Just some random small tools for dealing with asp.net Forms Authentication Cookies
☆31Aug 3, 2021Updated 4 years ago
Alternatives and similar repositories for aspnetCryptTools
Users that are interested in aspnetCryptTools are comparing it to the libraries listed below
Sorting:
- ☆12Oct 29, 2021Updated 4 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Docker container to use blutter (dart decompiler for android apps)☆22Sep 18, 2024Updated last year
- Prelude client side libraries☆17Mar 13, 2026Updated last week
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- ☆14Jun 26, 2025Updated 8 months ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated last month
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- My Personal Notes of OSEP☆40Jun 1, 2023Updated 2 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- ☆16Apr 6, 2021Updated 4 years ago
- http 302 redirect iptables module☆11Aug 26, 2017Updated 8 years ago
- Springboot detection☆23Nov 8, 2021Updated 4 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆12Nov 8, 2022Updated 3 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Nov 12, 2023Updated 2 years ago
- A proving grounds for young and aspiring BBOT modules☆15Aug 31, 2022Updated 3 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- project-blacklist3r☆635Oct 3, 2025Updated 5 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- Exploit ONLYOFFICE Implementations☆28Nov 25, 2022Updated 3 years ago
- Capture the flag Game☆17Apr 14, 2025Updated 11 months ago
- Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration feature…☆302Apr 25, 2023Updated 2 years ago
- My notes of Day1 Day2 will be posted here as journey☆17Jan 6, 2021Updated 5 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- Ghost Blog Docker Container☆10Jun 28, 2021Updated 4 years ago
- Certificate based authentication example using Docker and NGINX☆10Jan 28, 2021Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- tracing with frida-trace some native apis or libs☆23Nov 19, 2020Updated 5 years ago
- Tactics, Techniques, and Procedures☆28Jan 20, 2025Updated last year
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago