able Windows exploits short POCs.☆35Updated 5 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Updated 5 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 3 years ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 3 years ago