LeanKit-Labs / aspxauthLinks
Verify and decrypt .NET's .ASPXAUTH cookie from node.
☆11Updated last year
Alternatives and similar repositories for aspxauth
Users that are interested in aspxauth are comparing it to the libraries listed below
Sorting:
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- ☆14Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Fizzer is an assessment tool for fuzzing FIX messages.☆29Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- VBScript minifier☆24Updated 4 months ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- Digital Forensics date and time☆24Updated 5 months ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Guidelines for Security Disclosures☆25Updated 6 years ago
- Collection of tools for processing storage media images☆14Updated 5 months ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Updated 5 years ago
- Docker environment for hackers☆15Updated 5 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Password Lense: reveal character types in a password☆23Updated this week