Paradoxis / Flask-UnsignLinks
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
☆611Updated last year
Alternatives and similar repositories for Flask-Unsign
Users that are interested in Flask-Unsign are comparing it to the libraries listed below
Sorting:
- Deriving RSA public keys from message-signature pairs☆357Updated last year
- ☆948Updated 2 years ago
- Simple websites vulnerable to Server Side Template Injections(SSTI)☆412Updated 2 years ago
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆265Updated last year
- A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)☆663Updated last year
- ☆975Updated 8 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆930Updated 3 years ago
- 🎯 Server Side Template Injection Payloads☆764Updated last year
- Java RMI Vulnerability Scanner☆905Updated last year
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆384Updated last year
- Because just a dark theme wasn't enough!☆580Updated 11 months ago
- HopLa Burp Suite Extender plugin - Brings AI capabilities, autocompletion support, and a set of useful payloads to Burp Suite☆795Updated 3 months ago
- A library for parsing .DS_Store files and extracting file names☆489Updated 4 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆764Updated 3 years ago
- BChecks collection for Burp Suite Professional and Burp Suite DAST☆747Updated last month
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆323Updated last year
- A cheatsheet for exploiting server-side SVG processors.☆782Updated 5 years ago
- Simple DNS Rebinding Service☆706Updated 5 years ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆284Updated last year
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆403Updated 5 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆141Updated 6 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆642Updated last year
- Automatic SSTI detection tool with interactive interface☆1,282Updated 3 months ago
- ☆415Updated 3 years ago
- Magic hashes – PHP hash "collisions"☆803Updated 8 months ago
- Grafana Unauthorized arbitrary file reading vulnerability☆363Updated 2 years ago
- Herramienta para evadir disable_functions y open_basedir☆471Updated 2 years ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆229Updated last year
- Content-Type Research☆644Updated 5 months ago
- Burp Extension for a passive scanning JS files for endpoint links.☆801Updated last year