Paradoxis / Flask-UnsignLinks
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
☆573Updated 8 months ago
Alternatives and similar repositories for Flask-Unsign
Users that are interested in Flask-Unsign are comparing it to the libraries listed below
Sorting:
- ☆876Updated 2 years ago
- Deriving RSA public keys from message-signature pairs☆338Updated last year
- 🎯 Server Side Template Injection Payloads☆685Updated last year
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆259Updated 8 months ago
- Simple websites vulnerable to Server Side Template Injections(SSTI)☆400Updated 2 years ago
- Java RMI Vulnerability Scanner☆889Updated last year
- ☆923Updated 5 months ago
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆318Updated last year
- HopLa Burp Suite Extender plugin - Brings AI capabilities, autocompletion support, and a set of useful payloads to Burp Suite☆767Updated 2 weeks ago
- Simple DNS Rebinding Service☆680Updated 5 years ago
- BChecks collection for Burp Suite Professional and Burp Suite DAST☆709Updated last month
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆887Updated 3 years ago
- A library for parsing .DS_Store files and extracting file names☆483Updated 4 years ago
- Automatic SSTI detection tool with interactive interface☆1,154Updated last week
- A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)☆636Updated last year
- Because just a dark theme wasn't enough!☆574Updated 8 months ago
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆398Updated 5 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆373Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆134Updated 5 years ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆285Updated last year
- Grafana Unauthorized arbitrary file reading vulnerability☆365Updated 2 years ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆749Updated 3 years ago
- A cheatsheet for exploiting server-side SVG processors.☆757Updated 5 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆636Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,018Updated 4 years ago
- Sudo Baron Samedit Exploit☆770Updated 3 years ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆225Updated 10 months ago
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆483Updated 10 months ago
- Herramienta para evadir disable_functions y open_basedir☆443Updated last year