Paradoxis / Flask-UnsignLinks
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
☆563Updated 7 months ago
Alternatives and similar repositories for Flask-Unsign
Users that are interested in Flask-Unsign are comparing it to the libraries listed below
Sorting:
- ☆855Updated 2 years ago
- Deriving RSA public keys from message-signature pairs☆327Updated last year
- 🎯 Server Side Template Injection Payloads☆668Updated 11 months ago
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆308Updated last year
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆253Updated 7 months ago
- Simple websites vulnerable to Server Side Template Injections(SSTI)☆395Updated 2 years ago
- BChecks collection for Burp Suite Professional and Burp Suite DAST☆702Updated 2 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆881Updated 3 years ago
- Java RMI Vulnerability Scanner☆877Updated last year
- Because just a dark theme wasn't enough!☆567Updated 7 months ago
- A library for parsing .DS_Store files and extracting file names☆477Updated 4 years ago
- Simple DNS Rebinding Service☆670Updated 5 years ago
- HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite☆755Updated last month
- ☆897Updated 4 months ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆284Updated 10 months ago
- A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)☆629Updated last year
- Grafana Unauthorized arbitrary file reading vulnerability☆363Updated 2 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆369Updated 11 months ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆221Updated 9 months ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- A cheatsheet for exploiting server-side SVG processors.☆748Updated 5 years ago
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆392Updated 5 years ago
- Automatic SSTI detection tool with interactive interface☆1,122Updated 2 months ago
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆480Updated 9 months ago
- Magic hashes – PHP hash "collisions"☆779Updated 3 months ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆738Updated 3 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,012Updated 4 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆130Updated 5 years ago
- JMX enumeration and attacking tool.☆450Updated 3 weeks ago
- ☆407Updated 3 years ago