LeanKit-Labs / aspxauthLinks
Verify and decrypt .NET's .ASPXAUTH cookie from node.
☆11Updated 2 years ago
Alternatives and similar repositories for aspxauth
Users that are interested in aspxauth are comparing it to the libraries listed below
Sorting:
- CVE-2020-5902☆9Updated 5 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 6 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 5 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated last year
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆19Updated 6 years ago
- Decrypts Cisco VPN Group Passwords☆18Updated 13 years ago
- Simple web frontend to an elasticsearch database made for local files indexing☆19Updated 5 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 5 months ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- ☆23Updated 11 years ago
- My blog where I make a new coding project every Thursday.☆45Updated 2 years ago
- ☆23Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- A tool to scan for .DS_Store files on webservers☆34Updated 4 years ago
- Carve shellcode within the memory using restrictive character set☆9Updated 7 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 6 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Updated 5 years ago